SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
The EU General Data Protection Regulation
and how Oracle can help
Niklas Hjorthen
CX Sales Executive
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle. Not
all technologies identified are available for all cloud services.
Disclaimer
The information in this document may not be construed or used as legal advice about the
content, interpretation or application of any law, regulation or regulatory guideline.
Customers and prospective customers must seek their own legal counsel to understand
the applicability of any law or regulation on their processing of personal data, including
through the use of any vendor’s products or services.
2
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
What does GDPR stand for?
Confidential – Oracle Highly Restricted 3
General Data Protection Regulation
When will it be enforced?
May, 25th 2018
*Approved in April 2016
11/21/2017
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |11/21/2017 Confidential – Oracle Highly Restricted 4
What is the aim of the GDPR?
Harmonize Data Privacy
Laws across Europe
Protect and Empower all
EU Citizens Data Privacy
Reshape the Way Organizations Across
the Region Approach Data Privacy
1
2 3
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
• Granting Data Subject Data Security • Granting Data Subject Rights
11/21/2017 Confidential – Oracle Highly Restricted 5
What is the GDPR all about?
Right to be Informed
1 2Right of Access
3Right to Rectification
4Right to Erasure
5Right to Restrict
Processing
6Right to Data
Portability
7Right to Object
8Right in Relation to
Automated Decision
Making and Profiling
Protect the Data
1 2Access Control
3Monitor, Block and
Audit
4Secure
Configurations
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |11/21/2017 Confidential – Oracle Highly Restricted 6
What if an Organization is not aligned with GDPR?
This is the maximum fine that can be imposed for the most serious infringements
e.g. not having sufficient customer consent to process data or violating the core of Privacy by Design concepts.
Under GDPR, organizations (both processors and controllers!) in breach of GDPR can be fined up to:
• 4% of annual global turnover
• €20 Million
(whichever is greater)
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
• GDPR compliance requires a set of
coordinated actions by different
departments in every company.
• Requires the following coverage:
– Organization
– Legal and Contracts
– Information Technology
• Good technology can help to
achieve compliance
• Oracle provides technology that
– Defines sensitive data, discovers and tracks it
across its lifecycle, identifies risk situations
– Minimises data, eliminates redundancy and
duplication, improves data quality
– Masters and governs sensitive data, consents
and rules across all of the entrprise systems
– Implements business rules based checks
around sensitive data usage and enforces them
in all enterprise processes
– Improves confidentiality, security, integrity and
availability
– Mitigates security incidents
• Oracle can help put technology in
the right context
GDPR & Oracle technology
Confidential Oracle - i-Faber - Please DO NOT share outside of Oracle or i-Faber
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
A path towards GDPR – technology domains
Several Oracle products or
security cloud services can
help to achieve
compliance to GDPR.
We can help to:
1. Discover sensitive data
with data governance
solutions
2. Enforce data, software,
identity security and
policies
3. Govern sesitive data &
Enrich application
functions with policies
checks to guarantee rights
of data subjects
4. Support a foundation that
includes good IT practices,
and high availability and
resilience
Discovery Enforcement
Foundation
Government & Enrichment
Data Governance Security
System
Data Governance
Storage
Policy Automation
MDM
Data Management
Manageability
Data Integration
Analytics
Confidential – Oracle Highly Restricted11/21/2017 8Confidential – Oracle Highly Restricted
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
A path towards GDPR – tasks and activitiesMAINTAIN(CREATE)ARECORD
OFPROCESSING(A.30)
DOCUMENT AND KEEP TRACK (A.24)
INTRODUCE SENTITIVE DATA GOVERNANCE, GDPR POLICIES ENFORCEMENT AND
EVALUATE REQUIRED APPLICATION MODIFICATIONS (A.5-34)
ENFORCE GOOD IT AND GOOD SECURITY ACROSS THE STACK (A.32, A.25)
DISCOVER SENSITIVE DATA
CREATE SYSTEMS AND
SOFTWARE INVENTORY
ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK
PRACTICES INCLUDING DPIA (A.35)
APPLICATION AND
DATA SCOPE IS
AVAILABLE AND
INCREMENTALLY
DEFINED
ACCESS CONTROL
PROTECT THE DATA
MONITOR, BLOCK AND AUDIT
SECURE CONFIGURATION
IMPLEMENT
APPROPRIATE
SECURITY
MEASURES
(A.32,A.25)
Discovery Enforcement
Foundation
Government & Enrichment
PERSONAL DATA INTEGRATION & ORCHESTRATION
PERSONAL DATA QUALITY GOVERNANCE
PERSONAL DATA SUBJECT CENTRAL MASTER (INCLUDING CONSENTS)
DATA SUBJECT CONSENTS AND RIGHTS ENFORCEMENT - ENTERPRISEWISE
Create a centralized record
of processing, including all
Systems, Software and
Processes Inventory, plus
additional info coming
from security assessment.
Data Glossary and Data
Lineage can be
incrementally updated with
delta information.
Metadata and Data
Discovery completely
automatable.
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
A path towards GDPR – tasks and activitiesMAINTAIN(CREATE)ARECORD
OFPROCESSING(A.30)
DOCUMENT AND KEEP TRACK (A.24)
INTRODUCE SENTITIVE DATA GOVERNANCE, GDPR POLICIES ENFORCEMENT AND
EVALUATE REQUIRED APPLICATION MODIFICATIONS (A.5-34)
ENFORCE GOOD IT AND GOOD SECURITY ACROSS THE STACK (A.32, A.25)
DISCOVER SENSITIVE DATA
CREATE SYSTEMS AND
SOFTWARE INVENTORY
ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK
PRACTICES INCLUDING DPIA (A.35)
APPLICATION AND
DATA SCOPE IS
AVAILABLE AND
INCREMENTALLY
DEFINED
ACCESS CONTROL
PROTECT THE DATA
MONITOR, BLOCK AND AUDIT
SECURE CONFIGURATION
IMPLEMENT
APPROPRIATE
SECURITY
MEASURES
(A.32,A.25)
PERSONAL DATA INTEGRATION & ORCHESTRATION
PERSONAL DATA QUALITY GOVERNANCE
PERSONAL DATA SUBJECT CENTRAL MASTER (INCLUDING CONSENTS)
DATA SUBJECT CONSENTS AND RIGHTS ENFORCEMENT - ENTERPRISEWISE
Discovery Enforcement
Foundation
Government & Enrichment
Modernize identity
management to guarantee
authentication and
authorization both for
business user and IT
personnel
Protect the data wherever
it is (encryption A.32) and
avoid using real data
where non necessary (A.5
and W.26)
Collect, secure and analyze
audit logs and implement
boundary defenses
Secure configurations,
remediate vulnerabilities,
and control production
baselines
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Oracle Security Solutions That Can Help Address GDPR
Oracle Product Security Measure Cloud Short Description
Advanced Security Protect the data Encrypt Oracle Databases transparently and redact sensitive application data
Key Vault Protect the data Securely manage encryption key lifecycle as well as passwords, certificates and more.
Data Masking and Subsetting Protect the data Anonymize production data for testing and development environments.
Database Vault Access controls Control privileged user access using least privilege and separation of duties enforcement.
Identity Cloud Service Access controls X Manage identities from the cloud for hybrid access, authorization, authentication, provisioning,
and SSO.
Identity Governance Access controls Manage the identity lifecycle: user administration, privileged account management, and identity
intelligence.
Access Management Access controls IT asset protection and identity federation for multiple scenarios.
Directory Services Access controls Manage large, fast read-write user directories.
Label Security Access controls Allow individual data records to be labeled with metadata that describes the characteristics of
the data, and then enforces access to those records based on the metadata.
Audit Vault and Database Firewall Monitor, Block and Audit Centralized auditing, monitoring, reporting and alerting of anomalous database activity
management.
Security Monitoring and Analytics Cloud
Service
Monitor, Block and Audit X Monitor security incidents across heterogeneous and hybrid cloud environments.
CASB Cloud Service Monitor, Block and Audit X Discover unsanctioned cloud services and implement consistent security policies across
sanctioned SaaS, PaaS, and IaaS environments.
Configuration and Compliance Cloud
Service
Secure compliance X Implement and maintain continuous configuration and compliance for IT assets.
Enterprise Manager: Configuration Mgmt Secure compliance Check that IT assets are properly installed and securely configured.
11/21/2017 Confidential – Oracle Highly Restricted 11
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
A path towards GDPR – tasks and activitiesMAINTAIN(CREATE)ARECORD
OFPROCESSING(A.30)
DOCUMENT AND KEEP TRACK (A.24)
INTRODUCE SENTITIVE DATA GOVERNANCE, GDPR POLICIES ENFORCEMENT AND
EVALUATE REQUIRED APPLICATION MODIFICATIONS (A.5-34)
ENFORCE GOOD IT AND GOOD SECURITY ACROSS THE STACK (A.32, A.25)
DISCOVER SENSITIVE DATA
CREATE SYSTEMS AND
SOFTWARE INVENTORY
ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK
PRACTICES INCLUDING DPIA (A.35)
APPLICATION AND
DATA SCOPE IS
AVAILABLE AND
INCREMENTALLY
DEFINED
ACCESS CONTROL
PROTECT THE DATA
MONITOR, BLOCK AND AUDIT
SECURE CONFIGURATION
IMPLEMENT
APPROPRIATE
SECURITY
MEASURES
(A.32,A.25)
Discovery Enforcement
Foundation
Government & Enrichment
Batch/real-time Integration
with adapters to databases,
applications and protocols.
Complete business process
automation across systems.
Personal data profiling,
continuous data auditing
with contextual issue
remediation, restructing,
repurposing, enrichment,
and lineage. Data quality
dashboards and case mgmt
to involve business users.
Central Personal Data
Master, including record
cross-references, profile
history, detailed consents
and data subject request
tracking.
Natural language based
rule checks vs. regulations
and data subject consents
and rights.
PERSONAL DATA INTEGRATION & ORCHESTRATION
PERSONAL DATA QUALITY GOVERNANCE
PERSONAL DATA SUBJECT CENTRAL MASTER (INCLUDING CONSENTS)
DATA SUBJECT CONSENTS AND RIGHTS ENFORCEMENT - ENTERPRISEWISE
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Oracle Core Solution Foundation for GDPR
Data Integration
& Orchestration
Integration Adapters, Data
Mapping, Data
Transformation, Data
Movement
Metadata & Data
Discovery
Data Lineage, Data
Dictionary, Metadata
Management, Impact
Analysis, Semantic
Usage Analysis
Policy Automation
Business Rules Modeling, Business
Rules execution (Business Users
and Applications), Business Rules
Monitoring and Impact Analysis
Data Quality
Governance
Data Profiling, Data Discovery, Data
Assesment, Data Enrichment, Data
Remediation, Data Standardization,
Data Quality Case Management,
Data Quality Dashboards
Personal Data
Master
Master Data Model &
Extensibility, Data
Consolidation, Data Validation,
Data De-duplication, Data
Enrichment, Data Sharing
Marketing
Sales
Service
Financials
HCM
E-Commerce
Supply Chain Mgmt
Marketing
Sales
Service
Financials
HCM
E-Commerce
Supply Chain Mgmt
Confidential – Oracle Highly Restricted11/21/2017 13Confidential – Oracle Highly Restricted
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
A path towards GDPR –parallelizable tasks
... You can start security projects
as you go
MAINTAIN(CREATE)ARECORD
OFPROCESSING(A.30)
DISCOVER
SENSITIVE DATA
CREATE SYSTEMS
AND SOFTWARE
INVENTORY
APPLICATION
AND DATA SCOPE
IS AVAILABLE
AND
INCREMENTALLY
DEFINED
IMPLEMENT
APPROPRIATE
SECURITY
MEASURES
(A.32,A.25)
While you increment the scope....
IMPLEMENT
GOVERNNANCE
AND
ENRICHMENT
(A.5-A.34)
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Establishing Oracle Core Foundation for GDPR (1)
• Principles relating to processing of personal data (A.5)
– Specific, explicit, legitimate Purpose
– Data minimisation vs. Purposes
– Data Accuracy & Freshness
• Lawfulness of processing (A.6)
• Conditions for consent (A.7)
STEP 0 - Data Discovery & Quality Assessment
Oracle
CDM
Discover, Identify, Profile & Catalogue
Verify, Remediate & Enrich
Standardize & Repurpose
Map & Load
Oracle EMM + EDQ 



• Personal Master Definition
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Establishing Oracle Core Foundation for GDPR (2)
• Right to be informed (A.12)
• Right of access by the data subject (A.15)
• Right to rectification (A.16)
• Right to data portability (A.20)
Oracle
CDM
Consolidation MDM Style
•Access to Profile
•Rectification of Profile
•Consents & Retention Management
•Requests (erasure, restriction, portability)




STEP 1 - Data Consolidation
• Master Data Subject Profile
• Profile History
• Consents (with History)
• Restrictions (with History)
• Retention (with History)
• Requests (with History)
• Data Sources
Oracle EMM + EDQ
Oracle Data Integration
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Establishing Oracle Core Foundation for GDPR (3)
• Right in relation to Automated decision-making & profiling
(A.22)
• Right to rectification (A.16)
• Right to restriction of processing (A.18)
Need process
based data
propagation!!!
STEP 2 – Backward Integration
Oracle
CDM




Transactional MDM Style
OPA




















• Master Data Subject Profile
• Profile History
• Special Categories
• Consents (with History)
• Restrictions (with History)
• Retention (with History)
• Requests (with History)
• Data Sources
• Usage check
• Data retention check
• Special cases check
OracleEMM+EDQ
OracleDataIntegration
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Establishing Oracle Core Foundation for GDPR (4)
• Notification obligation
– when personal data collected from the data subject (A.13)
– when personal data have not been obtained from the data subject (A.14)
– regarding rectification or erasure of personal data or restriction of
processing (A.19)
• Responsibility of the controller (A.24)
STEP 3 – Integration Extension
Oracle EMM + EDQ
Oracle Data Integration
























Transactional MDM Style
3° Party
System
OPA
• Master Data Subject Profile
• Profile History
• Special Categories
• Consents (with History)
• Restrictions (with History)
• Retention (with History)
• Requests (with History)
• Data Sources
• 3° Parties
• Usage check
• Data retention check
• Special cases check
• Data sharing check
Oracle
CDM




Needs BPM
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Establishing Oracle core foundation for GDPR (5)
• Processing of special categories of personal data (A.9)
• Right to rectification (A.16)
• Right to object (A.21)
• Right to erasure (‘right to be forgotten’) (A.17)
• Right to restriction of processing (A.18)
STEP 4 – Integration Extension
Oracle EMM + EDQ
Oracle BPM
























Transactional MDM Style
3° Party
System
OPA
• Master Data Subject Profile
• Profile History
• Special Categories
• Consents (with History)
• Restrictions (with History)
• Retention (with History)
• Requests (with History)
• Data Sources
• 3° Parties
• Usage check
• Data retention check
• Special cases check
• Data sharing check
• Erasure check
Oracle
CDM




Needs BPM
Discovery Enforcement
Foundation
Government & Enrichment
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Oracle Solution for GDPR - Differentiators
11/21/2017 Confidential – Oracle Highly Restricted 20
Leader in Security and good
IT for many years
1 2
Standard-based, Open &
Modular Solution with many
Adapters to Systems,
Databases & Applications
3
Maximum Availability
Architectures
4
Best in class Security
Solutions, starting with
Security on Silicon
6
Ability to perform both
Metadata and Data
Discovery
7
Easy, Quick, Affordable
Personal Data Master to
consolidate the best version
person record and consents
8Business Oriented businss
rule engine working with
Natural Language, providing
web services and business
user UI for rule check
9
Oracle Best Practices for
GDPR Solution
Implementation
5
Complete Personal data
Governance Solution, from
Discovery to Govern
10
Smooth and Phased
Approach, with minimal
initial impact on existing
systems and operations
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 2111/21/2017 Confidential – Oracle Highly Restricted

Weitere ähnliche Inhalte

Was ist angesagt?

General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreSeclore
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceMarketingArrowECS_CZ
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationIndex Engines Inc.
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Karina Matos
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Software
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarIndex Engines Inc.
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
3 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-23 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-2Redazione InnovaPuglia
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...TrustArc
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical OverviewErnest Staats
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkUlf Mattsson
 
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]TrustArc
 
GDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activitiesGDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activitiesNico J.W. Kuijper ECMm BPMs ERMp
 
Webinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRWebinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRIndex Engines Inc.
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB
 
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataUL Transaction Security
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]TrustArc
 

Was ist angesagt? (20)

General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR Compliance
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data Classification
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
3 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-23 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-2
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
 
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
 
GDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activitiesGDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activities
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
 
Webinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRWebinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPR
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
 
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 

Ähnlich wie The EU General Protection Regulation and how Oracle can help

How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18Cloudera, Inc.
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
Mastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeMastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeDenodo
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePodGaret Keller
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 

Ähnlich wie The EU General Protection Regulation and how Oracle can help (20)

How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Mastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeMastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business Landscape
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

The EU General Protection Regulation and how Oracle can help

  • 1. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | The EU General Data Protection Regulation and how Oracle can help Niklas Hjorthen CX Sales Executive
  • 2. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Not all technologies identified are available for all cloud services. Disclaimer The information in this document may not be construed or used as legal advice about the content, interpretation or application of any law, regulation or regulatory guideline. Customers and prospective customers must seek their own legal counsel to understand the applicability of any law or regulation on their processing of personal data, including through the use of any vendor’s products or services. 2
  • 3. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | What does GDPR stand for? Confidential – Oracle Highly Restricted 3 General Data Protection Regulation When will it be enforced? May, 25th 2018 *Approved in April 2016 11/21/2017
  • 4. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |11/21/2017 Confidential – Oracle Highly Restricted 4 What is the aim of the GDPR? Harmonize Data Privacy Laws across Europe Protect and Empower all EU Citizens Data Privacy Reshape the Way Organizations Across the Region Approach Data Privacy 1 2 3
  • 5. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | • Granting Data Subject Data Security • Granting Data Subject Rights 11/21/2017 Confidential – Oracle Highly Restricted 5 What is the GDPR all about? Right to be Informed 1 2Right of Access 3Right to Rectification 4Right to Erasure 5Right to Restrict Processing 6Right to Data Portability 7Right to Object 8Right in Relation to Automated Decision Making and Profiling Protect the Data 1 2Access Control 3Monitor, Block and Audit 4Secure Configurations
  • 6. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |11/21/2017 Confidential – Oracle Highly Restricted 6 What if an Organization is not aligned with GDPR? This is the maximum fine that can be imposed for the most serious infringements e.g. not having sufficient customer consent to process data or violating the core of Privacy by Design concepts. Under GDPR, organizations (both processors and controllers!) in breach of GDPR can be fined up to: • 4% of annual global turnover • €20 Million (whichever is greater)
  • 7. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | • GDPR compliance requires a set of coordinated actions by different departments in every company. • Requires the following coverage: – Organization – Legal and Contracts – Information Technology • Good technology can help to achieve compliance • Oracle provides technology that – Defines sensitive data, discovers and tracks it across its lifecycle, identifies risk situations – Minimises data, eliminates redundancy and duplication, improves data quality – Masters and governs sensitive data, consents and rules across all of the entrprise systems – Implements business rules based checks around sensitive data usage and enforces them in all enterprise processes – Improves confidentiality, security, integrity and availability – Mitigates security incidents • Oracle can help put technology in the right context GDPR & Oracle technology Confidential Oracle - i-Faber - Please DO NOT share outside of Oracle or i-Faber
  • 8. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | A path towards GDPR – technology domains Several Oracle products or security cloud services can help to achieve compliance to GDPR. We can help to: 1. Discover sensitive data with data governance solutions 2. Enforce data, software, identity security and policies 3. Govern sesitive data & Enrich application functions with policies checks to guarantee rights of data subjects 4. Support a foundation that includes good IT practices, and high availability and resilience Discovery Enforcement Foundation Government & Enrichment Data Governance Security System Data Governance Storage Policy Automation MDM Data Management Manageability Data Integration Analytics Confidential – Oracle Highly Restricted11/21/2017 8Confidential – Oracle Highly Restricted
  • 9. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | A path towards GDPR – tasks and activitiesMAINTAIN(CREATE)ARECORD OFPROCESSING(A.30) DOCUMENT AND KEEP TRACK (A.24) INTRODUCE SENTITIVE DATA GOVERNANCE, GDPR POLICIES ENFORCEMENT AND EVALUATE REQUIRED APPLICATION MODIFICATIONS (A.5-34) ENFORCE GOOD IT AND GOOD SECURITY ACROSS THE STACK (A.32, A.25) DISCOVER SENSITIVE DATA CREATE SYSTEMS AND SOFTWARE INVENTORY ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK PRACTICES INCLUDING DPIA (A.35) APPLICATION AND DATA SCOPE IS AVAILABLE AND INCREMENTALLY DEFINED ACCESS CONTROL PROTECT THE DATA MONITOR, BLOCK AND AUDIT SECURE CONFIGURATION IMPLEMENT APPROPRIATE SECURITY MEASURES (A.32,A.25) Discovery Enforcement Foundation Government & Enrichment PERSONAL DATA INTEGRATION & ORCHESTRATION PERSONAL DATA QUALITY GOVERNANCE PERSONAL DATA SUBJECT CENTRAL MASTER (INCLUDING CONSENTS) DATA SUBJECT CONSENTS AND RIGHTS ENFORCEMENT - ENTERPRISEWISE Create a centralized record of processing, including all Systems, Software and Processes Inventory, plus additional info coming from security assessment. Data Glossary and Data Lineage can be incrementally updated with delta information. Metadata and Data Discovery completely automatable.
  • 10. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | A path towards GDPR – tasks and activitiesMAINTAIN(CREATE)ARECORD OFPROCESSING(A.30) DOCUMENT AND KEEP TRACK (A.24) INTRODUCE SENTITIVE DATA GOVERNANCE, GDPR POLICIES ENFORCEMENT AND EVALUATE REQUIRED APPLICATION MODIFICATIONS (A.5-34) ENFORCE GOOD IT AND GOOD SECURITY ACROSS THE STACK (A.32, A.25) DISCOVER SENSITIVE DATA CREATE SYSTEMS AND SOFTWARE INVENTORY ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK PRACTICES INCLUDING DPIA (A.35) APPLICATION AND DATA SCOPE IS AVAILABLE AND INCREMENTALLY DEFINED ACCESS CONTROL PROTECT THE DATA MONITOR, BLOCK AND AUDIT SECURE CONFIGURATION IMPLEMENT APPROPRIATE SECURITY MEASURES (A.32,A.25) PERSONAL DATA INTEGRATION & ORCHESTRATION PERSONAL DATA QUALITY GOVERNANCE PERSONAL DATA SUBJECT CENTRAL MASTER (INCLUDING CONSENTS) DATA SUBJECT CONSENTS AND RIGHTS ENFORCEMENT - ENTERPRISEWISE Discovery Enforcement Foundation Government & Enrichment Modernize identity management to guarantee authentication and authorization both for business user and IT personnel Protect the data wherever it is (encryption A.32) and avoid using real data where non necessary (A.5 and W.26) Collect, secure and analyze audit logs and implement boundary defenses Secure configurations, remediate vulnerabilities, and control production baselines
  • 11. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Oracle Security Solutions That Can Help Address GDPR Oracle Product Security Measure Cloud Short Description Advanced Security Protect the data Encrypt Oracle Databases transparently and redact sensitive application data Key Vault Protect the data Securely manage encryption key lifecycle as well as passwords, certificates and more. Data Masking and Subsetting Protect the data Anonymize production data for testing and development environments. Database Vault Access controls Control privileged user access using least privilege and separation of duties enforcement. Identity Cloud Service Access controls X Manage identities from the cloud for hybrid access, authorization, authentication, provisioning, and SSO. Identity Governance Access controls Manage the identity lifecycle: user administration, privileged account management, and identity intelligence. Access Management Access controls IT asset protection and identity federation for multiple scenarios. Directory Services Access controls Manage large, fast read-write user directories. Label Security Access controls Allow individual data records to be labeled with metadata that describes the characteristics of the data, and then enforces access to those records based on the metadata. Audit Vault and Database Firewall Monitor, Block and Audit Centralized auditing, monitoring, reporting and alerting of anomalous database activity management. Security Monitoring and Analytics Cloud Service Monitor, Block and Audit X Monitor security incidents across heterogeneous and hybrid cloud environments. CASB Cloud Service Monitor, Block and Audit X Discover unsanctioned cloud services and implement consistent security policies across sanctioned SaaS, PaaS, and IaaS environments. Configuration and Compliance Cloud Service Secure compliance X Implement and maintain continuous configuration and compliance for IT assets. Enterprise Manager: Configuration Mgmt Secure compliance Check that IT assets are properly installed and securely configured. 11/21/2017 Confidential – Oracle Highly Restricted 11 Discovery Enforcement Foundation Government & Enrichment
  • 12. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | A path towards GDPR – tasks and activitiesMAINTAIN(CREATE)ARECORD OFPROCESSING(A.30) DOCUMENT AND KEEP TRACK (A.24) INTRODUCE SENTITIVE DATA GOVERNANCE, GDPR POLICIES ENFORCEMENT AND EVALUATE REQUIRED APPLICATION MODIFICATIONS (A.5-34) ENFORCE GOOD IT AND GOOD SECURITY ACROSS THE STACK (A.32, A.25) DISCOVER SENSITIVE DATA CREATE SYSTEMS AND SOFTWARE INVENTORY ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK PRACTICES INCLUDING DPIA (A.35) APPLICATION AND DATA SCOPE IS AVAILABLE AND INCREMENTALLY DEFINED ACCESS CONTROL PROTECT THE DATA MONITOR, BLOCK AND AUDIT SECURE CONFIGURATION IMPLEMENT APPROPRIATE SECURITY MEASURES (A.32,A.25) Discovery Enforcement Foundation Government & Enrichment Batch/real-time Integration with adapters to databases, applications and protocols. Complete business process automation across systems. Personal data profiling, continuous data auditing with contextual issue remediation, restructing, repurposing, enrichment, and lineage. Data quality dashboards and case mgmt to involve business users. Central Personal Data Master, including record cross-references, profile history, detailed consents and data subject request tracking. Natural language based rule checks vs. regulations and data subject consents and rights. PERSONAL DATA INTEGRATION & ORCHESTRATION PERSONAL DATA QUALITY GOVERNANCE PERSONAL DATA SUBJECT CENTRAL MASTER (INCLUDING CONSENTS) DATA SUBJECT CONSENTS AND RIGHTS ENFORCEMENT - ENTERPRISEWISE
  • 13. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Oracle Core Solution Foundation for GDPR Data Integration & Orchestration Integration Adapters, Data Mapping, Data Transformation, Data Movement Metadata & Data Discovery Data Lineage, Data Dictionary, Metadata Management, Impact Analysis, Semantic Usage Analysis Policy Automation Business Rules Modeling, Business Rules execution (Business Users and Applications), Business Rules Monitoring and Impact Analysis Data Quality Governance Data Profiling, Data Discovery, Data Assesment, Data Enrichment, Data Remediation, Data Standardization, Data Quality Case Management, Data Quality Dashboards Personal Data Master Master Data Model & Extensibility, Data Consolidation, Data Validation, Data De-duplication, Data Enrichment, Data Sharing Marketing Sales Service Financials HCM E-Commerce Supply Chain Mgmt Marketing Sales Service Financials HCM E-Commerce Supply Chain Mgmt Confidential – Oracle Highly Restricted11/21/2017 13Confidential – Oracle Highly Restricted Discovery Enforcement Foundation Government & Enrichment
  • 14. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | A path towards GDPR –parallelizable tasks ... You can start security projects as you go MAINTAIN(CREATE)ARECORD OFPROCESSING(A.30) DISCOVER SENSITIVE DATA CREATE SYSTEMS AND SOFTWARE INVENTORY APPLICATION AND DATA SCOPE IS AVAILABLE AND INCREMENTALLY DEFINED IMPLEMENT APPROPRIATE SECURITY MEASURES (A.32,A.25) While you increment the scope.... IMPLEMENT GOVERNNANCE AND ENRICHMENT (A.5-A.34)
  • 15. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Establishing Oracle Core Foundation for GDPR (1) • Principles relating to processing of personal data (A.5) – Specific, explicit, legitimate Purpose – Data minimisation vs. Purposes – Data Accuracy & Freshness • Lawfulness of processing (A.6) • Conditions for consent (A.7) STEP 0 - Data Discovery & Quality Assessment Oracle CDM Discover, Identify, Profile & Catalogue Verify, Remediate & Enrich Standardize & Repurpose Map & Load Oracle EMM + EDQ     • Personal Master Definition Discovery Enforcement Foundation Government & Enrichment
  • 16. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Establishing Oracle Core Foundation for GDPR (2) • Right to be informed (A.12) • Right of access by the data subject (A.15) • Right to rectification (A.16) • Right to data portability (A.20) Oracle CDM Consolidation MDM Style •Access to Profile •Rectification of Profile •Consents & Retention Management •Requests (erasure, restriction, portability)     STEP 1 - Data Consolidation • Master Data Subject Profile • Profile History • Consents (with History) • Restrictions (with History) • Retention (with History) • Requests (with History) • Data Sources Oracle EMM + EDQ Oracle Data Integration Discovery Enforcement Foundation Government & Enrichment
  • 17. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Establishing Oracle Core Foundation for GDPR (3) • Right in relation to Automated decision-making & profiling (A.22) • Right to rectification (A.16) • Right to restriction of processing (A.18) Need process based data propagation!!! STEP 2 – Backward Integration Oracle CDM     Transactional MDM Style OPA                     • Master Data Subject Profile • Profile History • Special Categories • Consents (with History) • Restrictions (with History) • Retention (with History) • Requests (with History) • Data Sources • Usage check • Data retention check • Special cases check OracleEMM+EDQ OracleDataIntegration Discovery Enforcement Foundation Government & Enrichment
  • 18. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Establishing Oracle Core Foundation for GDPR (4) • Notification obligation – when personal data collected from the data subject (A.13) – when personal data have not been obtained from the data subject (A.14) – regarding rectification or erasure of personal data or restriction of processing (A.19) • Responsibility of the controller (A.24) STEP 3 – Integration Extension Oracle EMM + EDQ Oracle Data Integration                         Transactional MDM Style 3° Party System OPA • Master Data Subject Profile • Profile History • Special Categories • Consents (with History) • Restrictions (with History) • Retention (with History) • Requests (with History) • Data Sources • 3° Parties • Usage check • Data retention check • Special cases check • Data sharing check Oracle CDM     Needs BPM Discovery Enforcement Foundation Government & Enrichment
  • 19. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Establishing Oracle core foundation for GDPR (5) • Processing of special categories of personal data (A.9) • Right to rectification (A.16) • Right to object (A.21) • Right to erasure (‘right to be forgotten’) (A.17) • Right to restriction of processing (A.18) STEP 4 – Integration Extension Oracle EMM + EDQ Oracle BPM                         Transactional MDM Style 3° Party System OPA • Master Data Subject Profile • Profile History • Special Categories • Consents (with History) • Restrictions (with History) • Retention (with History) • Requests (with History) • Data Sources • 3° Parties • Usage check • Data retention check • Special cases check • Data sharing check • Erasure check Oracle CDM     Needs BPM Discovery Enforcement Foundation Government & Enrichment
  • 20. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Oracle Solution for GDPR - Differentiators 11/21/2017 Confidential – Oracle Highly Restricted 20 Leader in Security and good IT for many years 1 2 Standard-based, Open & Modular Solution with many Adapters to Systems, Databases & Applications 3 Maximum Availability Architectures 4 Best in class Security Solutions, starting with Security on Silicon 6 Ability to perform both Metadata and Data Discovery 7 Easy, Quick, Affordable Personal Data Master to consolidate the best version person record and consents 8Business Oriented businss rule engine working with Natural Language, providing web services and business user UI for rule check 9 Oracle Best Practices for GDPR Solution Implementation 5 Complete Personal data Governance Solution, from Discovery to Govern 10 Smooth and Phased Approach, with minimal initial impact on existing systems and operations
  • 21. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 2111/21/2017 Confidential – Oracle Highly Restricted

Hinweis der Redaktion

  1. 2 This is a GDPR presentation approved to be used in public. Since it is meant to be XLOB there is more flexibility embedded. You must follow these rules: No slides can be added Some slides can be hidden; check the instructions on each single slide Delete these yellow boxes Retrieve the updated version if your copy is older than two months (we will give self service instructions later; for the moment send an email to alessandro.vallega@oracle.com) the content of the yellow boxes is copied in the instructions; ask for the presentation training material (to be produced by June 2018) This version is valid until June 30, 2018
  2. 3 Mandatory slide
  3. 30
  4. 37 You can put in bold the name of the organization that you represent. This slide must not be deleted
  5. 31 If you do not feel confortable with the animations, remove them. Do not remove the slide. We put all our products in this framework If you do not feel confortable with the rightmost text remove it, unless you work in security. If you work in security you should be able to comment it.
  6. 31 If you do not feel confortable with the animations, remove them. Do not remove the slide. We put all our products in this framework If you do not feel confortable with the rightmost text remove it, unless you work in security. If you work in security you should be able to comment it.
  7. 31 If you do not feel confortable with the animations, remove them. Do not remove the slide. We put all our products in this framework If you do not feel confortable with the rightmost text remove it, unless you work in security. If you work in security you should be able to comment it.
  8. 32 Optional but it is better not to remove this slide because Consulting companies are working on the blue activities, assessments and policy/procedures. If we wait they finish their job our customer and us will loose 6 months
  9. 41 Optional and you can change the call to action
  10. 41 Optional and you can change the call to action
  11. 41 Optional and you can change the call to action
  12. 41 Optional and you can change the call to action
  13. 41 Optional and you can change the call to action
  14. 42