SlideShare ist ein Scribd-Unternehmen logo
1 von 20
General Data Protection
Regulation
(GDPR)
Overview
• The EU’s General Data Protection Regulation (GDPR) compliance law
has caused quite the buzz since approval in April 2016.
• GDPR attempts to ensure data protection for any EU citizen beginning
in May 2018.
• GDPR will require companies within EU countries and any company
that sends or retrieves data from EU countries, to comply with new
regulations involving data protection and data security. (That means
any global organisation based outside the EU as well.)
Introduction
• Businesses spending a lot of time and money in preparation for GDPR
• Compliance failure with GDPR after May 2018 comes with fines of up
to 4% of the company’s global revenue (not profit) or up to €20
million, along with damaged reputational damage and potential
lawsuits.
GDPR in a nutshell
• With GDPR, companies must notify authorities and customers of data
breaches within 72 hours of becoming aware of a security breach.
Companies must maintain customer records in order to inform
customers when and how their data is being used. Companies should
have the capabilities to provide customers a copy of their data if
requested and allow customers the facility to have their data erased.
Data Protection Officer
• For companies that process large amounts of EU citizens’ personal
data GDPR mandates the appointment of a data protection officer
(DPO), whose primary function is to ensure compliance with the
regulations.
• Expert on data protection law, business practices and technology and
security, and GDPR guidelines suggest the DPO should be located in
the EU.
Software Development Life Cycle (SDLC)
• GDPR impacts the software development life cycle for organizations
that plan to rollout projects within the EU.
• There are many types of SDLC’s utilised in industry, such as Agile,
DevOPS, Waterfall, Iterative, and so on. Despite the different names
and the different approaches, these numerous types of SDLC’s have
several high level common areas.
Software Development Life Cycle (SDLC)
• All SDLC’s have some form of the following phases:
• Plan
• Design
• Build
• Test
• Rollout
• Maintain
• GDPR will have an impact on all phases of the SDLC
IT Systems
• Generally, we find the following commonalities across IT systems.
• Data transport and security layer
• Database and data architecture layer
• Application and logic layer
• Presentation and portal layer
• GDPR will have an impact on all phases of the SDLC and all layers of IT
systems
GDPR Regulation
• The GDPR regulation was developed focusing on social networks,
cloud providers, any organisation collecting or processing data about
EU citizens or selling goods or services to EU citizens regardless of
whether the organisation is bases in the EU or not.
• Overarching idea
• Privacy by Design principles are required by default
GDPR Key Points
• Implementing data protection in the system and the organization, by
design and by default, is a legal requirement.
• Data is secured, and integrity and confidentiality are maintained,
using technical and organizational means under the management of
the Data Controller
• Data controllers and data processors are the two main parties which are
involved in the processing and, under the GDPR, duties regarding the
protection of personal data.
GDPR Key Points
• Data pseudonymization shall be used, when possible
• Data shall be anonymized, when possible
• Pseudonymization and Anonymization are different in one key aspect.
Anonymization irreversibly destroys any way of identifying the data subject.
Pseudonymization substitutes the identity of the data subject in such a way
that additional information is required to re-identify the data subject.
• Pseudonymization is a method to substitute identifiable data with a
reversible, consistent value. Anonymization is the destruction of the
identifiable data.
GDPR Key Points
• Processing attributes and (the processing) steps shall be provided to
the data subject in an easy to understand form at the time of data
collection, electronically or in writing
• A data subject has the right to ask a data controller whether his or her
personal data is being processed, and if so, can request access to both the
personal data and information on processing, the recipients and data
transfers (i.e. other companies and the data they have received).
GDPR Key Points
• Data subjects shall have the right to access and review the processing
of their data at any time.
• Data subjects have the right to know if and when their data is transferred to a
third country or an international organisation, along with the safeguards in
place to ensure ongoing protection of the data after transfer. A data controller
must provide a copy of any personal data undergoing processing at no charge
the first time it is requested
GDPR Key Points
• The data subject shall have a right to a copy of their data in a
commonly used format
• Data regarding a data subject shall be portable to another provider (or
perhaps even your competitor)
GDPR Key Points
• The data subject shall have the right to have their data updated, free
of charge, if there is an error.
• If a data controller holds inaccurate personal data about a data subject, the
data subject has the right to supply the correct information to get their
personal data updated. The data controller is required to rectify the
inaccurate information.
GDPR Key Points
• The data subject shall have the right to have their data erased
without undue delay (Right to be forgotten).
• Data controllers, on the other hand, have the ability under the GDPR to
decline an erasure request if it falls within one of the several exclusions such
as compliance with a legal obligation, public interest for public health, and
legal claims.
• Technological ability to erase all affected data promptly.
• The data controller must notify other IT organisations that hold the
data subject’s data that the data subject has requested data erasure.
GDPR Key Points
• The data subject shall have the right to object to processing,
withdraw consent to processing and opt-out of processing.
• Right to Restriction of Processing. A data subject has the right to have their
personal data excluded from future processing activities - either temporarily
or permanently
• Data controllers must keep records of the processing activities for which they
are responsible, with a list of specific information to be retained for each
record.
GDPR Key Points
• Data is stored only for the time necessary to meet the objectives of
the data subject. Out-of-date personal data shall not be stored. (Part
of an Electronic Records Management strategy).
• Data subject shall be notified of this time period or its calculation
approach at the time of the data capture.
• A data protection officer has the obligation to notify each recipient of any
personal data newly impacted by the exercise of a data subject's rights in
relation to rectification, erasure, or restriction. If the data subject requests
details on recipients, the data controller is required to supply it.
• The data subject can also object to processing for the purposes of direct
marketing and profiling for direct marketing activities.
GDPR Key Points
• A determination must be made, almost immediately, whether a data
breach is likely to have been a “high risk to the rights and freedoms of
the natural person” as such a technical environment must be in place
to identify, track and assess such breaches.
• All data breaches, no matter how small, must be reported to the
supervisory authority.
• Individuals affected by data breaches must be notified if the attack is deemed
to have adverse impact.
• Companies must notify authorities and customers of data breaches within 72
hours of becoming aware of a security breach.
GDPR Key Points
• An organisation must have a process for regularly testing, assessing,
and evaluating the effectiveness of technical and organizational
measures for ensuring the security of their processing

Weitere ähnliche Inhalte

Was ist angesagt?

Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterBrowne Jacobson LLP
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranDr. Sami Zahran
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
GDPR Compliance: What You Need to Know Before May 2018
GDPR Compliance:  What You Need to Know Before May 2018GDPR Compliance:  What You Need to Know Before May 2018
GDPR Compliance: What You Need to Know Before May 2018Infosec
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Emily Jones
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...m-hance
 
MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)Huub de Jong
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 

Was ist angesagt? (20)

Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, Exeter
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
GDPRR: The Key Changes
GDPRR: The Key ChangesGDPRR: The Key Changes
GDPRR: The Key Changes
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami Zahran
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
GDPR Compliance: What You Need to Know Before May 2018
GDPR Compliance:  What You Need to Know Before May 2018GDPR Compliance:  What You Need to Know Before May 2018
GDPR Compliance: What You Need to Know Before May 2018
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...
 
MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
GDPR
GDPRGDPR
GDPR
 

Ähnlich wie General Data Protection Regulation

Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPRNeha Patel
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Understanding & Working with the GDPR
Understanding & Working with the GDPRUnderstanding & Working with the GDPR
Understanding & Working with the GDPRMarketo
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineManageEngine
 
Reddico GDPR Presentation
Reddico GDPR PresentationReddico GDPR Presentation
Reddico GDPR PresentationLuke Kyte
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsWSO2
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
 

Ähnlich wie General Data Protection Regulation (20)

Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Understanding & Working with the GDPR
Understanding & Working with the GDPRUnderstanding & Working with the GDPR
Understanding & Working with the GDPR
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngine
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Reddico GDPR Presentation
Reddico GDPR PresentationReddico GDPR Presentation
Reddico GDPR Presentation
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 

Mehr von GrittyCC

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright ProtectionGrittyCC
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)GrittyCC
 
Computer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesComputer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesGrittyCC
 

Mehr von GrittyCC (8)

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Passwords
PasswordsPasswords
Passwords
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)
 
Computer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesComputer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 cases
 

Kürzlich hochgeladen

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Kürzlich hochgeladen (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

General Data Protection Regulation

  • 2. Overview • The EU’s General Data Protection Regulation (GDPR) compliance law has caused quite the buzz since approval in April 2016. • GDPR attempts to ensure data protection for any EU citizen beginning in May 2018. • GDPR will require companies within EU countries and any company that sends or retrieves data from EU countries, to comply with new regulations involving data protection and data security. (That means any global organisation based outside the EU as well.)
  • 3. Introduction • Businesses spending a lot of time and money in preparation for GDPR • Compliance failure with GDPR after May 2018 comes with fines of up to 4% of the company’s global revenue (not profit) or up to €20 million, along with damaged reputational damage and potential lawsuits.
  • 4. GDPR in a nutshell • With GDPR, companies must notify authorities and customers of data breaches within 72 hours of becoming aware of a security breach. Companies must maintain customer records in order to inform customers when and how their data is being used. Companies should have the capabilities to provide customers a copy of their data if requested and allow customers the facility to have their data erased.
  • 5. Data Protection Officer • For companies that process large amounts of EU citizens’ personal data GDPR mandates the appointment of a data protection officer (DPO), whose primary function is to ensure compliance with the regulations. • Expert on data protection law, business practices and technology and security, and GDPR guidelines suggest the DPO should be located in the EU.
  • 6. Software Development Life Cycle (SDLC) • GDPR impacts the software development life cycle for organizations that plan to rollout projects within the EU. • There are many types of SDLC’s utilised in industry, such as Agile, DevOPS, Waterfall, Iterative, and so on. Despite the different names and the different approaches, these numerous types of SDLC’s have several high level common areas.
  • 7. Software Development Life Cycle (SDLC) • All SDLC’s have some form of the following phases: • Plan • Design • Build • Test • Rollout • Maintain • GDPR will have an impact on all phases of the SDLC
  • 8. IT Systems • Generally, we find the following commonalities across IT systems. • Data transport and security layer • Database and data architecture layer • Application and logic layer • Presentation and portal layer • GDPR will have an impact on all phases of the SDLC and all layers of IT systems
  • 9. GDPR Regulation • The GDPR regulation was developed focusing on social networks, cloud providers, any organisation collecting or processing data about EU citizens or selling goods or services to EU citizens regardless of whether the organisation is bases in the EU or not. • Overarching idea • Privacy by Design principles are required by default
  • 10. GDPR Key Points • Implementing data protection in the system and the organization, by design and by default, is a legal requirement. • Data is secured, and integrity and confidentiality are maintained, using technical and organizational means under the management of the Data Controller • Data controllers and data processors are the two main parties which are involved in the processing and, under the GDPR, duties regarding the protection of personal data.
  • 11. GDPR Key Points • Data pseudonymization shall be used, when possible • Data shall be anonymized, when possible • Pseudonymization and Anonymization are different in one key aspect. Anonymization irreversibly destroys any way of identifying the data subject. Pseudonymization substitutes the identity of the data subject in such a way that additional information is required to re-identify the data subject. • Pseudonymization is a method to substitute identifiable data with a reversible, consistent value. Anonymization is the destruction of the identifiable data.
  • 12. GDPR Key Points • Processing attributes and (the processing) steps shall be provided to the data subject in an easy to understand form at the time of data collection, electronically or in writing • A data subject has the right to ask a data controller whether his or her personal data is being processed, and if so, can request access to both the personal data and information on processing, the recipients and data transfers (i.e. other companies and the data they have received).
  • 13. GDPR Key Points • Data subjects shall have the right to access and review the processing of their data at any time. • Data subjects have the right to know if and when their data is transferred to a third country or an international organisation, along with the safeguards in place to ensure ongoing protection of the data after transfer. A data controller must provide a copy of any personal data undergoing processing at no charge the first time it is requested
  • 14. GDPR Key Points • The data subject shall have a right to a copy of their data in a commonly used format • Data regarding a data subject shall be portable to another provider (or perhaps even your competitor)
  • 15. GDPR Key Points • The data subject shall have the right to have their data updated, free of charge, if there is an error. • If a data controller holds inaccurate personal data about a data subject, the data subject has the right to supply the correct information to get their personal data updated. The data controller is required to rectify the inaccurate information.
  • 16. GDPR Key Points • The data subject shall have the right to have their data erased without undue delay (Right to be forgotten). • Data controllers, on the other hand, have the ability under the GDPR to decline an erasure request if it falls within one of the several exclusions such as compliance with a legal obligation, public interest for public health, and legal claims. • Technological ability to erase all affected data promptly. • The data controller must notify other IT organisations that hold the data subject’s data that the data subject has requested data erasure.
  • 17. GDPR Key Points • The data subject shall have the right to object to processing, withdraw consent to processing and opt-out of processing. • Right to Restriction of Processing. A data subject has the right to have their personal data excluded from future processing activities - either temporarily or permanently • Data controllers must keep records of the processing activities for which they are responsible, with a list of specific information to be retained for each record.
  • 18. GDPR Key Points • Data is stored only for the time necessary to meet the objectives of the data subject. Out-of-date personal data shall not be stored. (Part of an Electronic Records Management strategy). • Data subject shall be notified of this time period or its calculation approach at the time of the data capture. • A data protection officer has the obligation to notify each recipient of any personal data newly impacted by the exercise of a data subject's rights in relation to rectification, erasure, or restriction. If the data subject requests details on recipients, the data controller is required to supply it. • The data subject can also object to processing for the purposes of direct marketing and profiling for direct marketing activities.
  • 19. GDPR Key Points • A determination must be made, almost immediately, whether a data breach is likely to have been a “high risk to the rights and freedoms of the natural person” as such a technical environment must be in place to identify, track and assess such breaches. • All data breaches, no matter how small, must be reported to the supervisory authority. • Individuals affected by data breaches must be notified if the attack is deemed to have adverse impact. • Companies must notify authorities and customers of data breaches within 72 hours of becoming aware of a security breach.
  • 20. GDPR Key Points • An organisation must have a process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of their processing