SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
5 key steps for
SMBs to GDPR
compliance
Wednesday, November 29, 2017
Webinar hosted by:
John Clelland, Managing Director, Founding Partner at
Proteus-Cyber Ltd.
Istvan Lam, Co-founder & CEO at Tresorit
Introduction
What is the GDPR?
– The GDPR unifies data protection regulations across the EU, will directly
apply in member states from May 25, 2018
– Many obligations – compliance is resource-heavy
– Organizations should prioritize
– What are your most risky areas?
– Data protection principles defined by the GDPR
– fairness, lawfulness and transparency; purpose limitation; data minimisation; data
quality; security, integrity and confidentiality
– Creates an “economy of privacy“: radical changes, heavy fines
3
The 5 steps to GDPR compliance: Overview
4
Create data
register to
map personal
data
Check third
parties &
processing
vendors
Apply
technical
safeguards of
the GDPR
Create
policies
for IT
reconciliation
Analyse data
breach risks
in your
organization
1. 2. 3. 4. 5.
Step 1.
Create data
register to map
personal data
What is a data register?
– GDPR Article 30: Each controller and, where applicable, the controller’s representative, shall
maintain a record of processing activities under its responsibility. That record shall contain
all of the following information:
a. the name and contact details of the controller and, where applicable, the joint controller, the controller’s
representative and the data protection officer;
b.the purposes of the processing;
c. a description of the categories of data subjects and of the categories of personal data;
d.the categories of recipients to whom the personal data have been or will be disclosed including recipients
in third countries or international organisations;
e.where applicable, transfers of personal data to a third country or an international organisation, including
the identification of that third country or international organisation and, in the case of transfers referred to
in the second subparagraph of Article 49(1), the documentation of suitable safeguards;
f. where possible, the envisaged time limits for erasure of the different categories of data;
g.where possible, a general description of the technical and organisational security measures referred to in
Article 32(1).
6
Understand how you manage data – (data register)
DPO Business Owners
(who use personal data)
Issue
Data/Process survey
IT data owners
(understand how data is handled)
Issue
IT data handling survey
Data Register &
Article 30 report
PIA
Name
Address
Bank account
no
…
Convert survey to PIA
Step 2.
Check third parties
& data processing
vendors
Check third parties & data processing vendors
– Which processes disclose data to third parties? (Common processes at
SMBs: billing, HR, marketing)
– How do the third parties handle your data?
– Where do they you store your data?
– What security measures do they apply to your data?
– Who has access to the data?
9
Step 1 & 2 – How Proteus®GDPRready™ basic can help
– Simple tool to get a start on GDPR, one site, one user, one survey, one
summary report.
– Designed to start you on the road to GDPR compliance
– Model your most important processes against Personal and Sensitive data
– Establish how you handle that data
– Contains recommendations
– Provides templates for policies
– Contains a plan of action
10
11
Week	1 2 3 4 16
2017/18
Milestone	1
Answer	surveys
Milestone	2
Publish	1st reports
Milestone	3
Data	handling
Milestone	4
Finish	1st phase
Process/Data	Survey 4 days
Identify	your	processesWhat	personal	data	is	linked
How	do	you	process	the	data
Perform	PIA/DPIA 15	days
Controllers/processors
Assess	current	policies/procedures
Manual	or	electronic	processing
DPIA,	reason	for	processing/storage/disclosure
Data	handling	– IT	surveys 5 days
Encrypted/Pseudonymised
Identify	gaps
International	transit
Follow-up	actions	&	recommendations
Recommended SMB time-line for Step 1 & 2
Report	to	the	board
Reports within days
Step 3.
Apply technical
safeguards of the
GDPR: encryption
Encryption highlighted by the GDPR
– “The controller and the processor shall implement appropriate technical and organisational
measures to ensure a level of security appropriate to the risk, including inter alia as
appropriate: the pseudonymisation and encryption of personal data” - GDPR Article 32. Security
of Processing
– What is pseudonymisation?
– Processing personal data so that it can no longer be attributed to a specific individual without the use of
additional information.
– What is encryption?
– In case of a server-side data breach or leak, strongly encrypted datasets are unintelligible to unauthorized
people.
– Encryption makes the re-identification of persons from the leaked datasets impossible with reasonable
efforts
– The persons are protected from harmful effects of data exposure.
13
Advantages of encryption
– Protect the personal data of employees, customers, partners, and users.
– Keep your personal data within company walls
– Reduce your liability in case of a data breach.
– Save costs of data breach notifications and potential fines
– Manage consent compatibility
– Enjoy the advantages of public cloud (security, managed infrastructure,
easy deployment) and the highest level of GDPR compliant security
16
Use end-to-end encrypted providers
– For cloud-based collaboration – sharing and syncing files conveniently and
securely with Tresorit:
– Swiss provider
– Since 2011
– Automatic end-to-end encryption for all files, during the whole sharing process
– Ideal for internal and external collaboration
– Combining end-to-end encrypted security with file control and data governance features
– Other providers for communicating securely:
– Email: Protonmail, Tutanota
– Messaging: Wire, Threema
17
Step 4.
Create policies
for IT reconciliation
Create policies for your processes
19
• Social media policy
• Archive policy
• Acceptable Use policy
• Change management policy
• CCTV policy
• Call recording policy
• BYOD policy
• Vendor assessment policy
• Remote working policy
• Privacy by design policy
• Incident management policy
• Generic privacy policy
• Employee data policy
• Disaster recovery policy
• Data subject access policy
• Data sharing policy
• Data security policy
• Data risk policy
• Data retention policy
• Data privacy impact assessment policy
• Data privacy and security audit policy
• Data obfuscation policy
• Data governance policy
• Data Deletion policy
• Data Classification policy
• Backup policy
Step 5.
Analyse data
breach risks in your
organization
Most common causes of data breaches
Source: 2017 Cost of Data Breach Study by Ponemon Institute
21
Identify the riskiest areas in your organization
– Malicious attacks:
– Do you use technical safeguards such as encryption?
– Do you use end-point security measures?
– Do you have a team dedicated for security, or is your IT staff trained for that?
– Do you have internal security policies, how do you enforce that among your staff?
– Human error:
– How do you share personal data internally and externally?
– Do you use tools that allow you to control and revoke data?
– Do you have data governance policies in place?
– Do you have data protection and security trainings to raise awareness?
– System glitches:
– Do you have comprehensive policies for IT and business processes?
– How do you manage your third party providers and data processor vendors?
22
Key takeaways + Q & A
1. The GDPR requires a holistic view on data protection within an
organization – prioritize and start with your most risky areas
2. Map your personal data and business processes to know what you need
to protect
3. Apply safeguards highlighted by the GDPR such as encryption
23
Thank you
24
– Find more information at:
– www.proteuscyber.com
– www.tresorit.com/gdpr
– Contact us:
– contact@proteuscyber.com
– info@tresorit.com

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Frank Dawson
 

Was ist angesagt? (20)

Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? Article
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPR
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 

Ähnlich wie 5 key steps for SMBs for reaching GDPR Compliance

14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
Shadi A. Razak
 

Ähnlich wie 5 key steps for SMBs for reaching GDPR Compliance (20)

14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 

Kürzlich hochgeladen

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
SS A
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
SS A
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
E LSS
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 

Kürzlich hochgeladen (20)

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 

5 key steps for SMBs for reaching GDPR Compliance

  • 1. 5 key steps for SMBs to GDPR compliance Wednesday, November 29, 2017 Webinar hosted by: John Clelland, Managing Director, Founding Partner at Proteus-Cyber Ltd. Istvan Lam, Co-founder & CEO at Tresorit
  • 3. What is the GDPR? – The GDPR unifies data protection regulations across the EU, will directly apply in member states from May 25, 2018 – Many obligations – compliance is resource-heavy – Organizations should prioritize – What are your most risky areas? – Data protection principles defined by the GDPR – fairness, lawfulness and transparency; purpose limitation; data minimisation; data quality; security, integrity and confidentiality – Creates an “economy of privacy“: radical changes, heavy fines 3
  • 4. The 5 steps to GDPR compliance: Overview 4 Create data register to map personal data Check third parties & processing vendors Apply technical safeguards of the GDPR Create policies for IT reconciliation Analyse data breach risks in your organization 1. 2. 3. 4. 5.
  • 5. Step 1. Create data register to map personal data
  • 6. What is a data register? – GDPR Article 30: Each controller and, where applicable, the controller’s representative, shall maintain a record of processing activities under its responsibility. That record shall contain all of the following information: a. the name and contact details of the controller and, where applicable, the joint controller, the controller’s representative and the data protection officer; b.the purposes of the processing; c. a description of the categories of data subjects and of the categories of personal data; d.the categories of recipients to whom the personal data have been or will be disclosed including recipients in third countries or international organisations; e.where applicable, transfers of personal data to a third country or an international organisation, including the identification of that third country or international organisation and, in the case of transfers referred to in the second subparagraph of Article 49(1), the documentation of suitable safeguards; f. where possible, the envisaged time limits for erasure of the different categories of data; g.where possible, a general description of the technical and organisational security measures referred to in Article 32(1). 6
  • 7. Understand how you manage data – (data register) DPO Business Owners (who use personal data) Issue Data/Process survey IT data owners (understand how data is handled) Issue IT data handling survey Data Register & Article 30 report PIA Name Address Bank account no … Convert survey to PIA
  • 8. Step 2. Check third parties & data processing vendors
  • 9. Check third parties & data processing vendors – Which processes disclose data to third parties? (Common processes at SMBs: billing, HR, marketing) – How do the third parties handle your data? – Where do they you store your data? – What security measures do they apply to your data? – Who has access to the data? 9
  • 10. Step 1 & 2 – How Proteus®GDPRready™ basic can help – Simple tool to get a start on GDPR, one site, one user, one survey, one summary report. – Designed to start you on the road to GDPR compliance – Model your most important processes against Personal and Sensitive data – Establish how you handle that data – Contains recommendations – Provides templates for policies – Contains a plan of action 10
  • 11. 11 Week 1 2 3 4 16 2017/18 Milestone 1 Answer surveys Milestone 2 Publish 1st reports Milestone 3 Data handling Milestone 4 Finish 1st phase Process/Data Survey 4 days Identify your processesWhat personal data is linked How do you process the data Perform PIA/DPIA 15 days Controllers/processors Assess current policies/procedures Manual or electronic processing DPIA, reason for processing/storage/disclosure Data handling – IT surveys 5 days Encrypted/Pseudonymised Identify gaps International transit Follow-up actions & recommendations Recommended SMB time-line for Step 1 & 2 Report to the board Reports within days
  • 12. Step 3. Apply technical safeguards of the GDPR: encryption
  • 13. Encryption highlighted by the GDPR – “The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: the pseudonymisation and encryption of personal data” - GDPR Article 32. Security of Processing – What is pseudonymisation? – Processing personal data so that it can no longer be attributed to a specific individual without the use of additional information. – What is encryption? – In case of a server-side data breach or leak, strongly encrypted datasets are unintelligible to unauthorized people. – Encryption makes the re-identification of persons from the leaked datasets impossible with reasonable efforts – The persons are protected from harmful effects of data exposure. 13
  • 14.
  • 15.
  • 16. Advantages of encryption – Protect the personal data of employees, customers, partners, and users. – Keep your personal data within company walls – Reduce your liability in case of a data breach. – Save costs of data breach notifications and potential fines – Manage consent compatibility – Enjoy the advantages of public cloud (security, managed infrastructure, easy deployment) and the highest level of GDPR compliant security 16
  • 17. Use end-to-end encrypted providers – For cloud-based collaboration – sharing and syncing files conveniently and securely with Tresorit: – Swiss provider – Since 2011 – Automatic end-to-end encryption for all files, during the whole sharing process – Ideal for internal and external collaboration – Combining end-to-end encrypted security with file control and data governance features – Other providers for communicating securely: – Email: Protonmail, Tutanota – Messaging: Wire, Threema 17
  • 18. Step 4. Create policies for IT reconciliation
  • 19. Create policies for your processes 19 • Social media policy • Archive policy • Acceptable Use policy • Change management policy • CCTV policy • Call recording policy • BYOD policy • Vendor assessment policy • Remote working policy • Privacy by design policy • Incident management policy • Generic privacy policy • Employee data policy • Disaster recovery policy • Data subject access policy • Data sharing policy • Data security policy • Data risk policy • Data retention policy • Data privacy impact assessment policy • Data privacy and security audit policy • Data obfuscation policy • Data governance policy • Data Deletion policy • Data Classification policy • Backup policy
  • 20. Step 5. Analyse data breach risks in your organization
  • 21. Most common causes of data breaches Source: 2017 Cost of Data Breach Study by Ponemon Institute 21
  • 22. Identify the riskiest areas in your organization – Malicious attacks: – Do you use technical safeguards such as encryption? – Do you use end-point security measures? – Do you have a team dedicated for security, or is your IT staff trained for that? – Do you have internal security policies, how do you enforce that among your staff? – Human error: – How do you share personal data internally and externally? – Do you use tools that allow you to control and revoke data? – Do you have data governance policies in place? – Do you have data protection and security trainings to raise awareness? – System glitches: – Do you have comprehensive policies for IT and business processes? – How do you manage your third party providers and data processor vendors? 22
  • 23. Key takeaways + Q & A 1. The GDPR requires a holistic view on data protection within an organization – prioritize and start with your most risky areas 2. Map your personal data and business processes to know what you need to protect 3. Apply safeguards highlighted by the GDPR such as encryption 23
  • 24. Thank you 24 – Find more information at: – www.proteuscyber.com – www.tresorit.com/gdpr – Contact us: – contact@proteuscyber.com – info@tresorit.com