SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Data Flow Mapping and the
EU GDPR
Tony Drewitt
Head of Consultancy
IT Governance Ltd
6th April 2017
www.itgovernance.co.uk
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Introduction - Tony Drewitt
• Head of Consultancy (GRC)
– Information security
– Business continuity
– Corporate governance
– Risk management
– Instrumental in launching the IT Governance GDPR service suite
2
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
IT Governance Ltd: GRC one-stop shop
All verticals, all sectors, all organisational sizes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Agenda
• An overview of the regulatory landscape
• Territorial scope
• Remedies, liabilities and penalties
• Risk management and the GDPR
• Legal requirements for a DPIA
• Why and how to conduct a data flow mapping exercise
• What are the challenges
• What is an information flow
• The questions to ask
• Data flow mapping techniques
4
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
The nature of European law
• Two main types of legislation:
– Directives
º Require individual implementation in each member state
º Implemented by the creation of national laws approved by the parliaments of
each member state
º European Directive 95/46/EC is a directive
º UK Data Protection Act 1998
– Regulations
º Immediately applicable in each member state
º Require no local implementing legislation
º The EU GDPR is a regulation
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Article 99: Entry into force and
application
This Regulation shall be binding in its entirety and directly
applicable in all member states.
KEY DATES
• On 8 April 2016 the Council adopted the Regulation.
• On 14 April 2016 the Regulation was adopted by the European Parliament.
• On 4 May 2016 the official text of the Regulation was published in the EU Official
Journal in all the official languages.
• The Regulation entered into force on 24 May 2016 and will apply from 25 May
2018.
• http://ec.europa.eu/justice/data-protection/reform/index_en.htm
Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST-
5419-2016-REV-1/en/pdf
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
GDPR
The GDPR has eleven chapters:
1
• Chapter I – General Provisions: Articles 1 - 4
2
• Chapter II – Principles: Articles 5 - 11
3
• Chapter III – Rights of the Data Subject: Articles 12 - 23
4
• Chapter IV – Controller and Processor: Articles 24 - 43
5
• Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50
6
• Chapter VI – Independent Supervisory Authorities: Articles 51 - 59
7
• Chapter VII – Cooperation and Consistency: Articles 60 - 76
8
• Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84
9
• Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
Data protection model
under the GDPR
Information Commissioner’s Office (ICO)
(supervising authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Articles 1 – 3: Who and where?
• Natural person = a living individual
• Natural persons have rights associated with:
– The protection of personal data.
– The protection of the processing personal data.
– The unrestricted movement of personal data within the EU.
• In material scope:
– Personal data that is processed wholly or partly by automated means.
– Personal data that is part of a filing system, or intended to be.
• The Regulation applies to controllers and processors in the EU
irrespective of where processing takes place.
• The Regulation also applies to controllers not in the EU.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Remedies, liabilities and penalties
• Article 79: Right to an effective judicial remedy against a
controller or processor
– Judicial remedy where their rights have been infringed as a result of the
processing of personal data.
º In the courts of the member state where the controller or processor has an establishment.
º In the courts of the member state where the data subject habitually resides.
• Article 82: Right to compensation and liability
– Any person who has suffered material or non-material damage shall have the
right to receive compensation from the controller or processor.
– A controller involved in processing shall be liable for damage caused by
processing.
• Article 83: General conditions for imposing administrative fines
– Imposition of administrative fines will in each case be effective, proportionate,
and dissuasive.
º Fines shall take into account technical and organisational measures implemented.
– €20,000,000 or, in case of an undertaking, 4% of total worldwide annual
turnover in the preceding financial year (whichever is higher).
Module I
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €10,000,000 or, in case of an undertaking, 2% of total worldwide annual
turnover in the preceding financial year (whichever is greater).
• Articles:
– 8: Child’s consent
– 11: Processing not requiring identification
– 25: Data protection by design and by default
– 26: Joint controllers
– 27: Representatives of controllers not established in EU
– 26 - 29 & 30: Processing
– 31: Cooperation with the supervisory authority
– 32: Data security
– 33: Notification of breaches to supervisory authority
– 34: Communication of breaches to data subjects
– 35: Data protection impact assessment
– 36: Prior consultation
– 37 - 39: DPOs
– 41(4): Monitoring approved codes of conduct
– 42: Certification
– 43: Certification bodies
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €20,000,000 or, in case of an undertaking, 4% total worldwide
annual turnover in the preceding financial year (whichever is higher).
• Articles
– 5: Principles relating to the processing of personal data
– 6: Lawfulness of processing
– 7: Conditions for consent
– 9: Processing special categories of personal data (i.e. sensitive personal data)
– 12 - 22: Data subject rights to information, access, rectification, erasure,
restriction of processing, data portability, object, profiling
– 44 - 49: Transfers to third countries
– 58(1): Requirement to provide access to supervisory authority
– 58(2): Orders/limitations on processing or the suspension of data flows
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Riskmanagement and the GDPR
RISK is mentioned over
60
times in the Regulation.
It is important to understand privacy risk and integrate it into your risk framework.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
What is risk?
• The effect of uncertainty on objectives (ISO 31000 etc.)
• Risk is the combination of the probability of an event (IRM)
• A situation involving exposure to danger (OED)
• Uncertainty of outcome, within a range of exposure, arising from a
combination of the impact and the probability of events (Orange
Book HM Treasury)
• The uncertainty of an event occurring that could have an impact on
the achievement of objectives (Institute of Internal Auditors)
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Standards and codes
• ISO 31000, Risk management – Principles and guidelines
– AS/NZS 4360:2004 now replaced by ISO 31000
• ISO 31010, Risk management – Risk assessment techniques
• IRM/ALARM/AIRMIC – A risk management standard
• UK Combined code on UK Corporate Governance code
• OECD, Principles of corporate governance
• COSO, Enterprise risk management – Integrated framework
• Sector specific, e.g. clinical, food
• Discipline specific, e.g. ISO 27005
• ISO 22301, Business continuity management
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
ISO 31000: Risk management
• Management framework approach
• PDCA model modified in ISO 27005
• Generic (all risks)
• Very similar to a management system
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Risk assessment
Risk management process
Establishing the context
Risk identification
Risk analysis
Risk evaluation
Risk treatment
Communication
and
consultation
Monitoring
and
review
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Enterprise risk management
• Capabilities:
– Aligning risk appetite and strategy
– Enhancing risk response decisions
– Reducing operational surprises and losses
– Identifying and managing multiple and cross-enterprise risks
– Seizing opportunities
– Improving deployment of capital
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Risk management - Organisational risk
"landscape"
• Strategic
– Business performance
– Financial performance
– Reputation
• Operational
– Output capacity
– Demand response
– Interruption and disruption
• Statutory
– Data protection Law
– Employment law
– Health & safety law
– Company law
• Regulatory
– Industry/sector specific
compliance requirements
– Licence to operate
• Contractual
– SLA targets/levels
– Product/service availability
– Quality/warranty
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Information security
• “…should be processed in a manner that ensures appropriate security
and confidentiality”
• ‘Appropriate safeguards’ mentioned 36 times
• Preservation of confidentiality, integrity and availability of information
and the assets and processes that support and enable its acquisition,
storage, use, protection and disposal.
• Wide variety of assets:
– information
– ICT
– infrastrucure
• Prevent compromise (loss, disclosure, corruption, etc.).
• Includes IT security and other forms of security:
– physical
– HR
– supply
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Legal requirements for a DPIA
Article 35: Data protection impact assessment
• DPIA must be performed where:
– New technologies are deployed
– Nature, scope & context of the project demand it
– Processes are likely to result in a high risk to the rights and freedom
– It can be used to address sets of processing & risks
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Legal requirements for a DPIA
• The DPIA will set out as a minimum:
– a description of the processing and purposes;
– legitimate interests pursued by the controller;
– an assessment of the necessity and proportionality of the processing;
– an assessment of the risks to the rights and freedoms of data subjects;
– the measures envisaged to address the risks;
– all safeguards & security measures to demonstrate compliance;
– indications of timeframes if processing relates to erasure;
– an indication of any data protection by design and default measures;
– list of recipients of personal data;
– compliance with approved codes of conduct;
– whether data subjects have been consulted.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Linking the DPIA to the privacy principles
1
• Processed lawfully, fairly and in a transparent manner
2
• Collected for specified, explicit and legitimate purposes
3
• Adequate, relevant and limited to what is necessary
4
• Accurate and, where necessary, kept up to date
5
• Retained only for as long as necessary
6
• Processed in an appropriate manner to maintain security
Accountability
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
How to conduct a data mapping exercise
• The ICO staged approach to an effective DPIA:
1. Required when there is a change in processing of personally identifiable
information (PII).
2. Determine the information flows throughout the organisation in order to
make a proper assessment of the privacy risks.
3. Identify the risks related to privacy and processing, including the necessity and
proportionality of the change in processing.
4. Identify possible privacy solutions to address the risks that have been identified.
5. Assess how the data protection principles have been applied throughout the
organisation.
6. Sign-off and record the DPIA, including details of which privacy solutions are too
be implemented.
7. Integrate the result of the DPIA back into the project plan.
8. Conduct a post-implementation review where risk profile of PII data has
changed.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data mapping – what are the
challenges?
Identify
personal
data
Identify
appropriate
technical and
organisational
safeguards
Understand
legal &
regulatory
obligations
Trust and
confidence
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
What is an information flow?
A transfer of information from one location to another. For example:
– Inside and outside the European Union.
– From suppliers and sub-suppliers through to customers.
When mapping information flow, you should identify the interaction
points between the parties involved.
NB: Cloud providers present their own challenges.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Describing information flows
Consider the potential future uses
of the information collected, even if it is not
immediately necessary.
Ensure the people who will be using
the information are consulted on the
practical implications.
Walk through the information
lifecycle to
identify unforeseen or unintended
uses of the data.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Information flow – identify the key
elements
Data items
Name, email, address Health data, criminal
records
Biometrics, location data
Formats
Hardcopy (paper records) Digital (USB) Database
Transfer methods
Post, telephone, social
media
Internal (within group) External (data sharing)
Locations
Offices Cloud Third parties
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow mapping – questions to ask
• Workflow inputs and outputs:
– How is personal data collected (e.g. form, online, call centre, other)?
– Who is accountable for personal data?
– What is the location of the systems/filing systems containing the data?
– Who has access to the information?
– Is the information disclosed/shared with anyone (e.g suppliers, third parties)?
– Does the system interface with, or transfer information to, other systems?
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow mapping – techniques
• Inspect existing documents
• Facilitation workshops
• Questionnaires
• Observation
• Whiteboard – freeform diagrams
• Template drawings (Visio, mind map tools)
• Post-it notes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow mapping
Chapter 9 of The Object Primer 3rd Edition: Agile Model Driven Development with UML 2
Identify:
Data Items
Data Formats
Transfer methods
Locations
Whiteboard – freeform diagrams
Template drawings (Visio, Mind map tools)
Post-it notes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Data flow map – data protection by
design
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
IT Governance: GDPR one-stop shop
• Accredited training, one-day foundation course:
– London OR Cambridge: www.itgovernance.co.uk/shop/p-1795-certified-eu-
general-data-protection-regulation-foundation-gdpr-training-course.aspx
– ONLINE: www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data-
protection-regulation-foundation-gdpr-online-training-course.aspx
• Practitioner course, classroom or online:
– www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection-
regulation-practitioner-gdpr-training-course.aspx
• Pocket guide: www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx
• Documentation toolkit: www.itgovernance.co.uk/shop/p-1796-eu-general-data-
protection-regulation-gdpr-documentation-toolkit.aspx
• Consultancy support :
– Data audit
– Transition/implementation consultancy
– www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
• GDPR Staff Awareness e-learning course:
– www.itgovernance.co.uk/shop/product/gdpr-staff-awareness-e-learning-course
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.1
Questions?
aross@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

Contenu connexe

Tendances

General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Complianceaccenture
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRCharlie Pownall
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure ComplianceAIIM International
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyControlCase
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 

Tendances (20)

General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
Iso 27001
Iso 27001Iso 27001
Iso 27001
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 

Similaire à Data Flow Mapping and the EU GDPR

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...Alan McSweeney
 

Similaire à Data Flow Mapping and the EU GDPR (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
 

Plus de IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

Plus de IT Governance Ltd (14)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Dernier

Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 

Dernier (20)

Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 

Data Flow Mapping and the EU GDPR

  • 1. Data Flow Mapping and the EU GDPR Tony Drewitt Head of Consultancy IT Governance Ltd 6th April 2017 www.itgovernance.co.uk
  • 2. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Introduction - Tony Drewitt • Head of Consultancy (GRC) – Information security – Business continuity – Corporate governance – Risk management – Instrumental in launching the IT Governance GDPR service suite 2
  • 3. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 IT Governance Ltd: GRC one-stop shop All verticals, all sectors, all organisational sizes
  • 4. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Agenda • An overview of the regulatory landscape • Territorial scope • Remedies, liabilities and penalties • Risk management and the GDPR • Legal requirements for a DPIA • Why and how to conduct a data flow mapping exercise • What are the challenges • What is an information flow • The questions to ask • Data flow mapping techniques 4
  • 5. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 The nature of European law • Two main types of legislation: – Directives º Require individual implementation in each member state º Implemented by the creation of national laws approved by the parliaments of each member state º European Directive 95/46/EC is a directive º UK Data Protection Act 1998 – Regulations º Immediately applicable in each member state º Require no local implementing legislation º The EU GDPR is a regulation
  • 6. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Article 99: Entry into force and application This Regulation shall be binding in its entirety and directly applicable in all member states. KEY DATES • On 8 April 2016 the Council adopted the Regulation. • On 14 April 2016 the Regulation was adopted by the European Parliament. • On 4 May 2016 the official text of the Regulation was published in the EU Official Journal in all the official languages. • The Regulation entered into force on 24 May 2016 and will apply from 25 May 2018. • http://ec.europa.eu/justice/data-protection/reform/index_en.htm Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST- 5419-2016-REV-1/en/pdf
  • 7. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 GDPR The GDPR has eleven chapters: 1 • Chapter I – General Provisions: Articles 1 - 4 2 • Chapter II – Principles: Articles 5 - 11 3 • Chapter III – Rights of the Data Subject: Articles 12 - 23 4 • Chapter IV – Controller and Processor: Articles 24 - 43 5 • Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50 6 • Chapter VI – Independent Supervisory Authorities: Articles 51 - 59 7 • Chapter VII – Cooperation and Consistency: Articles 60 - 76 8 • Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84 9 • Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
  • 8. Data protection model under the GDPR Information Commissioner’s Office (ICO) (supervising authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board
  • 9. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Articles 1 – 3: Who and where? • Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data. – The protection of the processing personal data. – The unrestricted movement of personal data within the EU. • In material scope: – Personal data that is processed wholly or partly by automated means. – Personal data that is part of a filing system, or intended to be. • The Regulation applies to controllers and processors in the EU irrespective of where processing takes place. • The Regulation also applies to controllers not in the EU.
  • 10. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Remedies, liabilities and penalties • Article 79: Right to an effective judicial remedy against a controller or processor – Judicial remedy where their rights have been infringed as a result of the processing of personal data. º In the courts of the member state where the controller or processor has an establishment. º In the courts of the member state where the data subject habitually resides. • Article 82: Right to compensation and liability – Any person who has suffered material or non-material damage shall have the right to receive compensation from the controller or processor. – A controller involved in processing shall be liable for damage caused by processing. • Article 83: General conditions for imposing administrative fines – Imposition of administrative fines will in each case be effective, proportionate, and dissuasive. º Fines shall take into account technical and organisational measures implemented. – €20,000,000 or, in case of an undertaking, 4% of total worldwide annual turnover in the preceding financial year (whichever is higher). Module I
  • 11. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €10,000,000 or, in case of an undertaking, 2% of total worldwide annual turnover in the preceding financial year (whichever is greater). • Articles: – 8: Child’s consent – 11: Processing not requiring identification – 25: Data protection by design and by default – 26: Joint controllers – 27: Representatives of controllers not established in EU – 26 - 29 & 30: Processing – 31: Cooperation with the supervisory authority – 32: Data security – 33: Notification of breaches to supervisory authority – 34: Communication of breaches to data subjects – 35: Data protection impact assessment – 36: Prior consultation – 37 - 39: DPOs – 41(4): Monitoring approved codes of conduct – 42: Certification – 43: Certification bodies
  • 12. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €20,000,000 or, in case of an undertaking, 4% total worldwide annual turnover in the preceding financial year (whichever is higher). • Articles – 5: Principles relating to the processing of personal data – 6: Lawfulness of processing – 7: Conditions for consent – 9: Processing special categories of personal data (i.e. sensitive personal data) – 12 - 22: Data subject rights to information, access, rectification, erasure, restriction of processing, data portability, object, profiling – 44 - 49: Transfers to third countries – 58(1): Requirement to provide access to supervisory authority – 58(2): Orders/limitations on processing or the suspension of data flows
  • 13. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Riskmanagement and the GDPR RISK is mentioned over 60 times in the Regulation. It is important to understand privacy risk and integrate it into your risk framework.
  • 14. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 What is risk? • The effect of uncertainty on objectives (ISO 31000 etc.) • Risk is the combination of the probability of an event (IRM) • A situation involving exposure to danger (OED) • Uncertainty of outcome, within a range of exposure, arising from a combination of the impact and the probability of events (Orange Book HM Treasury) • The uncertainty of an event occurring that could have an impact on the achievement of objectives (Institute of Internal Auditors)
  • 15. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Standards and codes • ISO 31000, Risk management – Principles and guidelines – AS/NZS 4360:2004 now replaced by ISO 31000 • ISO 31010, Risk management – Risk assessment techniques • IRM/ALARM/AIRMIC – A risk management standard • UK Combined code on UK Corporate Governance code • OECD, Principles of corporate governance • COSO, Enterprise risk management – Integrated framework • Sector specific, e.g. clinical, food • Discipline specific, e.g. ISO 27005 • ISO 22301, Business continuity management
  • 16. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 ISO 31000: Risk management • Management framework approach • PDCA model modified in ISO 27005 • Generic (all risks) • Very similar to a management system
  • 17. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Risk assessment Risk management process Establishing the context Risk identification Risk analysis Risk evaluation Risk treatment Communication and consultation Monitoring and review
  • 18. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Enterprise risk management • Capabilities: – Aligning risk appetite and strategy – Enhancing risk response decisions – Reducing operational surprises and losses – Identifying and managing multiple and cross-enterprise risks – Seizing opportunities – Improving deployment of capital
  • 19. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Risk management - Organisational risk "landscape" • Strategic – Business performance – Financial performance – Reputation • Operational – Output capacity – Demand response – Interruption and disruption • Statutory – Data protection Law – Employment law – Health & safety law – Company law • Regulatory – Industry/sector specific compliance requirements – Licence to operate • Contractual – SLA targets/levels – Product/service availability – Quality/warranty
  • 20. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Information security • “…should be processed in a manner that ensures appropriate security and confidentiality” • ‘Appropriate safeguards’ mentioned 36 times • Preservation of confidentiality, integrity and availability of information and the assets and processes that support and enable its acquisition, storage, use, protection and disposal. • Wide variety of assets: – information – ICT – infrastrucure • Prevent compromise (loss, disclosure, corruption, etc.). • Includes IT security and other forms of security: – physical – HR – supply
  • 21. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Legal requirements for a DPIA Article 35: Data protection impact assessment • DPIA must be performed where: – New technologies are deployed – Nature, scope & context of the project demand it – Processes are likely to result in a high risk to the rights and freedom – It can be used to address sets of processing & risks
  • 22. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Legal requirements for a DPIA • The DPIA will set out as a minimum: – a description of the processing and purposes; – legitimate interests pursued by the controller; – an assessment of the necessity and proportionality of the processing; – an assessment of the risks to the rights and freedoms of data subjects; – the measures envisaged to address the risks; – all safeguards & security measures to demonstrate compliance; – indications of timeframes if processing relates to erasure; – an indication of any data protection by design and default measures; – list of recipients of personal data; – compliance with approved codes of conduct; – whether data subjects have been consulted.
  • 23. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Linking the DPIA to the privacy principles 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary, kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security Accountability
  • 24. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 How to conduct a data mapping exercise • The ICO staged approach to an effective DPIA: 1. Required when there is a change in processing of personally identifiable information (PII). 2. Determine the information flows throughout the organisation in order to make a proper assessment of the privacy risks. 3. Identify the risks related to privacy and processing, including the necessity and proportionality of the change in processing. 4. Identify possible privacy solutions to address the risks that have been identified. 5. Assess how the data protection principles have been applied throughout the organisation. 6. Sign-off and record the DPIA, including details of which privacy solutions are too be implemented. 7. Integrate the result of the DPIA back into the project plan. 8. Conduct a post-implementation review where risk profile of PII data has changed.
  • 25. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data mapping – what are the challenges? Identify personal data Identify appropriate technical and organisational safeguards Understand legal & regulatory obligations Trust and confidence
  • 26. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 What is an information flow? A transfer of information from one location to another. For example: – Inside and outside the European Union. – From suppliers and sub-suppliers through to customers. When mapping information flow, you should identify the interaction points between the parties involved. NB: Cloud providers present their own challenges.
  • 27. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Describing information flows Consider the potential future uses of the information collected, even if it is not immediately necessary. Ensure the people who will be using the information are consulted on the practical implications. Walk through the information lifecycle to identify unforeseen or unintended uses of the data.
  • 28. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Information flow – identify the key elements Data items Name, email, address Health data, criminal records Biometrics, location data Formats Hardcopy (paper records) Digital (USB) Database Transfer methods Post, telephone, social media Internal (within group) External (data sharing) Locations Offices Cloud Third parties
  • 29. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow mapping – questions to ask • Workflow inputs and outputs: – How is personal data collected (e.g. form, online, call centre, other)? – Who is accountable for personal data? – What is the location of the systems/filing systems containing the data? – Who has access to the information? – Is the information disclosed/shared with anyone (e.g suppliers, third parties)? – Does the system interface with, or transfer information to, other systems?
  • 30. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow mapping – techniques • Inspect existing documents • Facilitation workshops • Questionnaires • Observation • Whiteboard – freeform diagrams • Template drawings (Visio, mind map tools) • Post-it notes
  • 31. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow mapping Chapter 9 of The Object Primer 3rd Edition: Agile Model Driven Development with UML 2 Identify: Data Items Data Formats Transfer methods Locations Whiteboard – freeform diagrams Template drawings (Visio, Mind map tools) Post-it notes
  • 32. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Data flow map – data protection by design
  • 33. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 IT Governance: GDPR one-stop shop • Accredited training, one-day foundation course: – London OR Cambridge: www.itgovernance.co.uk/shop/p-1795-certified-eu- general-data-protection-regulation-foundation-gdpr-training-course.aspx – ONLINE: www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data- protection-regulation-foundation-gdpr-online-training-course.aspx • Practitioner course, classroom or online: – www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection- regulation-practitioner-gdpr-training-course.aspx • Pocket guide: www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx • Documentation toolkit: www.itgovernance.co.uk/shop/p-1796-eu-general-data- protection-regulation-gdpr-documentation-toolkit.aspx • Consultancy support : – Data audit – Transition/implementation consultancy – www.itgovernance.co.uk/dpa-compliance-consultancy.aspx • GDPR Staff Awareness e-learning course: – www.itgovernance.co.uk/shop/product/gdpr-staff-awareness-e-learning-course
  • 34. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.1 Questions? aross@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk