SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Data Flow Mapping and the
EU GDPR
Tony Drewitt
Head of Consultancy
IT Governance Ltd
6th April 2017
www.itgovernance.co.uk
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Introduction - Tony Drewitt
• Head of Consultancy (GRC)
– Information security
– Business continuity
– Corporate governance
– Risk management
– Instrumental in launching the IT Governance GDPR service suite
2
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
IT Governance Ltd: GRC one-stop shop
All verticals, all sectors, all organisational sizes
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Agenda
• An overview of the regulatory landscape
• Territorial scope
• Remedies, liabilities and penalties
• Risk management and the GDPR
• Legal requirements for a DPIA
• Why and how to conduct a data flow mapping exercise
• What are the challenges
• What is an information flow
• The questions to ask
• Data flow mapping techniques
4
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
The nature of European law
• Two main types of legislation:
– Directives
Âş Require individual implementation in each member state
Âş Implemented by the creation of national laws approved by the parliaments of
each member state
Âş European Directive 95/46/EC is a directive
Âş UK Data Protection Act 1998
– Regulations
Âş Immediately applicable in each member state
Âş Require no local implementing legislation
Âş The EU GDPR is a regulation
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Article 99: Entry into force and
application
This Regulation shall be binding in its entirety and directly
applicable in all member states.
KEY DATES
• On 8 April 2016 the Council adopted the Regulation.
• On 14 April 2016 the Regulation was adopted by the European Parliament.
• On 4 May 2016 the official text of the Regulation was published in the EU Official
Journal in all the official languages.
• The Regulation entered into force on 24 May 2016 and will apply from 25 May
2018.
• http://ec.europa.eu/justice/data-protection/reform/index_en.htm
Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST-
5419-2016-REV-1/en/pdf
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
GDPR
The GDPR has eleven chapters:
1
• Chapter I – General Provisions: Articles 1 - 4
2
• Chapter II – Principles: Articles 5 - 11
3
• Chapter III – Rights of the Data Subject: Articles 12 - 23
4
• Chapter IV – Controller and Processor: Articles 24 - 43
5
• Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50
6
• Chapter VI – Independent Supervisory Authorities: Articles 51 - 59
7
• Chapter VII – Cooperation and Consistency: Articles 60 - 76
8
• Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84
9
• Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
Data protection model
under the GDPR
Information Commissioner’s Office (ICO)
(supervising authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Articles 1 – 3: Who and where?
• Natural person = a living individual
• Natural persons have rights associated with:
– The protection of personal data.
– The protection of the processing personal data.
– The unrestricted movement of personal data within the EU.
• In material scope:
– Personal data that is processed wholly or partly by automated means.
– Personal data that is part of a filing system, or intended to be.
• The Regulation applies to controllers and processors in the EU
irrespective of where processing takes place.
• The Regulation also applies to controllers not in the EU.
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Remedies, liabilities and penalties
• Article 79: Right to an effective judicial remedy against a
controller or processor
– Judicial remedy where their rights have been infringed as a result of the
processing of personal data.
Âş In the courts of the member state where the controller or processor has an establishment.
Âş In the courts of the member state where the data subject habitually resides.
• Article 82: Right to compensation and liability
– Any person who has suffered material or non-material damage shall have the
right to receive compensation from the controller or processor.
– A controller involved in processing shall be liable for damage caused by
processing.
• Article 83: General conditions for imposing administrative fines
– Imposition of administrative fines will in each case be effective, proportionate,
and dissuasive.
Âş Fines shall take into account technical and organisational measures implemented.
– €20,000,000 or, in case of an undertaking, 4% of total worldwide annual
turnover in the preceding financial year (whichever is higher).
Module I
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €10,000,000 or, in case of an undertaking, 2% of total worldwide annual
turnover in the preceding financial year (whichever is greater).
• Articles:
– 8: Child’s consent
– 11: Processing not requiring identification
– 25: Data protection by design and by default
– 26: Joint controllers
– 27: Representatives of controllers not established in EU
– 26 - 29 & 30: Processing
– 31: Cooperation with the supervisory authority
– 32: Data security
– 33: Notification of breaches to supervisory authority
– 34: Communication of breaches to data subjects
– 35: Data protection impact assessment
– 36: Prior consultation
– 37 - 39: DPOs
– 41(4): Monitoring approved codes of conduct
– 42: Certification
– 43: Certification bodies
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €20,000,000 or, in case of an undertaking, 4% total worldwide
annual turnover in the preceding financial year (whichever is higher).
• Articles
– 5: Principles relating to the processing of personal data
– 6: Lawfulness of processing
– 7: Conditions for consent
– 9: Processing special categories of personal data (i.e. sensitive personal data)
– 12 - 22: Data subject rights to information, access, rectification, erasure,
restriction of processing, data portability, object, profiling
– 44 - 49: Transfers to third countries
– 58(1): Requirement to provide access to supervisory authority
– 58(2): Orders/limitations on processing or the suspension of data flows
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Riskmanagement and the GDPR
RISK is mentioned over
60
times in the Regulation.
It is important to understand privacy risk and integrate it into your risk framework.
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
What is risk?
• The effect of uncertainty on objectives (ISO 31000 etc.)
• Risk is the combination of the probability of an event (IRM)
• A situation involving exposure to danger (OED)
• Uncertainty of outcome, within a range of exposure, arising from a
combination of the impact and the probability of events (Orange
Book HM Treasury)
• The uncertainty of an event occurring that could have an impact on
the achievement of objectives (Institute of Internal Auditors)
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Standards and codes
• ISO 31000, Risk management – Principles and guidelines
– AS/NZS 4360:2004 now replaced by ISO 31000
• ISO 31010, Risk management – Risk assessment techniques
• IRM/ALARM/AIRMIC – A risk management standard
• UK Combined code on UK Corporate Governance code
• OECD, Principles of corporate governance
• COSO, Enterprise risk management – Integrated framework
• Sector specific, e.g. clinical, food
• Discipline specific, e.g. ISO 27005
• ISO 22301, Business continuity management
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
ISO 31000: Risk management
• Management framework approach
• PDCA model modified in ISO 27005
• Generic (all risks)
• Very similar to a management system
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Risk assessment
Risk management process
Establishing the context
Risk identification
Risk analysis
Risk evaluation
Risk treatment
Communication
and
consultation
Monitoring
and
review
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Enterprise risk management
• Capabilities:
– Aligning risk appetite and strategy
– Enhancing risk response decisions
– Reducing operational surprises and losses
– Identifying and managing multiple and cross-enterprise risks
– Seizing opportunities
– Improving deployment of capital
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Risk management - Organisational risk
"landscape"
• Strategic
– Business performance
– Financial performance
– Reputation
• Operational
– Output capacity
– Demand response
– Interruption and disruption
• Statutory
– Data protection Law
– Employment law
– Health & safety law
– Company law
• Regulatory
– Industry/sector specific
compliance requirements
– Licence to operate
• Contractual
– SLA targets/levels
– Product/service availability
– Quality/warranty
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Information security
• “…should be processed in a manner that ensures appropriate security
and confidentiality”
• ‘Appropriate safeguards’ mentioned 36 times
• Preservation of confidentiality, integrity and availability of information
and the assets and processes that support and enable its acquisition,
storage, use, protection and disposal.
• Wide variety of assets:
– information
– ICT
– infrastrucure
• Prevent compromise (loss, disclosure, corruption, etc.).
• Includes IT security and other forms of security:
– physical
– HR
– supply
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Legal requirements for a DPIA
Article 35: Data protection impact assessment
• DPIA must be performed where:
– New technologies are deployed
– Nature, scope & context of the project demand it
– Processes are likely to result in a high risk to the rights and freedom
– It can be used to address sets of processing & risks
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Legal requirements for a DPIA
• The DPIA will set out as a minimum:
– a description of the processing and purposes;
– legitimate interests pursued by the controller;
– an assessment of the necessity and proportionality of the processing;
– an assessment of the risks to the rights and freedoms of data subjects;
– the measures envisaged to address the risks;
– all safeguards & security measures to demonstrate compliance;
– indications of timeframes if processing relates to erasure;
– an indication of any data protection by design and default measures;
– list of recipients of personal data;
– compliance with approved codes of conduct;
– whether data subjects have been consulted.
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Linking the DPIA to the privacy principles
1
• Processed lawfully, fairly and in a transparent manner
2
• Collected for specified, explicit and legitimate purposes
3
• Adequate, relevant and limited to what is necessary
4
• Accurate and, where necessary, kept up to date
5
• Retained only for as long as necessary
6
• Processed in an appropriate manner to maintain security
Accountability
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
How to conduct a data mapping exercise
• The ICO staged approach to an effective DPIA:
1. Required when there is a change in processing of personally identifiable
information (PII).
2. Determine the information flows throughout the organisation in order to
make a proper assessment of the privacy risks.
3. Identify the risks related to privacy and processing, including the necessity and
proportionality of the change in processing.
4. Identify possible privacy solutions to address the risks that have been identified.
5. Assess how the data protection principles have been applied throughout the
organisation.
6. Sign-off and record the DPIA, including details of which privacy solutions are too
be implemented.
7. Integrate the result of the DPIA back into the project plan.
8. Conduct a post-implementation review where risk profile of PII data has
changed.
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data mapping – what are the
challenges?
Identify
personal
data
Identify
appropriate
technical and
organisational
safeguards
Understand
legal &
regulatory
obligations
Trust and
confidence
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
What is an information flow?
A transfer of information from one location to another. For example:
– Inside and outside the European Union.
– From suppliers and sub-suppliers through to customers.
When mapping information flow, you should identify the interaction
points between the parties involved.
NB: Cloud providers present their own challenges.
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Describing information flows
Consider the potential future uses
of the information collected, even if it is not
immediately necessary.
Ensure the people who will be using
the information are consulted on the
practical implications.
Walk through the information
lifecycle to
identify unforeseen or unintended
uses of the data.
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Information flow – identify the key
elements
Data items
Name, email, address Health data, criminal
records
Biometrics, location data
Formats
Hardcopy (paper records) Digital (USB) Database
Transfer methods
Post, telephone, social
media
Internal (within group) External (data sharing)
Locations
Offices Cloud Third parties
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow mapping – questions to ask
• Workflow inputs and outputs:
– How is personal data collected (e.g. form, online, call centre, other)?
– Who is accountable for personal data?
– What is the location of the systems/filing systems containing the data?
– Who has access to the information?
– Is the information disclosed/shared with anyone (e.g suppliers, third parties)?
– Does the system interface with, or transfer information to, other systems?
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow mapping – techniques
• Inspect existing documents
• Facilitation workshops
• Questionnaires
• Observation
• Whiteboard – freeform diagrams
• Template drawings (Visio, mind map tools)
• Post-it notes
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow mapping
Chapter 9 of The Object Primer 3rd Edition: Agile Model Driven Development with UML 2
Identify:
Data Items
Data Formats
Transfer methods
Locations
Whiteboard – freeform diagrams
Template drawings (Visio, Mind map tools)
Post-it notes
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow map – data protection by
design
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
IT Governance: GDPR one-stop shop
• Accredited training, one-day foundation course:
– London OR Cambridge: www.itgovernance.co.uk/shop/p-1795-certified-eu-
general-data-protection-regulation-foundation-gdpr-training-course.aspx
– ONLINE: www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data-
protection-regulation-foundation-gdpr-online-training-course.aspx
• Practitioner course, classroom or online:
– www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection-
regulation-practitioner-gdpr-training-course.aspx
• Pocket guide: www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx
• Documentation toolkit: www.itgovernance.co.uk/shop/p-1796-eu-general-data-
protection-regulation-gdpr-documentation-toolkit.aspx
• Consultancy support :
– Data audit
– Transition/implementation consultancy
– www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
• GDPR Staff Awareness e-learning course:
– www.itgovernance.co.uk/shop/product/gdpr-staff-awareness-e-learning-course
TM
Š IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Questions?
aross@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

Weitere ähnliche Inhalte

Was ist angesagt?

ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRCorporater
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsPECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgCyber StratG
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptxSandeshUprety4
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
Data protection
Data protectionData protection
Data protectionLewis Silkin
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 BenefitsDejan Kosutic
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPRPriyab Satoshi
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 

Was ist angesagt? (20)

ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO Standards
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
Data protection
Data protectionData protection
Data protection
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 

Ähnlich wie Data Flow Mapping and the EU GDPR

Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...Alan McSweeney
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...SĂŠbastien Roques
 

Ähnlich wie Data Flow Mapping and the EU GDPR (20)

Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 

Mehr von IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

Mehr von IT Governance Ltd (15)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

KĂźrzlich hochgeladen

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis GagnĂŠ
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

KĂźrzlich hochgeladen (20)

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Data Flow Mapping and the EU GDPR

  • 1. Data Flow Mapping and the EU GDPR Tony Drewitt Head of Consultancy IT Governance Ltd 6th April 2017 www.itgovernance.co.uk
  • 2. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Introduction - Tony Drewitt • Head of Consultancy (GRC) – Information security – Business continuity – Corporate governance – Risk management – Instrumental in launching the IT Governance GDPR service suite 2
  • 3. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 IT Governance Ltd: GRC one-stop shop All verticals, all sectors, all organisational sizes
  • 4. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Agenda • An overview of the regulatory landscape • Territorial scope • Remedies, liabilities and penalties • Risk management and the GDPR • Legal requirements for a DPIA • Why and how to conduct a data flow mapping exercise • What are the challenges • What is an information flow • The questions to ask • Data flow mapping techniques 4
  • 5. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 The nature of European law • Two main types of legislation: – Directives Âş Require individual implementation in each member state Âş Implemented by the creation of national laws approved by the parliaments of each member state Âş European Directive 95/46/EC is a directive Âş UK Data Protection Act 1998 – Regulations Âş Immediately applicable in each member state Âş Require no local implementing legislation Âş The EU GDPR is a regulation
  • 6. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Article 99: Entry into force and application This Regulation shall be binding in its entirety and directly applicable in all member states. KEY DATES • On 8 April 2016 the Council adopted the Regulation. • On 14 April 2016 the Regulation was adopted by the European Parliament. • On 4 May 2016 the official text of the Regulation was published in the EU Official Journal in all the official languages. • The Regulation entered into force on 24 May 2016 and will apply from 25 May 2018. • http://ec.europa.eu/justice/data-protection/reform/index_en.htm Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST- 5419-2016-REV-1/en/pdf
  • 7. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 GDPR The GDPR has eleven chapters: 1 • Chapter I – General Provisions: Articles 1 - 4 2 • Chapter II – Principles: Articles 5 - 11 3 • Chapter III – Rights of the Data Subject: Articles 12 - 23 4 • Chapter IV – Controller and Processor: Articles 24 - 43 5 • Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50 6 • Chapter VI – Independent Supervisory Authorities: Articles 51 - 59 7 • Chapter VII – Cooperation and Consistency: Articles 60 - 76 8 • Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84 9 • Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
  • 8. Data protection model under the GDPR Information Commissioner’s Office (ICO) (supervising authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board
  • 9. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Articles 1 – 3: Who and where? • Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data. – The protection of the processing personal data. – The unrestricted movement of personal data within the EU. • In material scope: – Personal data that is processed wholly or partly by automated means. – Personal data that is part of a filing system, or intended to be. • The Regulation applies to controllers and processors in the EU irrespective of where processing takes place. • The Regulation also applies to controllers not in the EU.
  • 10. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Remedies, liabilities and penalties • Article 79: Right to an effective judicial remedy against a controller or processor – Judicial remedy where their rights have been infringed as a result of the processing of personal data. Âş In the courts of the member state where the controller or processor has an establishment. Âş In the courts of the member state where the data subject habitually resides. • Article 82: Right to compensation and liability – Any person who has suffered material or non-material damage shall have the right to receive compensation from the controller or processor. – A controller involved in processing shall be liable for damage caused by processing. • Article 83: General conditions for imposing administrative fines – Imposition of administrative fines will in each case be effective, proportionate, and dissuasive. Âş Fines shall take into account technical and organisational measures implemented. – €20,000,000 or, in case of an undertaking, 4% of total worldwide annual turnover in the preceding financial year (whichever is higher). Module I
  • 11. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €10,000,000 or, in case of an undertaking, 2% of total worldwide annual turnover in the preceding financial year (whichever is greater). • Articles: – 8: Child’s consent – 11: Processing not requiring identification – 25: Data protection by design and by default – 26: Joint controllers – 27: Representatives of controllers not established in EU – 26 - 29 & 30: Processing – 31: Cooperation with the supervisory authority – 32: Data security – 33: Notification of breaches to supervisory authority – 34: Communication of breaches to data subjects – 35: Data protection impact assessment – 36: Prior consultation – 37 - 39: DPOs – 41(4): Monitoring approved codes of conduct – 42: Certification – 43: Certification bodies
  • 12. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €20,000,000 or, in case of an undertaking, 4% total worldwide annual turnover in the preceding financial year (whichever is higher). • Articles – 5: Principles relating to the processing of personal data – 6: Lawfulness of processing – 7: Conditions for consent – 9: Processing special categories of personal data (i.e. sensitive personal data) – 12 - 22: Data subject rights to information, access, rectification, erasure, restriction of processing, data portability, object, profiling – 44 - 49: Transfers to third countries – 58(1): Requirement to provide access to supervisory authority – 58(2): Orders/limitations on processing or the suspension of data flows
  • 13. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Riskmanagement and the GDPR RISK is mentioned over 60 times in the Regulation. It is important to understand privacy risk and integrate it into your risk framework.
  • 14. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 What is risk? • The effect of uncertainty on objectives (ISO 31000 etc.) • Risk is the combination of the probability of an event (IRM) • A situation involving exposure to danger (OED) • Uncertainty of outcome, within a range of exposure, arising from a combination of the impact and the probability of events (Orange Book HM Treasury) • The uncertainty of an event occurring that could have an impact on the achievement of objectives (Institute of Internal Auditors)
  • 15. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Standards and codes • ISO 31000, Risk management – Principles and guidelines – AS/NZS 4360:2004 now replaced by ISO 31000 • ISO 31010, Risk management – Risk assessment techniques • IRM/ALARM/AIRMIC – A risk management standard • UK Combined code on UK Corporate Governance code • OECD, Principles of corporate governance • COSO, Enterprise risk management – Integrated framework • Sector specific, e.g. clinical, food • Discipline specific, e.g. ISO 27005 • ISO 22301, Business continuity management
  • 16. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 ISO 31000: Risk management • Management framework approach • PDCA model modified in ISO 27005 • Generic (all risks) • Very similar to a management system
  • 17. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Risk assessment Risk management process Establishing the context Risk identification Risk analysis Risk evaluation Risk treatment Communication and consultation Monitoring and review
  • 18. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Enterprise risk management • Capabilities: – Aligning risk appetite and strategy – Enhancing risk response decisions – Reducing operational surprises and losses – Identifying and managing multiple and cross-enterprise risks – Seizing opportunities – Improving deployment of capital
  • 19. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Risk management - Organisational risk "landscape" • Strategic – Business performance – Financial performance – Reputation • Operational – Output capacity – Demand response – Interruption and disruption • Statutory – Data protection Law – Employment law – Health & safety law – Company law • Regulatory – Industry/sector specific compliance requirements – Licence to operate • Contractual – SLA targets/levels – Product/service availability – Quality/warranty
  • 20. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Information security • “…should be processed in a manner that ensures appropriate security and confidentiality” • ‘Appropriate safeguards’ mentioned 36 times • Preservation of confidentiality, integrity and availability of information and the assets and processes that support and enable its acquisition, storage, use, protection and disposal. • Wide variety of assets: – information – ICT – infrastrucure • Prevent compromise (loss, disclosure, corruption, etc.). • Includes IT security and other forms of security: – physical – HR – supply
  • 21. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Legal requirements for a DPIA Article 35: Data protection impact assessment • DPIA must be performed where: – New technologies are deployed – Nature, scope & context of the project demand it – Processes are likely to result in a high risk to the rights and freedom – It can be used to address sets of processing & risks
  • 22. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Legal requirements for a DPIA • The DPIA will set out as a minimum: – a description of the processing and purposes; – legitimate interests pursued by the controller; – an assessment of the necessity and proportionality of the processing; – an assessment of the risks to the rights and freedoms of data subjects; – the measures envisaged to address the risks; – all safeguards & security measures to demonstrate compliance; – indications of timeframes if processing relates to erasure; – an indication of any data protection by design and default measures; – list of recipients of personal data; – compliance with approved codes of conduct; – whether data subjects have been consulted.
  • 23. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Linking the DPIA to the privacy principles 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary, kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security Accountability
  • 24. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 How to conduct a data mapping exercise • The ICO staged approach to an effective DPIA: 1. Required when there is a change in processing of personally identifiable information (PII). 2. Determine the information flows throughout the organisation in order to make a proper assessment of the privacy risks. 3. Identify the risks related to privacy and processing, including the necessity and proportionality of the change in processing. 4. Identify possible privacy solutions to address the risks that have been identified. 5. Assess how the data protection principles have been applied throughout the organisation. 6. Sign-off and record the DPIA, including details of which privacy solutions are too be implemented. 7. Integrate the result of the DPIA back into the project plan. 8. Conduct a post-implementation review where risk profile of PII data has changed.
  • 25. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data mapping – what are the challenges? Identify personal data Identify appropriate technical and organisational safeguards Understand legal & regulatory obligations Trust and confidence
  • 26. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 What is an information flow? A transfer of information from one location to another. For example: – Inside and outside the European Union. – From suppliers and sub-suppliers through to customers. When mapping information flow, you should identify the interaction points between the parties involved. NB: Cloud providers present their own challenges.
  • 27. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Describing information flows Consider the potential future uses of the information collected, even if it is not immediately necessary. Ensure the people who will be using the information are consulted on the practical implications. Walk through the information lifecycle to identify unforeseen or unintended uses of the data.
  • 28. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Information flow – identify the key elements Data items Name, email, address Health data, criminal records Biometrics, location data Formats Hardcopy (paper records) Digital (USB) Database Transfer methods Post, telephone, social media Internal (within group) External (data sharing) Locations Offices Cloud Third parties
  • 29. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow mapping – questions to ask • Workflow inputs and outputs: – How is personal data collected (e.g. form, online, call centre, other)? – Who is accountable for personal data? – What is the location of the systems/filing systems containing the data? – Who has access to the information? – Is the information disclosed/shared with anyone (e.g suppliers, third parties)? – Does the system interface with, or transfer information to, other systems?
  • 30. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow mapping – techniques • Inspect existing documents • Facilitation workshops • Questionnaires • Observation • Whiteboard – freeform diagrams • Template drawings (Visio, mind map tools) • Post-it notes
  • 31. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow mapping Chapter 9 of The Object Primer 3rd Edition: Agile Model Driven Development with UML 2 Identify: Data Items Data Formats Transfer methods Locations Whiteboard – freeform diagrams Template drawings (Visio, Mind map tools) Post-it notes
  • 32. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow map – data protection by design
  • 33. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 IT Governance: GDPR one-stop shop • Accredited training, one-day foundation course: – London OR Cambridge: www.itgovernance.co.uk/shop/p-1795-certified-eu- general-data-protection-regulation-foundation-gdpr-training-course.aspx – ONLINE: www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data- protection-regulation-foundation-gdpr-online-training-course.aspx • Practitioner course, classroom or online: – www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection- regulation-practitioner-gdpr-training-course.aspx • Pocket guide: www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx • Documentation toolkit: www.itgovernance.co.uk/shop/p-1796-eu-general-data- protection-regulation-gdpr-documentation-toolkit.aspx • Consultancy support : – Data audit – Transition/implementation consultancy – www.itgovernance.co.uk/dpa-compliance-consultancy.aspx • GDPR Staff Awareness e-learning course: – www.itgovernance.co.uk/shop/product/gdpr-staff-awareness-e-learning-course
  • 34. TM Š IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Questions? aross@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk