SlideShare une entreprise Scribd logo
1  sur  79
Get You And Your Business GDPR Ready
Thursday 8th June
Basics of Data Protection
Richard Williams
Data Protection – Key Principles and Definitions
• Brief overview
• What is data protection
• Why is it important
• The current regime
• Key principles/definitions drawn upon during the day
What is Data Protection and why is it relevant?
• All businesses store and use data/information
• Data: The “lifeblood” of a business
– Improve products/services
– Increase revenues
– Gain a competitive edge
• IT/Computer based storage = increased risk of data being misused/ending up in the wrong
hands
• Information might be “personal” in nature
– It might be kept in relation to a business’
• Staff
• Customers
• Account holders
• Suppliers
– It might be kept when
• Recruiting staff
• Managing staff records
• Marketing products/services to customers
– It might include:
• An individual’s name, address, contact details, employment history, medical
conditions, convictions or credit history
• Recording staff working hours
• The giving of delivery information to a company
• Data Protection Act 1998 (DPA)
– Principal law currently regulating the use of personal data in the UK
– Its aim is to protect the individuals whose personal data is being held
– Set outs rules and practices to be followed when processing personal data
– Creation of an independent supervisory body (Information Commissioner’s Office) to
enforce rights/obligations under the Act
Why is data protection important?
• Consequences of non-compliance are severe
– Heavy financial penalties:
• ICO currently has power to fine up to £500,000
• Penalties under the new General Data Protection Regulation will reach an upper
limit of:
– €20million; or
– 4% of annual global turnover
– Reputation
• One of an organisation’s most valuable assets
• “It takes many good deeds to build a reputation and only one bad one to lose it”
(Benjamin Franklin)
• Social media/internet means news spreads quickly
• Damage to image/brand = lost business
• YouGov poll, commissioned by the ICO in January 2016 as to effect of data breach:
– 20 per cent of people would definitely stop using a company’s services after
hearing news of a data breach;
– 57 per cent would consider stopping;
– 8 per cent said the coverage would make no difference; and
– 14 per cent said they didn’t know.
Data Protection Act 1998
• Principal law currently regulating and protecting the use of personal information
• Purpose of DPA:
– To regulate the processing of personal data relating to living individuals (known as data
subjects) who can be identified by that data or that data and other information which is
in the possession of an entity (the data controller) who decides what that data will be
used for.
• The DPA achieves this by:
– Imposing rules and obligations on the data controller
• Data Protection Principles relating to how the personal data should be obtained
and processed
– Granting rights to the data subject
What is personal data?
• DPA only applies to the use of Personal Data
• Two elements: “Data” and “Personal”
• Data:
– Defined by the DPA as information which:
• “… is processed by equipment that operates automatically in response to
instructions given for that purpose” (i.e. computer based records)
• “… is recorded with the intention that it should be processed by means of such
equipment” (i.e. paper based data if the intention is to put it on computer)
• “… is recorded as part of a relevant filing system”
– DPA definition of “relevant filing system” is not straightforward
» “any set of information relating to individuals to the extent that… the set
[of information] is structured, either by reference to individuals or by
reference to criteria relating to individuals, in such a way that specific
information relating to a particular individual is readily accessible”.
» ICO has offered guidance:
• covers non-automated records relating to individuals
• that are held in a sufficiently systematic and structured way
• so as to allow ready access to specific information about those
individuals
• Personal:
– Data is personal data if it is data relating to living individuals (data subjects) who can be
identified:
• From that data; or
• From that data and other information in the possession of the data controller
– For example:
• A company holds customer data in an Excel spreadsheet. The records do not identify
individuals by name but contain unique reference numbers which can be matched to
another database that allows the company to identify the individuals concerned. The
information on the Excel spreadsheet, even though it is just a set of reference
numbers, is still classified as personal data.
What is sensitive personal data?
• Personal Data consisting of information as to the data subject’s:
– Racial/ethnic origin
– Political opinions
– Religious beliefs/affiliations
– Membership of a trade union
– Physical/mental health
– Sexual life
– Offences/convictions
• DPA requires sensitive personal data to be treated with greater care due to:
– Potential for it to be used in a discriminatory manner
– Private in nature
• For the processing of sensitive personal data to be lawful and fair:
– Individual must give his explicit consent
– Consent must be positive (i.e. opt-in and not opt-out)
What is processing?
• DPA regulates the processing of personal data
• “Processing” defined very widely
• Includes:
– Obtaining and collecting data
– Recording data
– Holding and retaining data
– Carrying out any “operation or set of operations” on the data, including:
• Organizing, adapting or altering the data;
• Retrieving, consulting or using the data;
• Disclosing the data by transmitting, disseminating or making it available; or
• Aligning, combining, erasing or destroying the data
• Treat it as covering pretty much anything you might do with that personal data!
What is a data controller?
• DPA places obligations only on the data controller
• The person, company or firm that determines:
– Purposes for which the personal data is to be processed; and
– Manner in which the personal data is to be processed.
What is a data processor?
• The entity that processes the personal data on the data controller’s behalf.
• This might be:
– The data controller itself
– A separate third-party engaged by the data controller
– Data processors are not directly subject to the DPA (obligations placed only on the data
controller)
– If the data controller uses the services of data processor, it must have in place a written
agreement with the data processor:
• process personal data in accordance with the data controller’s instructions
• maintain appropriate security measures in relation to the data
To conclude
• Take Laura Smith.
• For any data relating to Laura to be personal data, it has to be capable of identifying her as a living individual.
• On Monday morning, Laura phones up a company called Amazing.Com with a view to buying a new DVD player over the phone.
• During the call, Laura gives just her name. That information alone is insufficient to identify her and to be personal data.
• If, however, Laura had given her name, address and date of birth, that would be an example of personal data.
• What Amazing.Com does with that data is known as data processing.
• During the phone call, Laura decides against buying a new DVD player right then.
• Instead, Laura goes onto Amazing.Com’s website a few days later with a view to buying the DVD player on-line.
• Laura inputs and gives Amazing.Com various pieces of information about herself, including her credit card details. This is personal
data.
• Laura is the data subject as the data is about her.
• Amazing.Com is the data controller as they decide how the data will be processed and what happens to it and will have to comply
with the DPA.
• Amazing.Com outsources its customer support to a third party call centre.
• Some weeks later, Laura’s DVD player stops working so she calls Amazing.Com’s customer support line.
• When Laura calls, the employees in the call centre have access to some of Amazing.Com’s records but can only use this data for
very specific purposes.
• Whilst Amazing.Com is the data controller, the call centre is the data processor.
• Amazing.Com will still be responsible for how Laura’s personal data is processed.
Associate Solicitor
Commercial
Richard Williams
rwilliams@hcrlaw.com
01905 744 865
07715 060 283
Worcester
General Data Protection Regulation – What’s
new?
Rob Cobley
“the biggest change to data protection law for a generation”
Elizabeth Denham, Information Commissioner
“This will impact every entity that holds or uses European
personal data both inside and outside of Europe”
“We have moved from an era of laissez-faire regulation of data in Europe
to having the most stringent data laws in the world,”
Stewart Room, Head of Cyber Security and Data Protection, PwC
Digby Jones
Lets get this out of the way
• Even after Brexit occurs, UK businesses offering
services to EU citizens will have to adopt the GDPR
Otherwise trade – via personal data flows – with
Europe is off the table.
• Processing data on an EU citizen WILL require
compliance. Whether or not that processing takes
place in Europe.
• GDPR will come into force on 25 May 2018, when
the UK WILL still be in the EU.
• The legislation will apply directly and so you will
automatically have to comply with the GDPR from
this date.
General Data Protection Regulations
• Replaces and strengthens the Data Protection Act
• Businesses that want to supply goods or services
to EU residents will need to comply whether they
are domiciled in Europe or elsewhere
• All businesses in scope unless they prove
otherwise
The GDPR: Key aspects of the
Regulations
• Increased fines - 4% of global turnover or €20,000,000
• Opt-in consent - Clear/Transparent no opt-out
• Breach notification - 72 hours to regulators, users “without delay”
• Material scope - Information caught wider (Biometric /location data/ IP)
• Territorial scope - All Member States / all organisations with data on
EU individuals. Inside or outside the EU.
• Removes ambiguity - 28 laws become one
• Data Subject Rights - Increase. DS in charge
• Joint liability - Data controllers and processors
• Certification - Use standards to demonstrate compliance
• Collective redress - Class action lawsuits from individuals
The 7 Privacy Principles
1
2
3
4
5
6
Processed lawfully, fairly and in a transparent manner
Collected for specified, explicit and legitimate purposes
Adequate, relevant and limited to what is necessary
Accurate and, where necessary kept up to date
Retained only for as long as necessary
Processed in an appropriate manner to maintain security
Accountability
Article 5 & 6: Lawfulness
• Your processing must be lawful – which means:
 Data subjects must give consent for you to process for agreed purposes
 Some specific circumstances where consent is not required
 So that controller can comply with legal obligations
 Legitimate interests
 Deliver against a contract with the data subject
• One month to respond to Subject Access Requests – & no charges
• Controllers and processors very clearly distinguished
 Clear identified obligations
 Controllers responsible for ensuring processors comply with contractual terms for
processing information
 Processors must operate under a legally binding contract
 And note issues around extra-territoriality
Articles 7 - 9: Consent
• Consent must be clear and affirmative
 Must be able to demonstrate that consent was given
 Silence or inactivity does not constitute consent
 Written consent must be clear, intelligible, easily
accessible, else not binding
 Consent can be withdrawn any time, and as easy to
withdraw consent as to give.
• Take appropriate measures to “provide information in a
concise, transparent, intelligible and easily accessible form,
using clear and plain language”
Articles 7 - 9: Consent
• Special conditions apply for children (under 14) to
give consent
– Appropriate parental / guardian consent
– Controller has to make reasonable efforts to
verify authorisation
• Explicit consent must be given for processing
sensitive personal data
 Race, ethnic origin, gender, etc
Articles 12-18: Transparency
• Controller must be transparent in providing information about itself and the purposes of the
processing
• Controller must provide data subject with information about their rights
• Specific provisions (Article 14) covering data not obtained directly from the data subject
• Rights to access, rectification, erasure (‘right to be forgotten’), to restriction of processing,
and data portability
• Any communications with a data subject must be concise,
transparent, intelligible
Article 25 : Privacy by Design
• Privacy must now be designed into data processing by default
• Data Privacy Impact Assessments mandatory (article 35)
– New technologies are deployed / change processing
– Nature, scope & context of the project demand it
– It can be used to address sets of processing & risks
– What are you doing and why and how you address GDPR
• Data audits
 GDPR applies to existing data, as well as future data
 Privacy may have to be designed retrospectively
 Organizations need to identify what PII they hold, where, on what grounds, and
how it is secured in a way that will meet the requirements of the GDPR
Article 32: Security of Personal Data
• A requirement for data controllers and data processors to
implement a level of security appropriate to the risk,
including:
 pseudonymization and encryption of personal data;
 ensure the ongoing confidentiality, integrity and
availability of systems;
 a process for regularly testing, assessing and evaluating
the effectiveness of security measures;
 security measures taken need to comply with the
concept of privacy by design
And when it goes wrong…
Areas of concern Failing on protection of data Failure of internal processes
Such things as • Not gaining consent or
outside of it
• Not upholding consumer
rights
• Moving data out of the EU
• Obligations under related
international laws
• No Data protection by design
• Not employing a DPO (if
appropriate)
• Not Keeping appropriate records
Fines 4% of annual GLOBAL turnover
or 20 m which ever the higher
2% of annual GLOBAL turnover or
10m which ever the higher
Article 33: Data Breaches – Expect to
have to notify a breach
• Mandatory data breach reporting – within 72 hours:
 Describe actions being taken to
 Address the breach
 Mitigate the consequences
 Data subjects contacted ‘without undue delay’
 Unnecessary if appropriate protection is already in place
 Consider encryption for all mobile devices, for all databases, and for
email
• Failure to report within 72 hours must be explained
 Speculation can run riot – be precise about what has happened and
scope.
 Have a defined communication plan + incident response team.
 Define responsibilities. Be proactive
Assume the worst
• First tweet – 11:13pm Saturday night – 5th November 2016
Date: October 2015
Type: DDoS and SQL Injection
Systems: Unpatched web & out of date database
Customer Accounts Stolen
Bank Account #s Stolen
Subscriptions Cancelled
Market share Drop
Stock Price Fall
Revenue Drop
Additional Costs (exceptional losses)
Regulator Fine
Politicians Inquiry
News Stories
Reputation Loss
Total Loss
Payment Method: Cash
Transactions: Ongoing
156,959
15,656
101,000-250,000
4.4%
11%
£80,000,000
£60,000,000
£400,000
1
56,100
?
… to be continued
Data Loss Receipt
One of a series of data loss incidents
NO RETURNS
Article 37: Data Protection Officer (DPO)
• DPO mandatory in organizations processing
substantial volumes of PII (article 37)
• Most staff dealing with PII (eg HR, marketing, etc) will
need at least basic training
• Staff awareness training also critical (accidental release
of PII could have financially damaging consequences)
Article 40: Certifications
• Requirement is to “apply appropriate technical and organizational measures to ensure
and to be able to demonstrate that the processing is performed in accordance with
the regulation”
• How can you demonstrate this?
 Codes of conduct and certifications may be used to demonstrate compliance with
GDPR
 Recognised international standards (eg ISO/IEC 27001)
 Recognised national management standards (eg BS 10012 – for a PIMS or Personal
Information Management System)
 Recognised national technical standards (eg Cyber Essentials in the UK)
 Emergence of new standards, privacy seals etc across EU
• Certification does not absolve controller of need to comply
First steps: Gain visibility
and identify solutions – Have a plan!
• Build a cross-functional team – risk, compliance, IT, legal and finance
• Gain visibility into today’s use
 Declare amnesty – ask for input
• Data Discovery – all PII stored on desktops, notebooks, servers, networks
• Automate – use data discovery tools to understand data flows
• Identify scale and close gaps – build a compliance plan and budget
• End point risk – use data discovery findings to strengthen internal processes and
educate staff on the best practice
• Determine that information flows to make a proper assessment of privacy risks
Mapping Information Flows
• A transfer of information from one location to another. For example:
 Inside and outside the European Union
 From suppliers and sub-suppliers through to customers
• When mapping information flows, identify the interaction points between the parties
involved
• Workflow inputs and outputs:
 How is personal data collected (e.g. form, online, call centre, other)?
 Who is accountable for personal data?
 What is the location of the systems/filing systems containing the data?
 Who has access to the information?
 Is the information disclosed/shared with anyone (e.g suppliers, third parties)?
 Does the system interface with, or transfer information to, other systems?
• NB: Cloud providers present their own challenges
Preparation
• Appoint a Data Protection Officer (DPO)
• Review controller/processor responsibilities
• P11 Data Discovery
<12 Months
• Data Flow Mapping (Internal/External processing)
• Contract Review
• Data Protection Impact Assessments
<25th May 2018
• Updated Technical & Organisational controls
• Data Breach Notification Readiness (<72 hrs)
• Right to Erasure, Portability, SAR, Consent etc.
GDPR
Strategy
Developing a GDPR Strategy –
moving towards compliance
• Assess current data protection practices – link organisational and technical controls
• Understand where personal data is held and how it is processed within the business
• Create information notices and implement appropriate data protection policies
• Implement technical and organisational controls
• Review requests for services and implement contracts with approved services
• Set minimum standards for security
• Implement policies to block/ allow/ warn users of risks
• Create consent mechanisms
• Carry out Data Protection Impact Assessments
• Adhere to approved codes of conduct or certification mechanisms
• Prepare to report personal data breaches
Partner
IP and Technology
Rob Cobley
rcobley@hcrlaw.com
01905 744 806
07791 894 955
Worcester
With thanks to IT Governance: https://www.itgovernance.co.uk/
Break
Getting Your business “GDPR Ready”
Peter Loomes
SIRA and GDPR Practitioner
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
2015 was the year of CYBER
2016 was the year of BREACH
2017 is the year of FINES
2018 will be the year of BIG FINES
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Why?
GDRP will come into law in 2018
How familiar are you with it?
I am unaware of it
I am aware but do not know the
implications for my business
I am aware and understand the
implications for my business
Do you think GDPR will affect your business?
Yes No Don't know
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
If you think GDPR will affect your business,
when will you start preparations for it?
We have already started within 3 months within the next 6 months
within the next 9 months Don't know
What resources have you committed to
implementing GDPR?
A dedicated team under the
supervision of a board executive
We have nominated a single person
in the organisation
There is no dedicated resource, the
activity is being shared
None
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Working days
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
So what do you need to do?
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
One step at a time
The ICO 12 step approach
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Know your data
• Why are you collecting it?
• Purposes
• How do you get it?
• Where do you store it?
• What do you do with it?
• How long do you keep it?
• Where do you send it?
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Privacy Notices
• Review your privacy notices
• Review how you present these
to data subjects
• Think about possible web
developments
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Consent
• How are you currently
obtaining consent – is it
compliant?
• What do you need to do?
• Web development?
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Individuals Rights
• Right to information
• Right to access
• Right to rectification
• Right to be forgotten
• Right to restriction of processing
• Right to notification
• Right to portability
• Right to object
• Right to appropriate decision making
• Right to information
• Right to access
• Right to rectification
• Right to be forgotten
• Right to restriction of processing
• Right to notification
• Right to portability
• Right to object
• Right to appropriate decision making
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Process People
Process Technology
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Personal data breaches
Where breach is likely to affect right
and freedoms of data subjects:
• Must be reported within 72 hours.
• Delays in notification need
justification.
There is a responsibility on the Processor
to notify data breaches to the Controller
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Data Protection Impact Assessment
• Assesses the risks to the data subject
• Mandatory
• Required:
• When implementing GDPR
• When implementing changes within
your organisation
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Data Protection Officer
• Do you need one?
• Three conditions where one
is mandated:
• Public authority
• Profiling data subjects
• Process special category data
(sensitive data)
• How will you employ one?
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
Small companies are not immune
Fined £55,000
2nd May 2017
not protecting their customer’s
data
Construction Materials on-line
Fined £40,000
19th April 2017
sending Spam Texts
Monevo A Barrister
Fined £1000
16th March 2017
Not protecting client
data
The Data Supply Company Ltd
Fined £20,000
2nd February 2017
Voluntary liquidation
28th March 2017
©Sandettie Limited all rights reservedwww.Sandettie.co.uk
And finally…
This is not about stopping you doing
business
This is about doing business better
Panel Discussion: Expected Impact of the
GDPR
Robert Capper, Rob Cobley, Peter Loomes,
Rachael King
BREAK
GDPR and Cybersecurity
Professor Richard Benham
Cyber Security Adviser
Professor Richard Benham
Voted 2017 Digital Champion for the South West
Nominated for UK Digital Leader of the Year
Cyber Security
Ensuring Business
is ready for the
21st Century
This report builds from an IoD survey research of almost a thousand business leaders.
consider cyber security to be very or quite important
do not have a formal cyber security strategy
95%
45%
do not who to contact or report an incident to if attacked40%
have no process to check the legitimacy of invoices27%
Clearer Guidance on GDPR
Encourage Directors to treat Cyber as a Business Risk
Incentives e.g tax relief on Insurance and Awareness Train
Further support from Government
An engaging, low cost and practical solution
Certificate / e-badge and a Cyber Citizen
Reassurance for staff, customers or suppliers
The leading UK Cyber Club with quality at its core
Supported by the Police
www.thecyberclub.org
@thecyberclubuk
Panel Discussion: Crisis Management
Robert Capper, Rob Cobley, Peter Loomes,
Professor Richard Benham
Questions on Crisis Management?
Round Table Discussion:
Practical Advice on the application of GDPR in your
Business
Thank You for attending

Contenu connexe

Tendances

GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
How to get started with being GDPR compliant
How to get started with being GDPR compliantHow to get started with being GDPR compliant
How to get started with being GDPR compliantSiddharth Ram Dinesh
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationJake DiMare
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranDr. Sami Zahran
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non expertsClaudio Bolla, CISM
 
12 steps to gdpr compliance unleashed
12 steps to gdpr compliance   unleashed12 steps to gdpr compliance   unleashed
12 steps to gdpr compliance unleashedChris Gilmour
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017Amarach Research
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 

Tendances (20)

GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
How to get started with being GDPR compliant
How to get started with being GDPR compliantHow to get started with being GDPR compliant
How to get started with being GDPR compliant
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami Zahran
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
12 steps to gdpr compliance unleashed
12 steps to gdpr compliance   unleashed12 steps to gdpr compliance   unleashed
12 steps to gdpr compliance unleashed
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 

Similaire à Get you and your business GDPR ready

GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedStewart Norriss
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
Webinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRWebinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRpanagenda
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life CycleJatin Kochhar
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsWSO2
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Protection des données et de la vie privée : nouvelles obligations pour les e...
Protection des données et de la vie privée : nouvelles obligations pour les e...Protection des données et de la vie privée : nouvelles obligations pour les e...
Protection des données et de la vie privée : nouvelles obligations pour les e...Forums financiers de Wallonie
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance Dovetail Software
 
Big data needs big protection
Big data needs big protectionBig data needs big protection
Big data needs big protectionNoel Hatch
 

Similaire à Get you and your business GDPR ready (20)

GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Data Protection GDPR Basics
Data Protection GDPR BasicsData Protection GDPR Basics
Data Protection GDPR Basics
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Webinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRWebinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPR
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
GDPR - Sink or Swim
GDPR - Sink or SwimGDPR - Sink or Swim
GDPR - Sink or Swim
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Protection des données et de la vie privée : nouvelles obligations pour les e...
Protection des données et de la vie privée : nouvelles obligations pour les e...Protection des données et de la vie privée : nouvelles obligations pour les e...
Protection des données et de la vie privée : nouvelles obligations pour les e...
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
Big data needs big protection
Big data needs big protectionBig data needs big protection
Big data needs big protection
 

Dernier

The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt2020000445musaib
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...PsychicRuben LoveSpells
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 

Dernier (20)

The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 

Get you and your business GDPR ready

  • 1. Get You And Your Business GDPR Ready Thursday 8th June
  • 2. Basics of Data Protection Richard Williams
  • 3. Data Protection – Key Principles and Definitions • Brief overview • What is data protection • Why is it important • The current regime • Key principles/definitions drawn upon during the day
  • 4. What is Data Protection and why is it relevant? • All businesses store and use data/information • Data: The “lifeblood” of a business – Improve products/services – Increase revenues – Gain a competitive edge • IT/Computer based storage = increased risk of data being misused/ending up in the wrong hands
  • 5. • Information might be “personal” in nature – It might be kept in relation to a business’ • Staff • Customers • Account holders • Suppliers – It might be kept when • Recruiting staff • Managing staff records • Marketing products/services to customers – It might include: • An individual’s name, address, contact details, employment history, medical conditions, convictions or credit history • Recording staff working hours • The giving of delivery information to a company
  • 6. • Data Protection Act 1998 (DPA) – Principal law currently regulating the use of personal data in the UK – Its aim is to protect the individuals whose personal data is being held – Set outs rules and practices to be followed when processing personal data – Creation of an independent supervisory body (Information Commissioner’s Office) to enforce rights/obligations under the Act
  • 7. Why is data protection important? • Consequences of non-compliance are severe – Heavy financial penalties: • ICO currently has power to fine up to £500,000 • Penalties under the new General Data Protection Regulation will reach an upper limit of: – €20million; or – 4% of annual global turnover
  • 8. – Reputation • One of an organisation’s most valuable assets • “It takes many good deeds to build a reputation and only one bad one to lose it” (Benjamin Franklin) • Social media/internet means news spreads quickly • Damage to image/brand = lost business • YouGov poll, commissioned by the ICO in January 2016 as to effect of data breach: – 20 per cent of people would definitely stop using a company’s services after hearing news of a data breach; – 57 per cent would consider stopping; – 8 per cent said the coverage would make no difference; and – 14 per cent said they didn’t know.
  • 9. Data Protection Act 1998 • Principal law currently regulating and protecting the use of personal information • Purpose of DPA: – To regulate the processing of personal data relating to living individuals (known as data subjects) who can be identified by that data or that data and other information which is in the possession of an entity (the data controller) who decides what that data will be used for. • The DPA achieves this by: – Imposing rules and obligations on the data controller • Data Protection Principles relating to how the personal data should be obtained and processed – Granting rights to the data subject
  • 10. What is personal data? • DPA only applies to the use of Personal Data • Two elements: “Data” and “Personal” • Data: – Defined by the DPA as information which: • “… is processed by equipment that operates automatically in response to instructions given for that purpose” (i.e. computer based records) • “… is recorded with the intention that it should be processed by means of such equipment” (i.e. paper based data if the intention is to put it on computer) • “… is recorded as part of a relevant filing system”
  • 11. – DPA definition of “relevant filing system” is not straightforward » “any set of information relating to individuals to the extent that… the set [of information] is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is readily accessible”. » ICO has offered guidance: • covers non-automated records relating to individuals • that are held in a sufficiently systematic and structured way • so as to allow ready access to specific information about those individuals
  • 12. • Personal: – Data is personal data if it is data relating to living individuals (data subjects) who can be identified: • From that data; or • From that data and other information in the possession of the data controller – For example: • A company holds customer data in an Excel spreadsheet. The records do not identify individuals by name but contain unique reference numbers which can be matched to another database that allows the company to identify the individuals concerned. The information on the Excel spreadsheet, even though it is just a set of reference numbers, is still classified as personal data.
  • 13. What is sensitive personal data? • Personal Data consisting of information as to the data subject’s: – Racial/ethnic origin – Political opinions – Religious beliefs/affiliations – Membership of a trade union – Physical/mental health – Sexual life – Offences/convictions • DPA requires sensitive personal data to be treated with greater care due to: – Potential for it to be used in a discriminatory manner – Private in nature • For the processing of sensitive personal data to be lawful and fair: – Individual must give his explicit consent – Consent must be positive (i.e. opt-in and not opt-out)
  • 14. What is processing? • DPA regulates the processing of personal data • “Processing” defined very widely • Includes: – Obtaining and collecting data – Recording data – Holding and retaining data – Carrying out any “operation or set of operations” on the data, including: • Organizing, adapting or altering the data; • Retrieving, consulting or using the data; • Disclosing the data by transmitting, disseminating or making it available; or • Aligning, combining, erasing or destroying the data • Treat it as covering pretty much anything you might do with that personal data!
  • 15. What is a data controller? • DPA places obligations only on the data controller • The person, company or firm that determines: – Purposes for which the personal data is to be processed; and – Manner in which the personal data is to be processed.
  • 16. What is a data processor? • The entity that processes the personal data on the data controller’s behalf. • This might be: – The data controller itself – A separate third-party engaged by the data controller – Data processors are not directly subject to the DPA (obligations placed only on the data controller) – If the data controller uses the services of data processor, it must have in place a written agreement with the data processor: • process personal data in accordance with the data controller’s instructions • maintain appropriate security measures in relation to the data
  • 17. To conclude • Take Laura Smith. • For any data relating to Laura to be personal data, it has to be capable of identifying her as a living individual. • On Monday morning, Laura phones up a company called Amazing.Com with a view to buying a new DVD player over the phone. • During the call, Laura gives just her name. That information alone is insufficient to identify her and to be personal data. • If, however, Laura had given her name, address and date of birth, that would be an example of personal data. • What Amazing.Com does with that data is known as data processing. • During the phone call, Laura decides against buying a new DVD player right then. • Instead, Laura goes onto Amazing.Com’s website a few days later with a view to buying the DVD player on-line. • Laura inputs and gives Amazing.Com various pieces of information about herself, including her credit card details. This is personal data. • Laura is the data subject as the data is about her. • Amazing.Com is the data controller as they decide how the data will be processed and what happens to it and will have to comply with the DPA. • Amazing.Com outsources its customer support to a third party call centre. • Some weeks later, Laura’s DVD player stops working so she calls Amazing.Com’s customer support line. • When Laura calls, the employees in the call centre have access to some of Amazing.Com’s records but can only use this data for very specific purposes. • Whilst Amazing.Com is the data controller, the call centre is the data processor. • Amazing.Com will still be responsible for how Laura’s personal data is processed.
  • 19. General Data Protection Regulation – What’s new? Rob Cobley
  • 20. “the biggest change to data protection law for a generation” Elizabeth Denham, Information Commissioner
  • 21. “This will impact every entity that holds or uses European personal data both inside and outside of Europe” “We have moved from an era of laissez-faire regulation of data in Europe to having the most stringent data laws in the world,” Stewart Room, Head of Cyber Security and Data Protection, PwC Digby Jones
  • 22. Lets get this out of the way • Even after Brexit occurs, UK businesses offering services to EU citizens will have to adopt the GDPR Otherwise trade – via personal data flows – with Europe is off the table. • Processing data on an EU citizen WILL require compliance. Whether or not that processing takes place in Europe. • GDPR will come into force on 25 May 2018, when the UK WILL still be in the EU. • The legislation will apply directly and so you will automatically have to comply with the GDPR from this date.
  • 23. General Data Protection Regulations • Replaces and strengthens the Data Protection Act • Businesses that want to supply goods or services to EU residents will need to comply whether they are domiciled in Europe or elsewhere • All businesses in scope unless they prove otherwise
  • 24. The GDPR: Key aspects of the Regulations • Increased fines - 4% of global turnover or €20,000,000 • Opt-in consent - Clear/Transparent no opt-out • Breach notification - 72 hours to regulators, users “without delay” • Material scope - Information caught wider (Biometric /location data/ IP) • Territorial scope - All Member States / all organisations with data on EU individuals. Inside or outside the EU. • Removes ambiguity - 28 laws become one • Data Subject Rights - Increase. DS in charge • Joint liability - Data controllers and processors • Certification - Use standards to demonstrate compliance • Collective redress - Class action lawsuits from individuals
  • 25. The 7 Privacy Principles 1 2 3 4 5 6 Processed lawfully, fairly and in a transparent manner Collected for specified, explicit and legitimate purposes Adequate, relevant and limited to what is necessary Accurate and, where necessary kept up to date Retained only for as long as necessary Processed in an appropriate manner to maintain security Accountability
  • 26. Article 5 & 6: Lawfulness • Your processing must be lawful – which means:  Data subjects must give consent for you to process for agreed purposes  Some specific circumstances where consent is not required  So that controller can comply with legal obligations  Legitimate interests  Deliver against a contract with the data subject • One month to respond to Subject Access Requests – & no charges • Controllers and processors very clearly distinguished  Clear identified obligations  Controllers responsible for ensuring processors comply with contractual terms for processing information  Processors must operate under a legally binding contract  And note issues around extra-territoriality
  • 27. Articles 7 - 9: Consent • Consent must be clear and affirmative  Must be able to demonstrate that consent was given  Silence or inactivity does not constitute consent  Written consent must be clear, intelligible, easily accessible, else not binding  Consent can be withdrawn any time, and as easy to withdraw consent as to give. • Take appropriate measures to “provide information in a concise, transparent, intelligible and easily accessible form, using clear and plain language”
  • 28. Articles 7 - 9: Consent • Special conditions apply for children (under 14) to give consent – Appropriate parental / guardian consent – Controller has to make reasonable efforts to verify authorisation • Explicit consent must be given for processing sensitive personal data  Race, ethnic origin, gender, etc
  • 29. Articles 12-18: Transparency • Controller must be transparent in providing information about itself and the purposes of the processing • Controller must provide data subject with information about their rights • Specific provisions (Article 14) covering data not obtained directly from the data subject • Rights to access, rectification, erasure (‘right to be forgotten’), to restriction of processing, and data portability • Any communications with a data subject must be concise, transparent, intelligible
  • 30. Article 25 : Privacy by Design • Privacy must now be designed into data processing by default • Data Privacy Impact Assessments mandatory (article 35) – New technologies are deployed / change processing – Nature, scope & context of the project demand it – It can be used to address sets of processing & risks – What are you doing and why and how you address GDPR • Data audits  GDPR applies to existing data, as well as future data  Privacy may have to be designed retrospectively  Organizations need to identify what PII they hold, where, on what grounds, and how it is secured in a way that will meet the requirements of the GDPR
  • 31. Article 32: Security of Personal Data • A requirement for data controllers and data processors to implement a level of security appropriate to the risk, including:  pseudonymization and encryption of personal data;  ensure the ongoing confidentiality, integrity and availability of systems;  a process for regularly testing, assessing and evaluating the effectiveness of security measures;  security measures taken need to comply with the concept of privacy by design
  • 32.
  • 33.
  • 34. And when it goes wrong… Areas of concern Failing on protection of data Failure of internal processes Such things as • Not gaining consent or outside of it • Not upholding consumer rights • Moving data out of the EU • Obligations under related international laws • No Data protection by design • Not employing a DPO (if appropriate) • Not Keeping appropriate records Fines 4% of annual GLOBAL turnover or 20 m which ever the higher 2% of annual GLOBAL turnover or 10m which ever the higher
  • 35. Article 33: Data Breaches – Expect to have to notify a breach • Mandatory data breach reporting – within 72 hours:  Describe actions being taken to  Address the breach  Mitigate the consequences  Data subjects contacted ‘without undue delay’  Unnecessary if appropriate protection is already in place  Consider encryption for all mobile devices, for all databases, and for email • Failure to report within 72 hours must be explained  Speculation can run riot – be precise about what has happened and scope.  Have a defined communication plan + incident response team.  Define responsibilities. Be proactive
  • 36. Assume the worst • First tweet – 11:13pm Saturday night – 5th November 2016
  • 37. Date: October 2015 Type: DDoS and SQL Injection Systems: Unpatched web & out of date database Customer Accounts Stolen Bank Account #s Stolen Subscriptions Cancelled Market share Drop Stock Price Fall Revenue Drop Additional Costs (exceptional losses) Regulator Fine Politicians Inquiry News Stories Reputation Loss Total Loss Payment Method: Cash Transactions: Ongoing 156,959 15,656 101,000-250,000 4.4% 11% £80,000,000 £60,000,000 £400,000 1 56,100 ? … to be continued Data Loss Receipt One of a series of data loss incidents NO RETURNS
  • 38. Article 37: Data Protection Officer (DPO) • DPO mandatory in organizations processing substantial volumes of PII (article 37) • Most staff dealing with PII (eg HR, marketing, etc) will need at least basic training • Staff awareness training also critical (accidental release of PII could have financially damaging consequences)
  • 39. Article 40: Certifications • Requirement is to “apply appropriate technical and organizational measures to ensure and to be able to demonstrate that the processing is performed in accordance with the regulation” • How can you demonstrate this?  Codes of conduct and certifications may be used to demonstrate compliance with GDPR  Recognised international standards (eg ISO/IEC 27001)  Recognised national management standards (eg BS 10012 – for a PIMS or Personal Information Management System)  Recognised national technical standards (eg Cyber Essentials in the UK)  Emergence of new standards, privacy seals etc across EU • Certification does not absolve controller of need to comply
  • 40. First steps: Gain visibility and identify solutions – Have a plan! • Build a cross-functional team – risk, compliance, IT, legal and finance • Gain visibility into today’s use  Declare amnesty – ask for input • Data Discovery – all PII stored on desktops, notebooks, servers, networks • Automate – use data discovery tools to understand data flows • Identify scale and close gaps – build a compliance plan and budget • End point risk – use data discovery findings to strengthen internal processes and educate staff on the best practice • Determine that information flows to make a proper assessment of privacy risks
  • 41. Mapping Information Flows • A transfer of information from one location to another. For example:  Inside and outside the European Union  From suppliers and sub-suppliers through to customers • When mapping information flows, identify the interaction points between the parties involved • Workflow inputs and outputs:  How is personal data collected (e.g. form, online, call centre, other)?  Who is accountable for personal data?  What is the location of the systems/filing systems containing the data?  Who has access to the information?  Is the information disclosed/shared with anyone (e.g suppliers, third parties)?  Does the system interface with, or transfer information to, other systems? • NB: Cloud providers present their own challenges
  • 42. Preparation • Appoint a Data Protection Officer (DPO) • Review controller/processor responsibilities • P11 Data Discovery <12 Months • Data Flow Mapping (Internal/External processing) • Contract Review • Data Protection Impact Assessments <25th May 2018 • Updated Technical & Organisational controls • Data Breach Notification Readiness (<72 hrs) • Right to Erasure, Portability, SAR, Consent etc. GDPR Strategy
  • 43. Developing a GDPR Strategy – moving towards compliance • Assess current data protection practices – link organisational and technical controls • Understand where personal data is held and how it is processed within the business • Create information notices and implement appropriate data protection policies • Implement technical and organisational controls • Review requests for services and implement contracts with approved services • Set minimum standards for security • Implement policies to block/ allow/ warn users of risks • Create consent mechanisms • Carry out Data Protection Impact Assessments • Adhere to approved codes of conduct or certification mechanisms • Prepare to report personal data breaches
  • 44. Partner IP and Technology Rob Cobley rcobley@hcrlaw.com 01905 744 806 07791 894 955 Worcester With thanks to IT Governance: https://www.itgovernance.co.uk/
  • 45. Break
  • 46. Getting Your business “GDPR Ready” Peter Loomes SIRA and GDPR Practitioner
  • 47. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk 2015 was the year of CYBER 2016 was the year of BREACH 2017 is the year of FINES 2018 will be the year of BIG FINES
  • 48. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Why? GDRP will come into law in 2018 How familiar are you with it? I am unaware of it I am aware but do not know the implications for my business I am aware and understand the implications for my business Do you think GDPR will affect your business? Yes No Don't know
  • 49. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk If you think GDPR will affect your business, when will you start preparations for it? We have already started within 3 months within the next 6 months within the next 9 months Don't know What resources have you committed to implementing GDPR? A dedicated team under the supervision of a board executive We have nominated a single person in the organisation There is no dedicated resource, the activity is being shared None
  • 50. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Working days
  • 51. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk So what do you need to do?
  • 52. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk One step at a time The ICO 12 step approach
  • 53. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk
  • 54. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Know your data • Why are you collecting it? • Purposes • How do you get it? • Where do you store it? • What do you do with it? • How long do you keep it? • Where do you send it?
  • 55. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Privacy Notices • Review your privacy notices • Review how you present these to data subjects • Think about possible web developments
  • 56. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Consent • How are you currently obtaining consent – is it compliant? • What do you need to do? • Web development?
  • 57. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Individuals Rights • Right to information • Right to access • Right to rectification • Right to be forgotten • Right to restriction of processing • Right to notification • Right to portability • Right to object • Right to appropriate decision making • Right to information • Right to access • Right to rectification • Right to be forgotten • Right to restriction of processing • Right to notification • Right to portability • Right to object • Right to appropriate decision making
  • 58. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Process People Process Technology
  • 59. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk
  • 60. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Personal data breaches Where breach is likely to affect right and freedoms of data subjects: • Must be reported within 72 hours. • Delays in notification need justification. There is a responsibility on the Processor to notify data breaches to the Controller
  • 61. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Data Protection Impact Assessment • Assesses the risks to the data subject • Mandatory • Required: • When implementing GDPR • When implementing changes within your organisation
  • 62. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Data Protection Officer • Do you need one? • Three conditions where one is mandated: • Public authority • Profiling data subjects • Process special category data (sensitive data) • How will you employ one?
  • 63. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk Small companies are not immune Fined £55,000 2nd May 2017 not protecting their customer’s data Construction Materials on-line Fined £40,000 19th April 2017 sending Spam Texts Monevo A Barrister Fined £1000 16th March 2017 Not protecting client data The Data Supply Company Ltd Fined £20,000 2nd February 2017 Voluntary liquidation 28th March 2017
  • 64. ©Sandettie Limited all rights reservedwww.Sandettie.co.uk And finally… This is not about stopping you doing business This is about doing business better
  • 65. Panel Discussion: Expected Impact of the GDPR Robert Capper, Rob Cobley, Peter Loomes, Rachael King
  • 66. BREAK
  • 67. GDPR and Cybersecurity Professor Richard Benham Cyber Security Adviser
  • 68.
  • 69. Professor Richard Benham Voted 2017 Digital Champion for the South West Nominated for UK Digital Leader of the Year
  • 70. Cyber Security Ensuring Business is ready for the 21st Century
  • 71. This report builds from an IoD survey research of almost a thousand business leaders. consider cyber security to be very or quite important do not have a formal cyber security strategy 95% 45% do not who to contact or report an incident to if attacked40% have no process to check the legitimacy of invoices27%
  • 72. Clearer Guidance on GDPR Encourage Directors to treat Cyber as a Business Risk Incentives e.g tax relief on Insurance and Awareness Train Further support from Government
  • 73.
  • 74. An engaging, low cost and practical solution Certificate / e-badge and a Cyber Citizen Reassurance for staff, customers or suppliers The leading UK Cyber Club with quality at its core Supported by the Police
  • 76. Panel Discussion: Crisis Management Robert Capper, Rob Cobley, Peter Loomes, Professor Richard Benham
  • 77. Questions on Crisis Management?
  • 78. Round Table Discussion: Practical Advice on the application of GDPR in your Business
  • 79. Thank You for attending

Notes de l'éditeur

  1. SLIDE BUILDS 2015 Cyber was everywhere. You couldn’t pick up a newspaper with reading something on Cyber CLICK 2016 we had breaches and loss of personal data CLICK 2017 we have seen unprecedented fines The Information Commissioner is starting to play hard ball. Keurboom Is the latest with £400k they have gone out of business. CLICK to cross out fines and get Ransomware – very relevant for GDPR because damage to data. CLICK 2018 the ICO fines structure increase and there could be some whoppers in the pipeline. The reason the ICO will have a greater fine structure is because of 4 letters
  2. SLIDE BUILDS Just talk around the slides
  3. Mentioned 25 times in the regulation Risk based approach to managing data Aligned closely with implementing a Information Security Management System
  4. Informed and unambiguous - Individuals must understand that they are giving consent and demonstrate that with a clear affirmative action Consent given freely – The individual has to be given a genuine choice. If an individual has to give consent to receive a service. This consent can only be required if a service can only be provided if that personal data is collected. As easy to withdraw as to give – whatever the method of giving consent is it has to be as easy to withdraw. So buried links are not acceptable. Consent is specific – consent will only be specific for those reasons specified. Unless you can prove that the consents to hold personal data conform to the points above, you will have to reconsent Consent will have to be reconfirmed under the new act. Subjects will need to understand what the data is going to be used for and will have to make a positive statement of consent. (TASK 1) Clear guidance was out for consultation by the ICO in March. Should be published soon. If you find it difficult to consent it is probably that this is the wrong lawful approach. The other lawful approaches are set out in Article 6(1): A contract with the individual: for example, to supply goods or services they have requested, or to fulfil your obligations under an employment contract. This also includes steps taken at their request before entering into a contract. Compliance with a legal obligation: if you are required by UK or EU law to process the data for a particular purpose, you can. Vital interests: you can process personal data if it’s necessary to protect someone’s life. This could be the life of the data subject or someone else. A public task: if you need to process personal data to carry out your official functions or a task in the public interest – and you have a legal basis for the processing under UK law – you can. If you are a UK public authority, our view is that this is likely to give you a lawful basis for many if not all of your activities. Legitimate interests: if you are a private-sector organisation, you can process personal data without consent if you have a genuine and legitimate reason (including commercial benefit), unless this is outweighed by harm to the individual’s rights and interests.
  5. SLIDE BUILDS CLICK TO SHOW THE CHANGES Right to information – on and access to personal information. The Data Controller must provide a minimum level of information to data subjects to prove their data is fairly collected and processed. This must be made available free of charge. Right to access – Data subjects have the right to access to: Copy of their personal data, the purposes of processing, categories of the data being processes and the third parties who have access or who have received will receive the data. Right to rectification - subject has the right to have any errors rectified and the data controller has to ensure this is done not only in the data they have, but any suppliers and recipients Right to be forgotten – data subjects can request data to be erased without undue delay. The Data Controller has few reasons not to comply and has to satisfy the data subject that data has been removed from all possible locations. Right to restrict processing – This gives data subjects the right to restrict processing of their data under certain circumstances. Right to notification – not a right that the data subject will exercise, but a responsibility of the data controller to inform the data subject of their data is changed or the processing of data is change. Also if the Subject invokes one of their rights the data controller has a responsibility to inform recipients of data of what the data subject has requested Right to Portability – the data controller has to be able provide the data subject or a person of the data subjects choosing data in a commonly used machine readable format The right to object – the data controller has top provide clear routes for the data subject to raise objections about the processing of personal. Once an objection is received the onus is onus is on the data controller to demonstrate the legitimacy of the processing. The right to appropriate decision making – Data subjects have the right “not to be subject decisions based solely on automated processing, including profiling, which produces legal affects concerning [them] of similarly significantly affects [them]. So data subjects must be able to trigger human intervention. All of these right are going to require the review of processes and technology. For example, can you ‘hand on heart’ say your organisation knows all the data it holds, where it all is and who it has been shared with. If I rocked up tomorrow and asked for all of my data could you provide it quickly and cheaply.
  6. ICO Jan 17th 2017 I would also recommend consideration of the government’s cyber essentials scheme to assist in identifying the actions you need to take. You can expect to see more guidance on this in the context of GDPR. The Government’s Cyber Essentials scheme should be a key focus for the Government in helping organisations put in place appropriate cyber security measures. The ICO’s practical guide to IT security for SMEs was updated in January 2016 to align with the Cyber Essentials scheme. The Government has also committed to build formal links between the Cyber Essentials scheme and any new privacy certification mechanism established under the GDPR
  7. So breaches only have to be reported where the business suspect that the rights and freedoms of the data subject could be compromised. Therefore loss of names would probably not need to be reported. Generally though if personal data is involved it is wiser to report and seek the guidance of the ICO. They will be far more sympathetic. Businesses also have a responsibility to report breached to the data subjects.
  8. This section expands on the DPIA as one of the mandated processes in the GDPR – we need to emphasise in this section that a DPIA should not be conducted in isolation to the organisations other risks. Is should be integral and reference them
  9. In 2016 the ICO issued just over £1m in fines. In April 2017 the ICO issued just over £800k in fines May 2017 the ICO issued Just over £900k in fines