SlideShare a Scribd company logo
1 of 26
General Data Protection
Regulation (GDPR)
Kishor Vaswani, CEO – ControlCase
Agenda
• About GDPR
• Non Compliance Consequences
• Required Steps
› Data Impact Assessment (DIA)
› Data Protection Officer
• GDPR Articles
• GDPR Tactical Compliance
› Security
› Rights Management
› Privacy
› Breach notification
• ControlCase Solutions
• Q&A
1
What is General Data Protection Regulation (GDPR)?
2
GDPR
Related to processing of personal data
Harmonizes data privacy laws/regulation across Europe
Protects EU citizen data privacy
Established fines for non compliance
Establishes breach notification guidelines
Goes into effect May 2018
Types of data include address, phone numbers, email address,
name
Key Definitions
3
• A controller is the entity that determines the purposes, conditions and means of
• the processing of personal data, while the processor is an entity which processes
• personal data on behalf of the controller.
Data Processor vs Data Controller
• A regulation is a binding legislative act. It must be applied in its entirety
• across the EU, while a directive is a legislative act that sets out a goal that all
• EU countries must achieve. However, it is up to the individual countries to decide
• how. It is important to note that the GDPR is a regulation, in contrast the
previous
• legislation, which is a directive.
Regulation vs Directive
• Data Protection Authority
DPA
Non Compliance Consequences
• Lodging complaints with a supervisory authority
• Judicial remedy
• In case of breach, fines include
› Upto 4% of annual revenue, OR
› Euro 20 million
› Whichever is higher
4
Required: Data Impact Assessment
• Must Carry Out Data Impact Assessment (DIA) as determined by
supervisory authorities
• Managed by Data Protection Officer (DPO)
• Assessment Must Include:
› Details of processing operations
› Purpose of processing
› Risks to privacy of individuals
› Security assessment
• When
› Prior to “processing” personal data
› After any changes to systems or processing mechanism
5
Required: Data Protection Officer
• Data Protection Officer is required in multiple scenarios including:
› Processing by public bodies
› Processor includes storage/process/transmission of large amounts
of personal information
• Multiple entities can combine to have a single DPO
• Can be an employee or outsourced
• Must be independent and “cannot” be dismissed for doing their job
• Tasks include
› Monitor compliance to GDPR
› Provide advice within the organization for GDPR
› Coordinate with supervisory authority/DPA
6
Key articles of GDPR
Principles relating to processing of personal data
Rights of individuals
Consent
Responsibility of the controller/processor
Security of data
Data processing impact assessment
Data protection officer
7
Tactical steps for GDPR
8
Security of
Processing
• Asset &
Vulnerability
Management
• Data Management
• Logical Access
• Physical Access
• Risk Assessment
• Policy Management
• Third Party
Management
• Incident
Management
Rights
Management
Privacy
Breach
Notification
Management
Asset and Vulnerability Management
9
 Asset list
 Management of vulnerabilities and
dispositions
 Training to development and support staff
 Management reporting if unmitigated
vulnerability
Data Management
10
 Identification of personally identifiable data
 Classification of data
 Encryption of data
 Monitoring of data
Logical Access
11
 Username
 Password
 Access based on need to know
 Protection of data
Physical Security
12
 Badges
 Visitor Access
 CCTV
 Biometric
 Media Inventory
 Media Destruction
Risk Management
13
 Input of key criterion
 Numeric algorithms to compute risk
 Output of risk dashboards
Policy Management
14
 Appropriate update of policies and procedures
 Link/Mapping to controls and standards
 Communication, training and attestation
 Monitoring of compliance to corporate policies
Vendor/Third Party Management
15
 Management of third parties/vendors
 Self attestation by third parties/vendors
 Remediation tracking
Reg/Standard Coverage area
ISO 27001 A.6, A.10
PCI 12
EI3PA 12
HIPAA 164.308b1
FISMA PS-3
FERC/NERC Multiple
Requirements
Incident Management
16
 Monitoring
 Detection
 Reporting
 Responding
 Approving
Lost Laptop
Changes to
firewall
rulesets
Upgrades to
applications
Intrusion
Alerting
Rights Management
Rights of data subjects:
• Right to receive information on data processor
• Right to ask for modification of data
• Right to ask for deletion of data
• Right to ask processor to restrict use of data for certain purposes
• Right around movement of data
Processor Required to Provide These Details
• Requires breach notification to the Controlling Entity
• Provides an accounting of disclosures.
17
Privacy Management
Privacy Rule Main Points:
• Requires appropriate safeguards to protect the privacy of personal
information
• Sets limits and conditions on the uses and disclosures that may be made of
such information without authorization
• Gives individuals rights over their health information, including rights to
examine and obtain a copy of their records, and to request erasure or
change
• Records of processing activities
• Right to “be forgotten”
For Third Parties
• Requires breach notification to the Controlling Entity
• Provide an accounting of disclosures.
18
Breach Notification Management
19
Definition of Breach
A breach is, generally, an impermissible use or disclosure that compromises the
security or privacy of personal information.
Breach Notification Mechanism
Notify to Data Protection Authorities (DPA) with 72 hours.
Notify individuals without undue delay.
Notify volume of breach.
Vendors/Third parties to notify the customer without undue delay.
Content of Breach Notification
Approximate number of records compromised
Categories of data compromised
Point if contact of data protection officer
Likely consequences of data breach
Measures takes to address/mitigate the breach
ControlCase Solution 1: Data Impact Assessment
• 48 items in portal questionnaire
• 2 week engagement
• Assessment Includes
› Review of processing operations documents
› Risk assessment to privacy of individuals
› Security assessment of personal data
• Deliverable
› DIA Report (Required)
› GDPR Certificate of Compliance (COC) if no gaps are found
› NOTE: Additional iterative review methodology can also be deployed
until compliance is achieved
• Team
› Security Assessor – Partnership Approach
› Success Team: PMO Milestone Management & Account Manager for
Escalation Management
• Secure Portal
› Upload Evidence, See History of Comments & Track Status
20
ControlCase Solution 2: Data Discovery Software
• Identify and pinpoint sensitive data across
› File Shares
› Servers
› Databases
› Email
› Log files
• Types of data
› Name
› Email
› Address
› Phone number
› Pictures
› Credit Card Numbers
21
Why ControlCase – Global Reach
22
Americas
• United States
• Canada
• Mexico
• Argentina
• Brazil
• Chile
• Colombia
• Guatemala
Europe
• United Kingdom
• Belgium
• France
• Germany
• Poland
• Romania
• Russia
• Sweden
• Spain
• Italy
• Bulgaria
• Macedonia
Asia Pacific
• India
• Australia
• Indonesia
• Brunei
• Japan
• South Korea
• Maldives
• Malaysia
• Philippines
• Singapore
• Sri Lanka
• Thailand
• Vietnam
Middle East
and Africa
• Saudi Arabia
• Egypt
• Jordan
• Kenya
• Kuwait
• Morocco
• South Africa
• Tunisia
• United Arab Emirates
• Senegal
• Cameroun
• Madegascar
• Congo
Global Reach: ControlCase has 500+ clients and has
performed engagements across the US, CEMEA, Europe,
Latin America and Asia/Pacific regions.
Why ControlCase – Focus on Compliance
PCI DSS
Qualified Security
Assessor (QSA)
Company
ISO 27001 & 27002
International
Organization for
Standardization
SOC 1, SOC 2 & SOC 3
Service Organization
Controls (AICPA)
HITRUST CSF
Health Information
Trust Alliance
Common Security
Framework (CSF)
HIPAA
Health Insurance
Portability and
Accountability Act
MARS-E
Minimum Acceptable
Risk Standards for
Exchanges
GDPR
General Data
Protection Regulation
NIST 800-53
National Institute of
Standards and
Technology
EI3PA
Experian Independent
Third Party
Assessment
PA-DSS
Payment Application
Qualified Security
Assessor (QSA)
Third Party Risk
Assessor
Shared Assessments
Program Certified
product licensee for
SIG and AUP
Microsoft SSPA
Supplier Security and
Privacy Assurance
To Learn More …
23
Visit www.controlcase.com
Email us at contact@controlcase.com
Q & A
24

More Related Content

What's hot

GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...PECB
 
General data protection
General data protectionGeneral data protection
General data protectionBrijeshR3
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 

What's hot (20)

GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Data protection
Data protectionData protection
Data protection
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
General data protection
General data protectionGeneral data protection
General data protection
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 

Similar to EU's General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) ControlCase
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?Christiana Kozakou
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRPrecisely
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationGrittyCC
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowRachel Roach
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life CycleJatin Kochhar
 

Similar to EU's General Data Protection Regulation (GDPR) (20)

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 

More from Kimberly Simon MBA

HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationKimberly Simon MBA
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)Kimberly Simon MBA
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance MonitoringKimberly Simon MBA
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTKimberly Simon MBA
 

More from Kimberly Simon MBA (20)

PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

EU's General Data Protection Regulation (GDPR)

  • 1. General Data Protection Regulation (GDPR) Kishor Vaswani, CEO – ControlCase
  • 2. Agenda • About GDPR • Non Compliance Consequences • Required Steps › Data Impact Assessment (DIA) › Data Protection Officer • GDPR Articles • GDPR Tactical Compliance › Security › Rights Management › Privacy › Breach notification • ControlCase Solutions • Q&A 1
  • 3. What is General Data Protection Regulation (GDPR)? 2 GDPR Related to processing of personal data Harmonizes data privacy laws/regulation across Europe Protects EU citizen data privacy Established fines for non compliance Establishes breach notification guidelines Goes into effect May 2018 Types of data include address, phone numbers, email address, name
  • 4. Key Definitions 3 • A controller is the entity that determines the purposes, conditions and means of • the processing of personal data, while the processor is an entity which processes • personal data on behalf of the controller. Data Processor vs Data Controller • A regulation is a binding legislative act. It must be applied in its entirety • across the EU, while a directive is a legislative act that sets out a goal that all • EU countries must achieve. However, it is up to the individual countries to decide • how. It is important to note that the GDPR is a regulation, in contrast the previous • legislation, which is a directive. Regulation vs Directive • Data Protection Authority DPA
  • 5. Non Compliance Consequences • Lodging complaints with a supervisory authority • Judicial remedy • In case of breach, fines include › Upto 4% of annual revenue, OR › Euro 20 million › Whichever is higher 4
  • 6. Required: Data Impact Assessment • Must Carry Out Data Impact Assessment (DIA) as determined by supervisory authorities • Managed by Data Protection Officer (DPO) • Assessment Must Include: › Details of processing operations › Purpose of processing › Risks to privacy of individuals › Security assessment • When › Prior to “processing” personal data › After any changes to systems or processing mechanism 5
  • 7. Required: Data Protection Officer • Data Protection Officer is required in multiple scenarios including: › Processing by public bodies › Processor includes storage/process/transmission of large amounts of personal information • Multiple entities can combine to have a single DPO • Can be an employee or outsourced • Must be independent and “cannot” be dismissed for doing their job • Tasks include › Monitor compliance to GDPR › Provide advice within the organization for GDPR › Coordinate with supervisory authority/DPA 6
  • 8. Key articles of GDPR Principles relating to processing of personal data Rights of individuals Consent Responsibility of the controller/processor Security of data Data processing impact assessment Data protection officer 7
  • 9. Tactical steps for GDPR 8 Security of Processing • Asset & Vulnerability Management • Data Management • Logical Access • Physical Access • Risk Assessment • Policy Management • Third Party Management • Incident Management Rights Management Privacy Breach Notification Management
  • 10. Asset and Vulnerability Management 9  Asset list  Management of vulnerabilities and dispositions  Training to development and support staff  Management reporting if unmitigated vulnerability
  • 11. Data Management 10  Identification of personally identifiable data  Classification of data  Encryption of data  Monitoring of data
  • 12. Logical Access 11  Username  Password  Access based on need to know  Protection of data
  • 13. Physical Security 12  Badges  Visitor Access  CCTV  Biometric  Media Inventory  Media Destruction
  • 14. Risk Management 13  Input of key criterion  Numeric algorithms to compute risk  Output of risk dashboards
  • 15. Policy Management 14  Appropriate update of policies and procedures  Link/Mapping to controls and standards  Communication, training and attestation  Monitoring of compliance to corporate policies
  • 16. Vendor/Third Party Management 15  Management of third parties/vendors  Self attestation by third parties/vendors  Remediation tracking Reg/Standard Coverage area ISO 27001 A.6, A.10 PCI 12 EI3PA 12 HIPAA 164.308b1 FISMA PS-3 FERC/NERC Multiple Requirements
  • 17. Incident Management 16  Monitoring  Detection  Reporting  Responding  Approving Lost Laptop Changes to firewall rulesets Upgrades to applications Intrusion Alerting
  • 18. Rights Management Rights of data subjects: • Right to receive information on data processor • Right to ask for modification of data • Right to ask for deletion of data • Right to ask processor to restrict use of data for certain purposes • Right around movement of data Processor Required to Provide These Details • Requires breach notification to the Controlling Entity • Provides an accounting of disclosures. 17
  • 19. Privacy Management Privacy Rule Main Points: • Requires appropriate safeguards to protect the privacy of personal information • Sets limits and conditions on the uses and disclosures that may be made of such information without authorization • Gives individuals rights over their health information, including rights to examine and obtain a copy of their records, and to request erasure or change • Records of processing activities • Right to “be forgotten” For Third Parties • Requires breach notification to the Controlling Entity • Provide an accounting of disclosures. 18
  • 20. Breach Notification Management 19 Definition of Breach A breach is, generally, an impermissible use or disclosure that compromises the security or privacy of personal information. Breach Notification Mechanism Notify to Data Protection Authorities (DPA) with 72 hours. Notify individuals without undue delay. Notify volume of breach. Vendors/Third parties to notify the customer without undue delay. Content of Breach Notification Approximate number of records compromised Categories of data compromised Point if contact of data protection officer Likely consequences of data breach Measures takes to address/mitigate the breach
  • 21. ControlCase Solution 1: Data Impact Assessment • 48 items in portal questionnaire • 2 week engagement • Assessment Includes › Review of processing operations documents › Risk assessment to privacy of individuals › Security assessment of personal data • Deliverable › DIA Report (Required) › GDPR Certificate of Compliance (COC) if no gaps are found › NOTE: Additional iterative review methodology can also be deployed until compliance is achieved • Team › Security Assessor – Partnership Approach › Success Team: PMO Milestone Management & Account Manager for Escalation Management • Secure Portal › Upload Evidence, See History of Comments & Track Status 20
  • 22. ControlCase Solution 2: Data Discovery Software • Identify and pinpoint sensitive data across › File Shares › Servers › Databases › Email › Log files • Types of data › Name › Email › Address › Phone number › Pictures › Credit Card Numbers 21
  • 23. Why ControlCase – Global Reach 22 Americas • United States • Canada • Mexico • Argentina • Brazil • Chile • Colombia • Guatemala Europe • United Kingdom • Belgium • France • Germany • Poland • Romania • Russia • Sweden • Spain • Italy • Bulgaria • Macedonia Asia Pacific • India • Australia • Indonesia • Brunei • Japan • South Korea • Maldives • Malaysia • Philippines • Singapore • Sri Lanka • Thailand • Vietnam Middle East and Africa • Saudi Arabia • Egypt • Jordan • Kenya • Kuwait • Morocco • South Africa • Tunisia • United Arab Emirates • Senegal • Cameroun • Madegascar • Congo Global Reach: ControlCase has 500+ clients and has performed engagements across the US, CEMEA, Europe, Latin America and Asia/Pacific regions.
  • 24. Why ControlCase – Focus on Compliance PCI DSS Qualified Security Assessor (QSA) Company ISO 27001 & 27002 International Organization for Standardization SOC 1, SOC 2 & SOC 3 Service Organization Controls (AICPA) HITRUST CSF Health Information Trust Alliance Common Security Framework (CSF) HIPAA Health Insurance Portability and Accountability Act MARS-E Minimum Acceptable Risk Standards for Exchanges GDPR General Data Protection Regulation NIST 800-53 National Institute of Standards and Technology EI3PA Experian Independent Third Party Assessment PA-DSS Payment Application Qualified Security Assessor (QSA) Third Party Risk Assessor Shared Assessments Program Certified product licensee for SIG and AUP Microsoft SSPA Supplier Security and Privacy Assurance
  • 25. To Learn More … 23 Visit www.controlcase.com Email us at contact@controlcase.com