SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Case study: Data Protection (Privacy)
compliance management in economically
depressing times
BY

Ben Oguntala, LLB, LLM

ben.oguntala@dataprotectionofficer.com

www.dataprotectionofficer.com

Copyright 2011




This paper covers:

     1.   Policy management and implementation including periodic review
     2.   Dissemination of policies and procedures to all business units
     3.   Assessment of business changes that impact 3rd parties
     4.   Privacy impact assessment across business units
     5.   Privacy audit of suppliers
     6.   Operational support of businesses
     7.   Privacy standard enforcement
     8.   Managing subject Access request and responses
     9.   Privacy audit of business units




                  www.dataprotectionofficer.com info@dataprotectionofficer.com
Contents
Introduction ............................................................................................................................................ 3
The role of the Data Protection Officer .................................................................................................. 4
Resource deficiency impact .................................................................................................................... 5
Resource responsibilities on key privacy areas....................................................................................... 6
Policy management and implementation including periodic review ..................................................... 7
Dissemination of policies and procedures to all business units ............................................................. 8
Privacy impact assessment across business units and 3rd parties .......................................................... 9
Privacy audit of suppliers ...................................................................................................................... 10
Operational support of businesses ....................................................................................................... 11
Privacy standard enforcement.............................................................................................................. 12
Managing subject Access request (SAR) and responses ....................................................................... 13
Privacy audit of business units, projects and suppliers ........................................................................ 14




                          www.dataprotectionofficer.com info@dataprotectionofficer.com
Introduction

Most countries in Europe and America are faced with an austere period for the next few years and
consequently most organisations within these countries especially Government and private sectors
are going to be faced with the challenges of cost reduction whilst the requirements and obligations
stay the same.

Within the Data Protection/Privacy management sector this austere period will manifest itself in the
form of reduction of Privacy staff and resources for managing the day to day requirements of a Data
protection and privacy/compliance management.

A reduction in resources increases the likelihood of breaching the EU Data protection directive or UK
Data protection Act of 1998. The key areas impacted include:

    1.   Policy management and implementation including periodic review
    2.   Dissemination of policies and procedures to all business units
    3.   Assessment of business changes that impact 3rd parties
    4.   Privacy impact assessment across business units
    5.   Privacy audit of suppliers
    6.   Operational support of businesses
    7.   Privacy standard enforcement
    8.   Managing subject Access request and responses
    9.   Privacy audit of business units

To address this problem, www.dataprotectionofficer.com has a portal based solution that is
designed to assist Chief privacy Officers, Data Protection Officers and compliance teams in
maintaining their obligations.




The diagram above depicts the areas of control the www.dataprotectionofficer.com provides the
data protection officer, with diminishing resources the obligations toward Data Protection
compliance can still be achieved.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
The role of the Data Protection Officer

The diagram below depicts how a typical organisation’s privacy management structure is organised;
it demonstrates the key areas of concerns and the associated obligations related to them. As the
resources are reduced, the key areas may be deficient and increase the propensity to breach the
Data Protection Act.




The solution provided by www.dataprotectionofficer.com was designed privacy lawyers and
compliance Consultants; thereby it has an innate compliance capability even when there are
diminishing resources.

The solution also provides you with the ability to pick and choose areas you wish to automate, for
example, strategy is predominantly handled by senior management and rarely change frequently.
Therefore the automation will allow visibility of how effective the strategy is within your
organisation and where improvements can be made.

Operational support, Complaints & resources, Subject Access request, incidents and Audit &
compliance are resource intensive, we have tools designed to reduce the resource intensiveness and
requirements allowing your organisation to still maintain the same level of compliance by integrating
the solution into your current environment.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Resource deficiency impact

Depending on the size of your organization, the economic depression may have varying degrees of
impact, in some of situations, as a Small to medium organisation, you may be left with 1 or 2
resources to manage the entire privacy regime and in other larger organisations you may simply be
left with 4 resources.

With this in mind, our solution is designed to allow you to operate with minimum resources in order
to achieve optimum efficiency along with key performance indicators.




The numbers above may vary depending on size of the organisation.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Resource responsibilities on key privacy areas

The resources within privacy have specific responsibilities and if reduced may expose the area to
potential breaches, our solution is designed to plug each hole in order to ensure adequate coverage
should the resource reduction actually materialise.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Policy management and implementation including periodic review

Assuming there is only 1 resource available in this area, the www.dataprotectionofficer.com solution
will enable your organisation’s resource(s) to:

    1.   Draft policies and procedures
    2.   Single click dissemination of policies to all business units
    3.   Single interface management of all policies, procedures and processes
    4.   Single dashboard view of all policies




  Data
  Protection




The diagram above depicts the policy dashboard capturing the essential policies and their
commensurate procedures.




                  www.dataprotectionofficer.com info@dataprotectionofficer.com
Dissemination of policies and procedures to all business units
The policy dashboard will allow you to:

    1.   Create Data Protection and other privacy related policies
    2.   Create a group or national policy
    3.   Create a local policy if applicable
    4.   Create relevant department policies relating to the main policy
    5.   Assign operational responsibility for procedures to an offer
    6.   The responsibility will then be able to create their procedures to match the policies
    7.   Monitor risks, incidents and audits




All business units within your entire enterprise will have their key personnel listed on the
organization chart and once policy is updated will be alerted via email.




Each business unit will have the responsible officer listed as well as the key personnel in the business
unit responsible for the operations related to privacy and data protection.




                  www.dataprotectionofficer.com info@dataprotectionofficer.com
Privacy impact assessment across business units and 3rd parties

All projects and business changes once approved will be able to submit their projects/changes via
the portal to the Data Protection/Privacy team for Privacy impact assessment (PIA).




                                                                    Initial survey

                                                                    PIA

                                                                    PIA
                                                                    PIA

                                                                    PIA
                                                                    PIA

                                                                    PIA



The process below depicts how your business units are able to submits projects and changes to your
privacy or Data protection team for privacy impact assessment.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Privacy audit of suppliers

The portal contains an organisational chart that also includes suppliers, the diagram below lists
suppliers and the number of information Assets your are sharing with them as well as any associated
incidents recorded against the assets.

This single interface simplifies the supplier engagement process and compliance management.




Each asset associated with the supplier is listed and can be audited, non compliances can be
registered against each asset.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Operational support of businesses

The operation support is perhaps the most likely to suffer from a resource deduction and to address
the problem we have simplified the engagement process making it possible to maintain the same
level of service to the business.

Our initial approach is the automated privacy impact assessment which determines the level of
privacy impact the project has an automatically scores the project.




The initial survey is part of the Privacy impact assessment and is designed to weed out project that
do not have any privacy impact thereby focusing only on projects with privacy risks.

This process is adequate for limited resourced teams by streamlining the end to end process and
focusing on privacy impacting projects and changes.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Privacy standard enforcement

Our strategy in this area is to automate as much of the technology based provisions available; all IT
systems that contain information assets will be automatically protected from build in order to
ensure that inherent compliance.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Managing subject Access request (SAR) and responses

Subject Access request can arrive from numerous ingress points in your organisation; the
www.dataprotectionofficer.com solution captures all your various ingress points as well as various
business units and integrates them into a single dashboard.

Every time a SAR is registered is there is an automatic tracking process that captures the request,
alerts the team and places the request on the SAR dashboard. The role of the Data Protection team
will be to ensure all requests have a response with the 40 day limit, in order to achieve this task we
have an automatic countdown that tracks the request from day zero till a response is made.




The dashboard automatically assigns a SAR ID to the SAR and allows the Data Protection/Privacy
team to carry out the admin checks and validity checks as well as be able to assign the request to an
officer for a response whilst still having overall visibility.

At 5 days left, the dashboard entry changes to Amber and sends an alert to team that a SAR has 5
days to go and has had no activity allowing the team to act on the SAR prior to breach.




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
Privacy audit of business units, projects and suppliers

The www.dataprotectionofficer.com solution automates the essential elements of a privacy audits
by automatically tracking the key audit requirements, the key audit metrics captured automatically
captured allowing remote audit and allows the focus on high level non compliances.

The key elements for our audit module include:

   1. Business units




   2.   Policies and procedures




                 www.dataprotectionofficer.com info@dataprotectionofficer.com
3.   Suppliers




4. Key performance indicators




             www.dataprotectionofficer.com info@dataprotectionofficer.com
5. Privacy process audit




6. Projects and changes




            www.dataprotectionofficer.com info@dataprotectionofficer.com
7.   Information Asset register




                  --------------The end ----------------------




             www.dataprotectionofficer.com info@dataprotectionofficer.com

Contenu connexe

Tendances

Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
How Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business FirmsHow Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business FirmsAlbrecht Jones
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Top 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM SystemTop 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM SystemSilviu Stanculet
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...Dirk Rünagel
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
Big data - The next best thing
Big data - The next best thingBig data - The next best thing
Big data - The next best thingBharath Rao
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...
Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...
Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...ARMA International
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Why records management
Why records managementWhy records management
Why records managementOMWOMA JACKSON
 
Gkn supply chain_final
Gkn supply chain_finalGkn supply chain_final
Gkn supply chain_finalDaniel Taylor
 

Tendances (18)

Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
How Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business FirmsHow Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business Firms
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Top 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM SystemTop 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM System
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Big data - The next best thing
Big data - The next best thingBig data - The next best thing
Big data - The next best thing
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...
Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...
Rina Hunter & Craig MacDonald - #InfoGov17 - Defensible Disposition (Law Firm...
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
Why records management
Why records managementWhy records management
Why records management
 
Gkn supply chain_final
Gkn supply chain_finalGkn supply chain_final
Gkn supply chain_final
 

Similaire à Data Protection Compliance In Economically Depressing Times

Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxclarebernice
 
BI powerpoint presentation
BI powerpoint presentationBI powerpoint presentation
BI powerpoint presentationDikshaNikam2
 
Essay On Implementation ERP
Essay On Implementation ERPEssay On Implementation ERP
Essay On Implementation ERPKelley Hunter
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityPrithvi Ghag
 
Using compliance initiatives like IDMP to drive forward information managemen...
Using compliance initiatives like IDMP to drive forward information managemen...Using compliance initiatives like IDMP to drive forward information managemen...
Using compliance initiatives like IDMP to drive forward information managemen...Adrian Jones
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docxDarkKnight367793
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
Information Governance Checklist and Privacy Impact Ass.docx
Information Governance Checklist and Privacy Impact  Ass.docxInformation Governance Checklist and Privacy Impact  Ass.docx
Information Governance Checklist and Privacy Impact Ass.docxcarliotwaycave
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Katleen Aems
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data IntegrationAnalytiX DS
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...AnalytixDataServices
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementchristophefeltus
 

Similaire à Data Protection Compliance In Economically Depressing Times (20)

Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
 
Bi presentation
Bi presentationBi presentation
Bi presentation
 
BI powerpoint presentation
BI powerpoint presentationBI powerpoint presentation
BI powerpoint presentation
 
Essay On Implementation ERP
Essay On Implementation ERPEssay On Implementation ERP
Essay On Implementation ERP
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
Using compliance initiatives like IDMP to drive forward information managemen...
Using compliance initiatives like IDMP to drive forward information managemen...Using compliance initiatives like IDMP to drive forward information managemen...
Using compliance initiatives like IDMP to drive forward information managemen...
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Information Governance Checklist and Privacy Impact Ass.docx
Information Governance Checklist and Privacy Impact  Ass.docxInformation Governance Checklist and Privacy Impact  Ass.docx
Information Governance Checklist and Privacy Impact Ass.docx
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 

Plus de Ben Omoakin Oguntala, developingafrica(dot)net

Plus de Ben Omoakin Oguntala, developingafrica(dot)net (16)

Developing Africa Ode Remo brochure
Developing Africa Ode Remo brochureDeveloping Africa Ode Remo brochure
Developing Africa Ode Remo brochure
 
Developing Africa - Ode Remo
Developing Africa - Ode RemoDeveloping Africa - Ode Remo
Developing Africa - Ode Remo
 
Thisday story with Oguntala
Thisday story with OguntalaThisday story with Oguntala
Thisday story with Oguntala
 
Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Risk Assessment And Risk Treatment
Risk Assessment And Risk TreatmentRisk Assessment And Risk Treatment
Risk Assessment And Risk Treatment
 
Privacy Impact Assessment Final
Privacy Impact Assessment FinalPrivacy Impact Assessment Final
Privacy Impact Assessment Final
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2
 
Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3
 
Iso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence AcquisitionIso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence Acquisition
 
Gprs/3G Troubleshooter
Gprs/3G TroubleshooterGprs/3G Troubleshooter
Gprs/3G Troubleshooter
 
Pci V2
Pci V2Pci V2
Pci V2
 
FoI
FoIFoI
FoI
 
Dpa V3
Dpa V3Dpa V3
Dpa V3
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Data Protection Compliance In Economically Depressing Times

  • 1. Case study: Data Protection (Privacy) compliance management in economically depressing times BY Ben Oguntala, LLB, LLM ben.oguntala@dataprotectionofficer.com www.dataprotectionofficer.com Copyright 2011 This paper covers: 1. Policy management and implementation including periodic review 2. Dissemination of policies and procedures to all business units 3. Assessment of business changes that impact 3rd parties 4. Privacy impact assessment across business units 5. Privacy audit of suppliers 6. Operational support of businesses 7. Privacy standard enforcement 8. Managing subject Access request and responses 9. Privacy audit of business units www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 2. Contents Introduction ............................................................................................................................................ 3 The role of the Data Protection Officer .................................................................................................. 4 Resource deficiency impact .................................................................................................................... 5 Resource responsibilities on key privacy areas....................................................................................... 6 Policy management and implementation including periodic review ..................................................... 7 Dissemination of policies and procedures to all business units ............................................................. 8 Privacy impact assessment across business units and 3rd parties .......................................................... 9 Privacy audit of suppliers ...................................................................................................................... 10 Operational support of businesses ....................................................................................................... 11 Privacy standard enforcement.............................................................................................................. 12 Managing subject Access request (SAR) and responses ....................................................................... 13 Privacy audit of business units, projects and suppliers ........................................................................ 14 www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 3. Introduction Most countries in Europe and America are faced with an austere period for the next few years and consequently most organisations within these countries especially Government and private sectors are going to be faced with the challenges of cost reduction whilst the requirements and obligations stay the same. Within the Data Protection/Privacy management sector this austere period will manifest itself in the form of reduction of Privacy staff and resources for managing the day to day requirements of a Data protection and privacy/compliance management. A reduction in resources increases the likelihood of breaching the EU Data protection directive or UK Data protection Act of 1998. The key areas impacted include: 1. Policy management and implementation including periodic review 2. Dissemination of policies and procedures to all business units 3. Assessment of business changes that impact 3rd parties 4. Privacy impact assessment across business units 5. Privacy audit of suppliers 6. Operational support of businesses 7. Privacy standard enforcement 8. Managing subject Access request and responses 9. Privacy audit of business units To address this problem, www.dataprotectionofficer.com has a portal based solution that is designed to assist Chief privacy Officers, Data Protection Officers and compliance teams in maintaining their obligations. The diagram above depicts the areas of control the www.dataprotectionofficer.com provides the data protection officer, with diminishing resources the obligations toward Data Protection compliance can still be achieved. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 4. The role of the Data Protection Officer The diagram below depicts how a typical organisation’s privacy management structure is organised; it demonstrates the key areas of concerns and the associated obligations related to them. As the resources are reduced, the key areas may be deficient and increase the propensity to breach the Data Protection Act. The solution provided by www.dataprotectionofficer.com was designed privacy lawyers and compliance Consultants; thereby it has an innate compliance capability even when there are diminishing resources. The solution also provides you with the ability to pick and choose areas you wish to automate, for example, strategy is predominantly handled by senior management and rarely change frequently. Therefore the automation will allow visibility of how effective the strategy is within your organisation and where improvements can be made. Operational support, Complaints & resources, Subject Access request, incidents and Audit & compliance are resource intensive, we have tools designed to reduce the resource intensiveness and requirements allowing your organisation to still maintain the same level of compliance by integrating the solution into your current environment. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 5. Resource deficiency impact Depending on the size of your organization, the economic depression may have varying degrees of impact, in some of situations, as a Small to medium organisation, you may be left with 1 or 2 resources to manage the entire privacy regime and in other larger organisations you may simply be left with 4 resources. With this in mind, our solution is designed to allow you to operate with minimum resources in order to achieve optimum efficiency along with key performance indicators. The numbers above may vary depending on size of the organisation. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 6. Resource responsibilities on key privacy areas The resources within privacy have specific responsibilities and if reduced may expose the area to potential breaches, our solution is designed to plug each hole in order to ensure adequate coverage should the resource reduction actually materialise. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 7. Policy management and implementation including periodic review Assuming there is only 1 resource available in this area, the www.dataprotectionofficer.com solution will enable your organisation’s resource(s) to: 1. Draft policies and procedures 2. Single click dissemination of policies to all business units 3. Single interface management of all policies, procedures and processes 4. Single dashboard view of all policies Data Protection The diagram above depicts the policy dashboard capturing the essential policies and their commensurate procedures. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 8. Dissemination of policies and procedures to all business units The policy dashboard will allow you to: 1. Create Data Protection and other privacy related policies 2. Create a group or national policy 3. Create a local policy if applicable 4. Create relevant department policies relating to the main policy 5. Assign operational responsibility for procedures to an offer 6. The responsibility will then be able to create their procedures to match the policies 7. Monitor risks, incidents and audits All business units within your entire enterprise will have their key personnel listed on the organization chart and once policy is updated will be alerted via email. Each business unit will have the responsible officer listed as well as the key personnel in the business unit responsible for the operations related to privacy and data protection. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 9. Privacy impact assessment across business units and 3rd parties All projects and business changes once approved will be able to submit their projects/changes via the portal to the Data Protection/Privacy team for Privacy impact assessment (PIA). Initial survey PIA PIA PIA PIA PIA PIA The process below depicts how your business units are able to submits projects and changes to your privacy or Data protection team for privacy impact assessment. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 10. Privacy audit of suppliers The portal contains an organisational chart that also includes suppliers, the diagram below lists suppliers and the number of information Assets your are sharing with them as well as any associated incidents recorded against the assets. This single interface simplifies the supplier engagement process and compliance management. Each asset associated with the supplier is listed and can be audited, non compliances can be registered against each asset. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 11. Operational support of businesses The operation support is perhaps the most likely to suffer from a resource deduction and to address the problem we have simplified the engagement process making it possible to maintain the same level of service to the business. Our initial approach is the automated privacy impact assessment which determines the level of privacy impact the project has an automatically scores the project. The initial survey is part of the Privacy impact assessment and is designed to weed out project that do not have any privacy impact thereby focusing only on projects with privacy risks. This process is adequate for limited resourced teams by streamlining the end to end process and focusing on privacy impacting projects and changes. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 12. Privacy standard enforcement Our strategy in this area is to automate as much of the technology based provisions available; all IT systems that contain information assets will be automatically protected from build in order to ensure that inherent compliance. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 13. Managing subject Access request (SAR) and responses Subject Access request can arrive from numerous ingress points in your organisation; the www.dataprotectionofficer.com solution captures all your various ingress points as well as various business units and integrates them into a single dashboard. Every time a SAR is registered is there is an automatic tracking process that captures the request, alerts the team and places the request on the SAR dashboard. The role of the Data Protection team will be to ensure all requests have a response with the 40 day limit, in order to achieve this task we have an automatic countdown that tracks the request from day zero till a response is made. The dashboard automatically assigns a SAR ID to the SAR and allows the Data Protection/Privacy team to carry out the admin checks and validity checks as well as be able to assign the request to an officer for a response whilst still having overall visibility. At 5 days left, the dashboard entry changes to Amber and sends an alert to team that a SAR has 5 days to go and has had no activity allowing the team to act on the SAR prior to breach. www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 14. Privacy audit of business units, projects and suppliers The www.dataprotectionofficer.com solution automates the essential elements of a privacy audits by automatically tracking the key audit requirements, the key audit metrics captured automatically captured allowing remote audit and allows the focus on high level non compliances. The key elements for our audit module include: 1. Business units 2. Policies and procedures www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 15. 3. Suppliers 4. Key performance indicators www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 16. 5. Privacy process audit 6. Projects and changes www.dataprotectionofficer.com info@dataprotectionofficer.com
  • 17. 7. Information Asset register --------------The end ---------------------- www.dataprotectionofficer.com info@dataprotectionofficer.com