SlideShare a Scribd company logo
1 of 25
Download to read offline
GDPR:
Requirements for Cloud Providers
Alan Calder
Founder & Executive Chair
IT Governance Ltd
February 2017
www.itgovernance.co.uk
Introduction
• Alan Calder
• Founder – IT Governance Ltd
• The single source for everything to do with IT governance, cyber risk
management and IT compliance
• IT Governance: An International Guide to Data Security and ISO 27001/ISO
27002, 6th Edition (Open University textbook)
• www.itgovernance.co.uk
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
IT Governance Ltd: GRC One-stop shop
All verticals, all sectors, all organisational sizes
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
We will cover:
• The GDPR and what it means for Cloud service providers.
• The rights of data subjects
• The policies and procedures required by the GDPR.
• The ‘privacy by design’ and ‘privacy by default’ requirements.
• .Breach notification obligations.
• The impact of subcontracting on Cloud service providers.
• The technical and organisational measures applicable to Cloud
service providers
• ISO 27018 and implementing security controls for PII in the Cloud
• Introducing: Network and Information Security Directive
4
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
GDPR: Top Ten Aspects of the
Regulation
• Increased fines -
• Opt-in/opt-out -
• Breach notification -
• Territorial Scope -
• Joint Liability -
• Data Subject Rights -
• Level playing field -
• Data transfer -
• Common enforcement -
• Collective redress -
4% of global turnover or €20,000,000
Clear, pro-active, use data only as agreed, easy opt-out
72 hours to regulators, users ”without delay”
Global: all organizations with data on EU individuals
Data Controllers & Processors
The users are in charge
Regulation, 28 laws becoming one
Data keeps privacy rights as it moves globally
Authorities will be strict
Class action lawsuits from individuals
Administrative penalties to be “effective, proportionate and dissuasive.”
Effective across EU from 25 May 2018
Copyright Skyhigh Networks 2017 – v1.0
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Data protection model
under GDPR
Information Commissioner’s Office (ICO)
(supervisory authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
Complaints
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
GDPR: Controllers or processors outside
the EU
Article 27: Representatives of controllers or processors not
established in the Union
• Where the controller or the processor are not established in the
Union:
– They shall designate in writing a representative in the Union;
– Representative shall be established where data processing or profiling resides;
– The representative shall be mandated to be addressed by supervisory authorities
and data subjects for the purposes of the Regulation;
– Designation of representative does not absolve controller or processor from
legal liabilities.
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Rights of Data Subjects
• The controller shall take appropriate measures to provide any
information … relating to processing to the data subject in a concise,
transparent, intelligible and easily accessible form, using clear and plain
language (Article 11-1)
• The controller shall facilitate the exercise of data subject rights (Article
11-2)
– Rights to
º Consent
º Access
º Rectification
º Erasure
º Restriction
º Objection
– the right to data portability;
– the right to withdraw consent at any time;
– the right to lodge a complaint with a supervisory authority;
– The right to be informed of the existence of automated decision-making, including
profiling, as well as the anticipated consequences for the data subject.
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Article 5 & 6: Lawfulness
• Processing must be lawful – which means, inter alia:
– Data subject must give consent for specific purposes
– Other specific circumstances where consent is not required
º So that controller can comply with legal obligations etc
• One month to respond to Subject Access Requests – & no charges
• Controllers and processors clearly distinguished
– Clearly identified obligations
– Controllers responsible for ensuring processors comply with contractual terms for
processing information
– Processors must operate under a legally binding contract
º And note issues around extra-territoriality
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Articles 7 - 9: Consent
• Consent must be clear and affirmative
– Must be able to demonstrate that consent was given
– Silence or inactivity does not constitute consent
– Written consent must be clear, intelligible, easily accessible, else not binding;
– Consent can be withdrawn any time, and as easy to withdraw consent as give it;
• Special conditions apply for child (under 16) to give consent
• Explicit consent must be given for processing sensitive personal
data
– Race, ethnic origin, gender, etc
– Specific circumstances allow non-consensual processing eg to protect vital
interests of the data subject
• Secure against accidental loss, destruction or damage (article 5)
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
GDPR: Cloud processor obligations
Policy and procedure requirements
Article 28: Processor
A legal contract must ensure that the processor:
• processes the personal data only on documented instructions from the
controller;
• ensures that persons authorised to process the personal data observe
confidentiality;
• takes appropriate security measures;
• respects the conditions for engaging another processor;
• assists the controller by appropriate technical and organisational
measures;
• assists the controller in ensuring compliance with the obligations to
security of processing;
• deletes or returns all the personal data to the controller after the end of
the provision of services;
• makes available to the controller all information necessary to
demonstrate compliance with the Regulation.
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
NIS: Network & Information Security
Directive
• In place from May 2018
• Improve national cyber security capabilities, improve EU co-operation
• Operators of essential services:
– Energy (electricity, oil and gas)
– Transport (air, rail, water and road)
– Banking (credit institutions)
– Financial market infrastructures (trading venues and central counterparties)
– Health (healthcare providers)
– Water (drinking water suppliers and distributors)
• Digital service providers:
– Search engines
– Online marketplaces
– Cloud computing services
• Take appropriate security measures and notify the relevant national
authorities of serious incidents
• Non-EU entities:
– Designate a representative in one of the member states in which they offer their
services,
– Fall under the jurisdiction of that member state.
• Administrative penalties to be “effective, proportionate and dissuasive.”
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
NIS: Key Requirements
• Must notify serious incidents to the relevant national
authority;
• Take appropriate security measures, such as:
– Technical and organisational measures that are appropriate and
proportionate to identified risks.
– Measures that ensure a level of network and information systems
security appropriate to identified risks.
– Measures that prevent and minimise the impact of incidents on the IT
systems used to provide the services,
– with a view to ensuring the continuity of those services
– Must also have the “information necessary to assess the security of the
network and information systems”, including
º documented security policies,
º evidence of effective implementation
- eg the results of a security audit carried out by the competent authority or a
qualified auditor.
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
What Apps & Cloud Services are we using?
Copyright Skyhigh Networks 2017 – v1.0
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Article 44: International Transfers
• Any transfer of personal data by controller or processor shall take
place only if certain conditions are complied with:
– Transfers on the basis of adequacy;
– Transfers subject to the appropriate safeguards
– Binding corporate rules apply.
• All provisions shall be applied to ensure the protection of natural
persons is not undermined.
• To countries with similar data protection regulations
– Cloud providers are a key risk area
– Highest penalties apply to breaches of these provisions
• Cloud providers need to ensure they are able to differentiate their
EU and non-EU provision and provide clarity to data subjects and
controllers
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Article 33: Data Breaches
• Mandatory data breach reporting – within 72 hours
– Describe actions being taken to
º Address the breach
º Mitigate the consequences
– Data subjects contacted ‘without undue delay’
º Unnecessary if appropriate protection is already in place
º Consider encryption for all mobile devices, for all databases, and for email
– Penetration testing to identify potential attack vectors should be standard
• Failure to report within 72 hours must be explained
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Privacy
Compliance
Framework
• A framework for
maintaining and improving
compliance with data
protection requirements
and good practice
• Roles & Responsibilities
• Monitoring, testing and
audits
Organizational & administrative
measures
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Developing policies and procedures that
comply with the Regulation
• “implement appropriate technical and organisational measures”
Data protection
policy
Information
security policy
Public trust charter
Document and
record control
policy
Subject access
procedures
Complaints
procedures
Information
notices
procedures
Enforcement
notices
procedures
Risk management
strategy
Security policies
and procedures
Data quality
procedures
Data retention
and archive
procedures
Information
management
policy
Data disposal
procedures
System/data-
specific procedures
Data collection
procedures
fair/lawful/adequate
Data use
procedures
Third-party
exchange
agreements
Notification
procedures
Training and
awareness
programme
Audit and
compliance policy
Internal audit
procedures
Due diligence and
third parties audit
procedures
Compliance
standards
Data processor
standards and
agreements
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Technical measures
• Review current data sets and services
– Don’t forget employee data
• Set minimum standards for clouds & app services
• Implement contracts with approved services
• Define approved cloud services
– Migrate users to approved services
• Implement policies to block/allow/warn users of risks
• Implement monitoring, DLP, anomaly checking
• Integrate with LDAP, AD, SSO services
• Publish approved cloud services list
• Review requests for new cloud services
Copyright Skyhigh Networks 2017 – v1.0
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Article 40 et seq: Certifications
• Requirement is to apply appropriate administrative organizational
and administrative measures.
• How can you demonstrate this?
– Codes of conduct and certifications may be used to demonstrate compliance with
GDPR
– Recognised international standards (eg ISO/IEC 27001/27018)
– Recognised national management standards (eg BS 10012 – for a PIMS or
Personal Information Management System)
– Recognised national technical standards (eg Cyber Essentials in the UK, CCM)
– Emergence of new standards, privacy seals etc across EU
• Certification does not absolve controller of need to comply
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
• Application & Interface Security (controls AIS-01 to 03)
• Audit Assurance & Compliance (AAC-01 to 03)
• Business Continuity Management & Operational Resilience (BCR-01 to 12)
• Change Control & Configuration Management (CCC-01 to 05)
• Data security & Information Lifecycle Management (DSI-01 to 08)
• Datacentre Security (DCS-01 to 09)
• Encryption & Key Management (EKM-01 to 04)
• Governance and Risk Management (GRM-01 to 12)
• Human Resources (HRS-01 to 12)
• Identity & Access Management (IAM-01 to 13)
• Infrastructure & Virtualization Security (IVS-01 to 12)
• Interoperability & Portability (IPY-01 to 5)
• Mobile Security (MOS-01 to 20)
• Security Incident Management, E-Discovery & Cloud Forensics (SEF-01 to 05)
• Supply Chain Management, Transparency and Accountability (STA-01 to 09)
• Threat and Vulnerability Management (TVM-01 to 03)
Cloud Controls Matrix
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
ISO 27001 Annex A
14 Control Categories & ISO 27018
5 Information security policies
6 Organisation of info. security 7 Human resources security
8 Asset Management 9 Access Control
12 Operations security
14 System acq, dev & mnt.
16 Info. security incident management 17 Info. sec aspects of BC Mngt
18 Compliance
11 Physical & environmental sec
15 Supplier relationships
10 Cryptography
13 Comms security
114 CONTROLS
19 ISO 27018 Extension
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
IT Governance: GDPR self-help
• 1-Day accredited Foundation course (classroom,
online, distance learning
– www.itgovernance.co.uk/shop/product/certified-eu-general-data-
protection-regulation-foundation-gdpr-training-course
• 4-Day accredited Practitioner course (classroom,
online, distance learning)
– www.itgovernance.co.uk/shop/product/certified-eu-general-data-
protection-regulation-practitioner-gdpr-training-course
• Pocket guide
www.itgovernance.co.uk/shop/Product/eu-gdpr-a-
pocket-guide
• Implementation Manual
www.itgovernance.co.uk/shop/Product/eu-general-
data-protection-regulation-gdpr-an-implementation-and-
compliance-guide
• Documentation toolkit
www.itgovernance.co.uk/shop/product/eu-general-data-protection-
regulation-gdpr-documentation-toolkit
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
IT Governance: GDPR Consultancy
• Gap analysis
• Our experienced data protection consultants can assess the exact standing of your current legal
situation, security practices and operating procedures in relation to the DPA or the GDPR.
• Data flow audit
• Data mapping involves plotting out all of the organisations’ data flows, which involves drawing up
an extensive inventory of the data to understand where the data flows from, within and to. This
type of analysis is a key requirement of the GDPR.
• Information Commissioner notification support (a legal requirement for DPA compliance)
• Organisations that process personal data must complete a notification with the Information
Commissioner under the DPA.
• Implementing a personal information management system (PIMS)
• Establishing a PIMS as part of your overall business management system will ensure that data
protection management is placed within a robust framework, which will be looked upon favourably
by the regulator when it comes to DPA compliance.
• Implementing an ISMS compliant with ISO 27001
• We offer flexible and cost-effective consultancy packages, and a comprehensive range of
bespoke ISO 27001 consultancy services, that will help you implement an ISO 27001-compliant
ISMS quickly and without the hassle, no matter where your business is located.
• Cyber health check
• The two-day Cyber Health Check combines on-site consultancy and audit with remote
vulnerability assessments to assess your cyber risk exposure.
www.itgovernance.co.uk/dpa-compliance-consultancy
TM
www.itgovernance.co.uk
Copyright IT Governance Ltd 2017 – v1.0
Questions?
aross@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

More Related Content

What's hot

The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-161211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-16jbauerofprivacy
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Mark Honeyball
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Stephanie Vasey
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 

What's hot (20)

Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-161211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 

Similar to GDPR: Requirements for Cloud Providers

GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360DataStax
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
EU regulatory agenda 2018 2019
EU regulatory agenda 2018 2019EU regulatory agenda 2018 2019
EU regulatory agenda 2018 2019Roger Coenen
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on financeinnov-acts-ltd
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")Parsons Behle & Latimer
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015Jan Dhont
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management Jerika Phelps
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementBlack Duck by Synopsys
 

Similar to GDPR: Requirements for Cloud Providers (20)

GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
EU regulatory agenda 2018 2019
EU regulatory agenda 2018 2019EU regulatory agenda 2018 2019
EU regulatory agenda 2018 2019
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
 

More from IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

More from IT Governance Ltd (11)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Recently uploaded

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 

Recently uploaded (20)

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 

GDPR: Requirements for Cloud Providers

  • 1. GDPR: Requirements for Cloud Providers Alan Calder Founder & Executive Chair IT Governance Ltd February 2017 www.itgovernance.co.uk
  • 2. Introduction • Alan Calder • Founder – IT Governance Ltd • The single source for everything to do with IT governance, cyber risk management and IT compliance • IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, 6th Edition (Open University textbook) • www.itgovernance.co.uk
  • 3. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 IT Governance Ltd: GRC One-stop shop All verticals, all sectors, all organisational sizes
  • 4. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 We will cover: • The GDPR and what it means for Cloud service providers. • The rights of data subjects • The policies and procedures required by the GDPR. • The ‘privacy by design’ and ‘privacy by default’ requirements. • .Breach notification obligations. • The impact of subcontracting on Cloud service providers. • The technical and organisational measures applicable to Cloud service providers • ISO 27018 and implementing security controls for PII in the Cloud • Introducing: Network and Information Security Directive 4
  • 5. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 GDPR: Top Ten Aspects of the Regulation • Increased fines - • Opt-in/opt-out - • Breach notification - • Territorial Scope - • Joint Liability - • Data Subject Rights - • Level playing field - • Data transfer - • Common enforcement - • Collective redress - 4% of global turnover or €20,000,000 Clear, pro-active, use data only as agreed, easy opt-out 72 hours to regulators, users ”without delay” Global: all organizations with data on EU individuals Data Controllers & Processors The users are in charge Regulation, 28 laws becoming one Data keeps privacy rights as it moves globally Authorities will be strict Class action lawsuits from individuals Administrative penalties to be “effective, proportionate and dissuasive.” Effective across EU from 25 May 2018 Copyright Skyhigh Networks 2017 – v1.0
  • 6. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Data protection model under GDPR Information Commissioner’s Office (ICO) (supervisory authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board Complaints
  • 7. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 GDPR: Controllers or processors outside the EU Article 27: Representatives of controllers or processors not established in the Union • Where the controller or the processor are not established in the Union: – They shall designate in writing a representative in the Union; – Representative shall be established where data processing or profiling resides; – The representative shall be mandated to be addressed by supervisory authorities and data subjects for the purposes of the Regulation; – Designation of representative does not absolve controller or processor from legal liabilities.
  • 8. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Rights of Data Subjects • The controller shall take appropriate measures to provide any information … relating to processing to the data subject in a concise, transparent, intelligible and easily accessible form, using clear and plain language (Article 11-1) • The controller shall facilitate the exercise of data subject rights (Article 11-2) – Rights to º Consent º Access º Rectification º Erasure º Restriction º Objection – the right to data portability; – the right to withdraw consent at any time; – the right to lodge a complaint with a supervisory authority; – The right to be informed of the existence of automated decision-making, including profiling, as well as the anticipated consequences for the data subject.
  • 9. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Article 5 & 6: Lawfulness • Processing must be lawful – which means, inter alia: – Data subject must give consent for specific purposes – Other specific circumstances where consent is not required º So that controller can comply with legal obligations etc • One month to respond to Subject Access Requests – & no charges • Controllers and processors clearly distinguished – Clearly identified obligations – Controllers responsible for ensuring processors comply with contractual terms for processing information – Processors must operate under a legally binding contract º And note issues around extra-territoriality
  • 10. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Articles 7 - 9: Consent • Consent must be clear and affirmative – Must be able to demonstrate that consent was given – Silence or inactivity does not constitute consent – Written consent must be clear, intelligible, easily accessible, else not binding; – Consent can be withdrawn any time, and as easy to withdraw consent as give it; • Special conditions apply for child (under 16) to give consent • Explicit consent must be given for processing sensitive personal data – Race, ethnic origin, gender, etc – Specific circumstances allow non-consensual processing eg to protect vital interests of the data subject • Secure against accidental loss, destruction or damage (article 5)
  • 11. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 GDPR: Cloud processor obligations Policy and procedure requirements Article 28: Processor A legal contract must ensure that the processor: • processes the personal data only on documented instructions from the controller; • ensures that persons authorised to process the personal data observe confidentiality; • takes appropriate security measures; • respects the conditions for engaging another processor; • assists the controller by appropriate technical and organisational measures; • assists the controller in ensuring compliance with the obligations to security of processing; • deletes or returns all the personal data to the controller after the end of the provision of services; • makes available to the controller all information necessary to demonstrate compliance with the Regulation.
  • 12. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 NIS: Network & Information Security Directive • In place from May 2018 • Improve national cyber security capabilities, improve EU co-operation • Operators of essential services: – Energy (electricity, oil and gas) – Transport (air, rail, water and road) – Banking (credit institutions) – Financial market infrastructures (trading venues and central counterparties) – Health (healthcare providers) – Water (drinking water suppliers and distributors) • Digital service providers: – Search engines – Online marketplaces – Cloud computing services • Take appropriate security measures and notify the relevant national authorities of serious incidents • Non-EU entities: – Designate a representative in one of the member states in which they offer their services, – Fall under the jurisdiction of that member state. • Administrative penalties to be “effective, proportionate and dissuasive.”
  • 13. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 NIS: Key Requirements • Must notify serious incidents to the relevant national authority; • Take appropriate security measures, such as: – Technical and organisational measures that are appropriate and proportionate to identified risks. – Measures that ensure a level of network and information systems security appropriate to identified risks. – Measures that prevent and minimise the impact of incidents on the IT systems used to provide the services, – with a view to ensuring the continuity of those services – Must also have the “information necessary to assess the security of the network and information systems”, including º documented security policies, º evidence of effective implementation - eg the results of a security audit carried out by the competent authority or a qualified auditor.
  • 14. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 What Apps & Cloud Services are we using? Copyright Skyhigh Networks 2017 – v1.0
  • 15. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Article 44: International Transfers • Any transfer of personal data by controller or processor shall take place only if certain conditions are complied with: – Transfers on the basis of adequacy; – Transfers subject to the appropriate safeguards – Binding corporate rules apply. • All provisions shall be applied to ensure the protection of natural persons is not undermined. • To countries with similar data protection regulations – Cloud providers are a key risk area – Highest penalties apply to breaches of these provisions • Cloud providers need to ensure they are able to differentiate their EU and non-EU provision and provide clarity to data subjects and controllers
  • 16. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Article 33: Data Breaches • Mandatory data breach reporting – within 72 hours – Describe actions being taken to º Address the breach º Mitigate the consequences – Data subjects contacted ‘without undue delay’ º Unnecessary if appropriate protection is already in place º Consider encryption for all mobile devices, for all databases, and for email – Penetration testing to identify potential attack vectors should be standard • Failure to report within 72 hours must be explained
  • 17. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Privacy Compliance Framework • A framework for maintaining and improving compliance with data protection requirements and good practice • Roles & Responsibilities • Monitoring, testing and audits Organizational & administrative measures
  • 18. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Developing policies and procedures that comply with the Regulation • “implement appropriate technical and organisational measures” Data protection policy Information security policy Public trust charter Document and record control policy Subject access procedures Complaints procedures Information notices procedures Enforcement notices procedures Risk management strategy Security policies and procedures Data quality procedures Data retention and archive procedures Information management policy Data disposal procedures System/data- specific procedures Data collection procedures fair/lawful/adequate Data use procedures Third-party exchange agreements Notification procedures Training and awareness programme Audit and compliance policy Internal audit procedures Due diligence and third parties audit procedures Compliance standards Data processor standards and agreements
  • 19. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Technical measures • Review current data sets and services – Don’t forget employee data • Set minimum standards for clouds & app services • Implement contracts with approved services • Define approved cloud services – Migrate users to approved services • Implement policies to block/allow/warn users of risks • Implement monitoring, DLP, anomaly checking • Integrate with LDAP, AD, SSO services • Publish approved cloud services list • Review requests for new cloud services Copyright Skyhigh Networks 2017 – v1.0
  • 20. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Article 40 et seq: Certifications • Requirement is to apply appropriate administrative organizational and administrative measures. • How can you demonstrate this? – Codes of conduct and certifications may be used to demonstrate compliance with GDPR – Recognised international standards (eg ISO/IEC 27001/27018) – Recognised national management standards (eg BS 10012 – for a PIMS or Personal Information Management System) – Recognised national technical standards (eg Cyber Essentials in the UK, CCM) – Emergence of new standards, privacy seals etc across EU • Certification does not absolve controller of need to comply
  • 21. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 • Application & Interface Security (controls AIS-01 to 03) • Audit Assurance & Compliance (AAC-01 to 03) • Business Continuity Management & Operational Resilience (BCR-01 to 12) • Change Control & Configuration Management (CCC-01 to 05) • Data security & Information Lifecycle Management (DSI-01 to 08) • Datacentre Security (DCS-01 to 09) • Encryption & Key Management (EKM-01 to 04) • Governance and Risk Management (GRM-01 to 12) • Human Resources (HRS-01 to 12) • Identity & Access Management (IAM-01 to 13) • Infrastructure & Virtualization Security (IVS-01 to 12) • Interoperability & Portability (IPY-01 to 5) • Mobile Security (MOS-01 to 20) • Security Incident Management, E-Discovery & Cloud Forensics (SEF-01 to 05) • Supply Chain Management, Transparency and Accountability (STA-01 to 09) • Threat and Vulnerability Management (TVM-01 to 03) Cloud Controls Matrix
  • 22. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 ISO 27001 Annex A 14 Control Categories & ISO 27018 5 Information security policies 6 Organisation of info. security 7 Human resources security 8 Asset Management 9 Access Control 12 Operations security 14 System acq, dev & mnt. 16 Info. security incident management 17 Info. sec aspects of BC Mngt 18 Compliance 11 Physical & environmental sec 15 Supplier relationships 10 Cryptography 13 Comms security 114 CONTROLS 19 ISO 27018 Extension
  • 23. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 IT Governance: GDPR self-help • 1-Day accredited Foundation course (classroom, online, distance learning – www.itgovernance.co.uk/shop/product/certified-eu-general-data- protection-regulation-foundation-gdpr-training-course • 4-Day accredited Practitioner course (classroom, online, distance learning) – www.itgovernance.co.uk/shop/product/certified-eu-general-data- protection-regulation-practitioner-gdpr-training-course • Pocket guide www.itgovernance.co.uk/shop/Product/eu-gdpr-a- pocket-guide • Implementation Manual www.itgovernance.co.uk/shop/Product/eu-general- data-protection-regulation-gdpr-an-implementation-and- compliance-guide • Documentation toolkit www.itgovernance.co.uk/shop/product/eu-general-data-protection- regulation-gdpr-documentation-toolkit
  • 24. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 IT Governance: GDPR Consultancy • Gap analysis • Our experienced data protection consultants can assess the exact standing of your current legal situation, security practices and operating procedures in relation to the DPA or the GDPR. • Data flow audit • Data mapping involves plotting out all of the organisations’ data flows, which involves drawing up an extensive inventory of the data to understand where the data flows from, within and to. This type of analysis is a key requirement of the GDPR. • Information Commissioner notification support (a legal requirement for DPA compliance) • Organisations that process personal data must complete a notification with the Information Commissioner under the DPA. • Implementing a personal information management system (PIMS) • Establishing a PIMS as part of your overall business management system will ensure that data protection management is placed within a robust framework, which will be looked upon favourably by the regulator when it comes to DPA compliance. • Implementing an ISMS compliant with ISO 27001 • We offer flexible and cost-effective consultancy packages, and a comprehensive range of bespoke ISO 27001 consultancy services, that will help you implement an ISO 27001-compliant ISMS quickly and without the hassle, no matter where your business is located. • Cyber health check • The two-day Cyber Health Check combines on-site consultancy and audit with remote vulnerability assessments to assess your cyber risk exposure. www.itgovernance.co.uk/dpa-compliance-consultancy
  • 25. TM www.itgovernance.co.uk Copyright IT Governance Ltd 2017 – v1.0 Questions? aross@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk