SlideShare une entreprise Scribd logo
1  sur  14
The General Data Protection Act
An overview
Cryptv Ltd
© 2017
What is the GDPR?
• The EU General Data Protection Regulation (GDPR) replaces the
Data Protection Directive 95/46/EC and was designed to
harmonize data privacy laws across Europe, to protect and
empower all EU citizens data privacy and to reshape the way
organizations across the region approach data privacy.
• The primary objective of the GDPR is to protect all EU citizens from
privacy and data breaches in an increasingly data-driven world that
is vastly different from the time in which the 1995 directive was
established. Although the key principles of data privacy still hold
true to the previous directive, many changes have been proposed
to the regulatory policies; the key points of the GDPR as well as
information on the impacts it will have on business can be found
below.
• Source: https://www.eugdpr.org/
• The GDPR outlines key principles relating to the
processing of personal data. These are the high-level
requirements:
– Lawfulness, fairness and transparency - Personal data shall be
processed lawfully, fairly and in a transparent manner in relation to the data subject.
– Purpose limitation - Personal data shall be collected for specified, explicit and
legitimate purposes and not further processed in a manner that is incompatible with those
purposes.
– Data minimisation - Personal data shall be adequate, relevant and limited to what
is necessary in relation to the purposes for which they are processed.
– Accuracy - Personal data shall be accurate and, where necessary, kept up to date;
every reasonable step must be taken to ensure that personal data that are inaccurate,
having regard to the purposes for which they are processed, are erased or rectified without
delay.
– Storage limitation - Personal data shall be kept in a form which permits
identification of data subjects for no longer than is necessary for the purposes for which the
personal data are processed.
– Integrity and confidentiality - Personal data shall be processed in a
manner that ensures appropriate security of the personal data, including protection against
unauthorized or unlawful processing and against accidental loss, destruction or damage,
using appropriate technical or organizational measures.
– Accountability - The controller shall be responsible for, and be able to
demonstrate compliance with, the GDPR.
Key Elements of the GDPR
• Although the GDPR will not become enforceable until
May 2018, organisations across the globe are preparing
for changes now.
• It’s not just organisations in the EU that are subject to the
Regulation; organisations based outside the EU that
provide services or goods to the EU (including for free)
are also subject.
• Any organisation that handles the personal data of EU
citizens must comply with the GDPR.
• For example, where the activities relate to: offering goods
or services to EU citizens (irrespective of whether
payment is required) and the monitoring of behaviour that
takes place within the EU.
• Non-EU businesses processing the data of EU citizens
will also have to appoint a representative in the EU.
What Does the GDPR Change?
• ARTICLES 39 & 47: Training is required. The article
states that an organisation’s Data Protection Officer is
responsible for “awareness-raising and training of staff
involved in processing operations, and the related audits”
and “appropriate data protection training to personnel
having permanent or regular access to personal data.”
What Does the GDPR Change?
(cont’d)
• ARTICLE 33: Organizations have 72 hours to report
data breaches. The article states, “In the case of a
personal data breach, the controller shall without undue
delay and, where feasible, not later than 72 hours after
having become aware of it, notify the personal data
breach to the supervisory authority competent in
accordance with Article 55, unless the personal data
breach is unlikely to result in a risk to the rights and
freedoms of natural persons.”
What Does the GDPR Change?
(cont’d)
• ARTICLE 37: The role of the Data Protection Officer
(DPO) will take on heightened importance.
• The role won’t change, but the visibility of the position will
increase and there will be more pressure on this person
considering the stakes are higher under the GDPR.
• Early reports estimate that the GDPR will require the
creation of at least 75,000 DPO positions globally to
ensure compliance with the EU’s updated data protection
regulations – even if a given organisation doesn’t have
operations in the EU.
• Additional requirements will apply to organisations that
conduct large-scale processing of personal data from the
EU, such as the requirement to have a DPO who is
independent from the organisation.
What Does the GDPR Change?
(cont’d)
• ARTICLE 83: There are hefty fines for non-
compliance.
• Organisations will need to be 100% compliant from day
one. Article 83 states, “Non-compliance with an order by
the supervisory authority … shall… be subject to
administrative fines … up to 4% of the total worldwide
annual turnover of the preceding financial year.”
What Does the GDPR Change?
(cont’d)
Data Security Breaches
Different types of data security breaches consist of the following:
• Unintended disclosure - Sensitive information posted publicly on a
website, mishandled or sent to the wrong party via email or any
other type of end-user messaging technology.
• Hacking or malware - Electronic entry by an outside party,
malware and spyware.
• Payment Card Fraud - Fraud involving debit and credit cards that
is not accomplished via hacking. For example, skimming devices at
point-of-service terminals.
• Insider - Someone with legitimate access intentionally breaches
information - such as an employee or contractor.
• Physical loss - Lost, discarded or stolen non-electronic records,
such as paper documents
• Portable device - Lost, discarded or stolen laptop, PDA,
smartphone, portable memory device, CD, hard drive, data tape,
etc.
• Stationary device - Lost, discarded or stolen stationary electronic
device such as a computer or server not designed for mobility.
• Unknown - Anything outside of the above listed categories.
General Safeguards and Best
Practices
• ARTICLES 32: The controller and the
processor shall implement appropriate
technical and organisational measures to
ensure a level of security appropriate to the
risk, including inter alia as appropriate:
• (a) the pseudonymisation and encryption of
personal data;
• (b) the ability to ensure the ongoing
confidentiality, integrity, availability and
resilience of processing systems and services;
• (c) the ability to restore the availability and
access to personal data in a timely manner in
the event of a physical or technical incident;
(d) a process for regularly testing, assessing
and evaluating the effectiveness of technical
and organisational measures for ensuring the
security of the processing.
• (d) a process for regularly testing, assessing
and evaluating the effectiveness of technical
and organisational measures for ensuring the
security of the processing.
• As for all the tools, devices, and protocols utilised for protecting networks - there's an endless list - but for
purposes of gaining a basic understanding of these appliances, the following list is considered vital:
• Network Devices: Firewall, routers, switches, load balancers, intrusion detection systems (IDS), intrusion
prevention systems (IPS), smartcards, biometrics, Network Access Control (NAC) systems etc.
• Malware Solutions: anti-virus and anti-spam software and devices.
• File Integrity Monitoring (FIM) and change detection software, host based intrusion detection and intrusion
prevention devices.
• Secure services – those that are operating system (O/S) and application specific to all major operating
systems (Windows, UNIX, Linux) and applications (web server applications, database applications, internally
developed applications)
• Secure protocols, such as TLS, SSH, VPN, etc.
• Secure ports, such as 443, 22, etc.
• User access principles, such as Role Based Access Controls (RBAC), One-time password (OTP) solutions,
etc.
• Username and password parameters, such as unique user ID’s, password complexity rules, password aging
rules, account lockout thresholds, etc.
• Encryption
• Event monitoring
• Configuration and change monitoring
• Performance and utilisation monitoring
• Logging and reporting
• Appropriate incident response measures
General Safeguards and
Best Practices cont’d
Defense-in-Depth
• Some of the best practices to use for ensuring the integrity and confidentiality
is upheld at all times is Defense-in-Depth and Layered security - essentially
utilising various resources for helping protect an organisation's information
systems landscape. Defense-in-Depth security has since been praised as a
highly effective concept, one that employs effective countermeasure for
thwarting attacks on an enterprise’s information systems environment.
Defense-in-Depth includes the following layers, which have been loosely
adopted and agreed upon by industry leading vendors and other noted
organisations:
 Data
 Application
 Host
 Internal Network
 Perimeter
 Physical
 Policies, Procedures, Awareness
• People are often regarded as the weakest link in the
security chain.
• Almost every company has people who are vulnerable, be
it to strong persuasion and authority or those easily
tricked by good social engineering and malicious links.
• Much is at stake when it comes to complying with the
GDPR. Both in terms of the hefty fines the regulation
includes, and the employee privacy awareness training it
calls for. Affected organisations cannot afford to be found
wanting on the new policies, procedures, and initiatives
they need to have in place, if they’re not in place already.
Data Protection Is Everyone’s
Responsibility
Questions
Do you have questions?
Send them to:
Roy Biakpara, MSc., CISA, CISSP, CISM, CRISC, CDPO
(GDPR)
Email: consultant@cryptv-uk.com

Contenu connexe

Tendances

The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role HackerOne
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Napier University
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?Christiana Kozakou
 

Tendances (20)

The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 

Similaire à The general data protection act overview

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management Black Duck by Synopsys
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance Dovetail Software
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationGrittyCC
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...PECB
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your DataUlf Mattsson
 
Ready for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital EconomyReady for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital EconomyRay ABOU
 

Similaire à The general data protection act overview (20)

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your Data
 
Ready for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital EconomyReady for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital Economy
 

Dernier

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Dernier (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

The general data protection act overview

  • 1. The General Data Protection Act An overview Cryptv Ltd © 2017
  • 2. What is the GDPR? • The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. • The primary objective of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world that is vastly different from the time in which the 1995 directive was established. Although the key principles of data privacy still hold true to the previous directive, many changes have been proposed to the regulatory policies; the key points of the GDPR as well as information on the impacts it will have on business can be found below. • Source: https://www.eugdpr.org/
  • 3. • The GDPR outlines key principles relating to the processing of personal data. These are the high-level requirements: – Lawfulness, fairness and transparency - Personal data shall be processed lawfully, fairly and in a transparent manner in relation to the data subject. – Purpose limitation - Personal data shall be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. – Data minimisation - Personal data shall be adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed. – Accuracy - Personal data shall be accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay. – Storage limitation - Personal data shall be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed. – Integrity and confidentiality - Personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures. – Accountability - The controller shall be responsible for, and be able to demonstrate compliance with, the GDPR. Key Elements of the GDPR
  • 4. • Although the GDPR will not become enforceable until May 2018, organisations across the globe are preparing for changes now. • It’s not just organisations in the EU that are subject to the Regulation; organisations based outside the EU that provide services or goods to the EU (including for free) are also subject. • Any organisation that handles the personal data of EU citizens must comply with the GDPR. • For example, where the activities relate to: offering goods or services to EU citizens (irrespective of whether payment is required) and the monitoring of behaviour that takes place within the EU. • Non-EU businesses processing the data of EU citizens will also have to appoint a representative in the EU. What Does the GDPR Change?
  • 5. • ARTICLES 39 & 47: Training is required. The article states that an organisation’s Data Protection Officer is responsible for “awareness-raising and training of staff involved in processing operations, and the related audits” and “appropriate data protection training to personnel having permanent or regular access to personal data.” What Does the GDPR Change? (cont’d)
  • 6. • ARTICLE 33: Organizations have 72 hours to report data breaches. The article states, “In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons.” What Does the GDPR Change? (cont’d)
  • 7. • ARTICLE 37: The role of the Data Protection Officer (DPO) will take on heightened importance. • The role won’t change, but the visibility of the position will increase and there will be more pressure on this person considering the stakes are higher under the GDPR. • Early reports estimate that the GDPR will require the creation of at least 75,000 DPO positions globally to ensure compliance with the EU’s updated data protection regulations – even if a given organisation doesn’t have operations in the EU. • Additional requirements will apply to organisations that conduct large-scale processing of personal data from the EU, such as the requirement to have a DPO who is independent from the organisation. What Does the GDPR Change? (cont’d)
  • 8. • ARTICLE 83: There are hefty fines for non- compliance. • Organisations will need to be 100% compliant from day one. Article 83 states, “Non-compliance with an order by the supervisory authority … shall… be subject to administrative fines … up to 4% of the total worldwide annual turnover of the preceding financial year.” What Does the GDPR Change? (cont’d)
  • 9. Data Security Breaches Different types of data security breaches consist of the following: • Unintended disclosure - Sensitive information posted publicly on a website, mishandled or sent to the wrong party via email or any other type of end-user messaging technology. • Hacking or malware - Electronic entry by an outside party, malware and spyware. • Payment Card Fraud - Fraud involving debit and credit cards that is not accomplished via hacking. For example, skimming devices at point-of-service terminals. • Insider - Someone with legitimate access intentionally breaches information - such as an employee or contractor. • Physical loss - Lost, discarded or stolen non-electronic records, such as paper documents • Portable device - Lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape, etc. • Stationary device - Lost, discarded or stolen stationary electronic device such as a computer or server not designed for mobility. • Unknown - Anything outside of the above listed categories.
  • 10. General Safeguards and Best Practices • ARTICLES 32: The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: • (a) the pseudonymisation and encryption of personal data; • (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; • (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing. • (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
  • 11. • As for all the tools, devices, and protocols utilised for protecting networks - there's an endless list - but for purposes of gaining a basic understanding of these appliances, the following list is considered vital: • Network Devices: Firewall, routers, switches, load balancers, intrusion detection systems (IDS), intrusion prevention systems (IPS), smartcards, biometrics, Network Access Control (NAC) systems etc. • Malware Solutions: anti-virus and anti-spam software and devices. • File Integrity Monitoring (FIM) and change detection software, host based intrusion detection and intrusion prevention devices. • Secure services – those that are operating system (O/S) and application specific to all major operating systems (Windows, UNIX, Linux) and applications (web server applications, database applications, internally developed applications) • Secure protocols, such as TLS, SSH, VPN, etc. • Secure ports, such as 443, 22, etc. • User access principles, such as Role Based Access Controls (RBAC), One-time password (OTP) solutions, etc. • Username and password parameters, such as unique user ID’s, password complexity rules, password aging rules, account lockout thresholds, etc. • Encryption • Event monitoring • Configuration and change monitoring • Performance and utilisation monitoring • Logging and reporting • Appropriate incident response measures General Safeguards and Best Practices cont’d
  • 12. Defense-in-Depth • Some of the best practices to use for ensuring the integrity and confidentiality is upheld at all times is Defense-in-Depth and Layered security - essentially utilising various resources for helping protect an organisation's information systems landscape. Defense-in-Depth security has since been praised as a highly effective concept, one that employs effective countermeasure for thwarting attacks on an enterprise’s information systems environment. Defense-in-Depth includes the following layers, which have been loosely adopted and agreed upon by industry leading vendors and other noted organisations:  Data  Application  Host  Internal Network  Perimeter  Physical  Policies, Procedures, Awareness
  • 13. • People are often regarded as the weakest link in the security chain. • Almost every company has people who are vulnerable, be it to strong persuasion and authority or those easily tricked by good social engineering and malicious links. • Much is at stake when it comes to complying with the GDPR. Both in terms of the hefty fines the regulation includes, and the employee privacy awareness training it calls for. Affected organisations cannot afford to be found wanting on the new policies, procedures, and initiatives they need to have in place, if they’re not in place already. Data Protection Is Everyone’s Responsibility
  • 14. Questions Do you have questions? Send them to: Roy Biakpara, MSc., CISA, CISSP, CISM, CRISC, CDPO (GDPR) Email: consultant@cryptv-uk.com