SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
DPA
       A tool for managing end to Subject Access Requests.




                                                                   1
www.dataprotectionofficer.com ||| info@dataprotectionofficer.com
Overview
Key Accounts           DPA form                DPA dashboard             Reports
   • Data protection      • Linked with your      • Real time capture       • No. of SAR
     Officer                internet &              of all requests           received
   • SAR                    intranet                (Zero day               • No. of responses
     Administration       • Linked with all         detection)              • No. of breaches
     team                   Business units        • Automatically           • No. of rejections
                          • Linked with all         alerts SAR team of        and grounds
                            your business           the requests via
                                                                            • No. of requests
                            partners                email
                                                                              per month
                                                  • Captures admin
                                                                            • No. of request per
                                                    checks
                                                                              Business Unit
                                                  • Allocates an
                                                    officer to each
                                                    request
                                                  • Allows officer to
                                                    log response to
                                                    the request
                                                  • Automatically
                                                    counts down the
                                                    days left for each
                                                    request.
                                                  • Alerts SAR team &
                                                    Officer on
                                                    potential
                                                    breaches


                                                                                        2
Key accounts



               Data Protection
               Officer account




               SAR
               Administration
               Team accounts




                         3
Getting started




                  4
SAR form


Linked to Intranet

Linked to Internet

  Linked to all
 Business units

  Linked to all
Business partners

Aimed to capture
  all the ingress
  points of SAR
      requests




                            5
A completed SAR form &
     Acknowledgement




                   6
Automatic Acknowledgement to subject




                                   7
SAR Dashboard




                8
SARID is automatically
generated for the request
and registered on the
dashboard in real time.


Once the request is
registered, the 40 day
timer begins
automatically.


 The subject name is
 attached to the request
 for reference.


 An officer can be
 allocated to the request.
 He or she is alerted.


The admin & Validity
check includes option to
reject query or pass the
request.


 The response from the
 officer can be captured
 electronically or if hard
 copy noted on the
 dashboard


 The status of the request
 is maintained all
 throughout the lifecycle
 of the request.
                             SAR administration via the dashboard




9
The completed request from the dashboard




Click here to see the form




                                              10
Dashboard: Admin check




                     Options to pass, query or
                      reject a request by the SAR
                     Team




                                        11
FOI dashboard: Example of Rejection




                                      12
Allocation of an officer from the org chart




                                       Org
                                      chart


                                       13
Response to SAR requests
                                            Officer clicks on
                                               Response




                                              The response window
                                              allows
                                              the officer to select the
                                              response has been sent
                                              as well as a message to
                                              the subject.




      Option to add the response document & send by email 14
Response to SAR requests: completing the response form




                                                   15
SAR Dashboard: Completed responses




                                 16
Implementation & Contact details

• Implementation takes about 3 months to Go live.
   – Solution can be custom built and deployed within your
     network(intranet) or hosted on our secure server
     (extranet).
   – Cost vary depending on number of licenses and scale of
     implementation
• For more information please contact:
   – Mateo Isabella
      •   London Knowledge Innovation Centre
      •   South Bank Technopark
      •   90 London Road
      •   SE1 6LN
      •   0207 592 9747


                                                              17

Contenu connexe

En vedette

Modulo ii actividad 3 2 liquidos penetrantes
Modulo ii  actividad 3 2 liquidos penetrantesModulo ii  actividad 3 2 liquidos penetrantes
Modulo ii actividad 3 2 liquidos penetrantesReyni Rallp
 
Guarderia y gimnasio feelplay
Guarderia  y gimnasio feelplayGuarderia  y gimnasio feelplay
Guarderia y gimnasio feelplayKamila Orellana
 
Rolnick's Chapter on Anxiety Disorders
Rolnick's Chapter on Anxiety Disorders Rolnick's Chapter on Anxiety Disorders
Rolnick's Chapter on Anxiety Disorders Arnon Rolnick
 
Ficha de voluntariado de Askal
Ficha de voluntariado de AskalFicha de voluntariado de Askal
Ficha de voluntariado de AskalforoAskal
 
Eileen Fisher Case Analysis
Eileen Fisher Case AnalysisEileen Fisher Case Analysis
Eileen Fisher Case AnalysisPrajakta Talathi
 
Workinspace comunicado de r
Workinspace comunicado de rWorkinspace comunicado de r
Workinspace comunicado de rWorking Space
 
Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012
Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012
Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012ADICT Active Retail
 
1. La Computadora Hardware y Software
1. La Computadora  Hardware y Software1. La Computadora  Hardware y Software
1. La Computadora Hardware y Softwareangchaso
 
Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...
Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...
Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...Introspecta Taller Orientación Vocacional
 
How to Get the Most Out of Pay Per Click
How to Get the Most Out of Pay Per ClickHow to Get the Most Out of Pay Per Click
How to Get the Most Out of Pay Per ClickHubSpot
 
Channel marketing fund overview (MDF/Co-Op)
Channel marketing fund overview (MDF/Co-Op)Channel marketing fund overview (MDF/Co-Op)
Channel marketing fund overview (MDF/Co-Op)Ashish Saxena
 
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...Splunk
 
Future Startup Hero - Emprendimiento
Future Startup Hero - Emprendimiento Future Startup Hero - Emprendimiento
Future Startup Hero - Emprendimiento Arturo Coral
 
Sílabo SIG II 2014(2)
Sílabo SIG II 2014(2)Sílabo SIG II 2014(2)
Sílabo SIG II 2014(2)cigmaespe2015
 
Dreaming, Exploring, Locating: Understanding the new customer journey
Dreaming, Exploring, Locating: Understanding the new customer journeyDreaming, Exploring, Locating: Understanding the new customer journey
Dreaming, Exploring, Locating: Understanding the new customer journeyFITCH
 
Administrators guide for avaya communication manager
Administrators guide for avaya communication managerAdministrators guide for avaya communication manager
Administrators guide for avaya communication manageraptivajhc
 
Livro os fundamentos da física - termologia, óptica e ondas
Livro os fundamentos da física - termologia, óptica e ondas Livro os fundamentos da física - termologia, óptica e ondas
Livro os fundamentos da física - termologia, óptica e ondas Sharzwenny Silva
 

En vedette (20)

Modulo ii actividad 3 2 liquidos penetrantes
Modulo ii  actividad 3 2 liquidos penetrantesModulo ii  actividad 3 2 liquidos penetrantes
Modulo ii actividad 3 2 liquidos penetrantes
 
Guarderia y gimnasio feelplay
Guarderia  y gimnasio feelplayGuarderia  y gimnasio feelplay
Guarderia y gimnasio feelplay
 
Rolnick's Chapter on Anxiety Disorders
Rolnick's Chapter on Anxiety Disorders Rolnick's Chapter on Anxiety Disorders
Rolnick's Chapter on Anxiety Disorders
 
Ficha de voluntariado de Askal
Ficha de voluntariado de AskalFicha de voluntariado de Askal
Ficha de voluntariado de Askal
 
Auto, 03.2008
Auto, 03.2008Auto, 03.2008
Auto, 03.2008
 
Eileen Fisher Case Analysis
Eileen Fisher Case AnalysisEileen Fisher Case Analysis
Eileen Fisher Case Analysis
 
Sanford School Internship Guide - Updated 12/2015
Sanford School Internship Guide - Updated 12/2015Sanford School Internship Guide - Updated 12/2015
Sanford School Internship Guide - Updated 12/2015
 
Workinspace comunicado de r
Workinspace comunicado de rWorkinspace comunicado de r
Workinspace comunicado de r
 
Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012
Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012
Presentación App ShopADict y ADICT Ceremonia Premios Sabor del Año 2012
 
HR Marketing
HR MarketingHR Marketing
HR Marketing
 
1. La Computadora Hardware y Software
1. La Computadora  Hardware y Software1. La Computadora  Hardware y Software
1. La Computadora Hardware y Software
 
Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...
Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...
Descubre tu Vocación: Ingeniería en Sistemas | Panorama laboral | ¿Cuánto gan...
 
How to Get the Most Out of Pay Per Click
How to Get the Most Out of Pay Per ClickHow to Get the Most Out of Pay Per Click
How to Get the Most Out of Pay Per Click
 
Channel marketing fund overview (MDF/Co-Op)
Channel marketing fund overview (MDF/Co-Op)Channel marketing fund overview (MDF/Co-Op)
Channel marketing fund overview (MDF/Co-Op)
 
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
 
Future Startup Hero - Emprendimiento
Future Startup Hero - Emprendimiento Future Startup Hero - Emprendimiento
Future Startup Hero - Emprendimiento
 
Sílabo SIG II 2014(2)
Sílabo SIG II 2014(2)Sílabo SIG II 2014(2)
Sílabo SIG II 2014(2)
 
Dreaming, Exploring, Locating: Understanding the new customer journey
Dreaming, Exploring, Locating: Understanding the new customer journeyDreaming, Exploring, Locating: Understanding the new customer journey
Dreaming, Exploring, Locating: Understanding the new customer journey
 
Administrators guide for avaya communication manager
Administrators guide for avaya communication managerAdministrators guide for avaya communication manager
Administrators guide for avaya communication manager
 
Livro os fundamentos da física - termologia, óptica e ondas
Livro os fundamentos da física - termologia, óptica e ondas Livro os fundamentos da física - termologia, óptica e ondas
Livro os fundamentos da física - termologia, óptica e ondas
 

Similaire à Dpa V3

Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersVenafi
 
Three Trigger-Ready Flows You Can Build Today
Three Trigger-Ready Flows You Can Build TodayThree Trigger-Ready Flows You Can Build Today
Three Trigger-Ready Flows You Can Build TodayPatrick Sheil
 
AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...
AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...
AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...WASdev Community
 
Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Andrew Miller
 
Discovery, Inventory and Application Recognition
Discovery, Inventory and Application RecognitionDiscovery, Inventory and Application Recognition
Discovery, Inventory and Application RecognitionFlexera
 
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAndrew Miller
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsSolarWinds
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Glen Roberts, CISSP
 
Online reservation application
Online reservation applicationOnline reservation application
Online reservation applicationMituram Roy
 
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeterCA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeterCA Technologies
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyTyler Shields
 
Real User Experience Insight External
Real User Experience Insight ExternalReal User Experience Insight External
Real User Experience Insight Externaloracleonthebrain
 
Myths of validation
Myths of validationMyths of validation
Myths of validationJeff Thomas
 

Similaire à Dpa V3 (20)

FoI
FoIFoI
FoI
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Lms final ppt
Lms final pptLms final ppt
Lms final ppt
 
Flopsar-UK (3)
Flopsar-UK (3)Flopsar-UK (3)
Flopsar-UK (3)
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Three Trigger-Ready Flows You Can Build Today
Three Trigger-Ready Flows You Can Build TodayThree Trigger-Ready Flows You Can Build Today
Three Trigger-Ready Flows You Can Build Today
 
AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...
AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...
AAI-2013 Preparing to Fail: Practical WebSphere Application Server High Avail...
 
Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology
 
Discovery, Inventory and Application Recognition
Discovery, Inventory and Application RecognitionDiscovery, Inventory and Application Recognition
Discovery, Inventory and Application Recognition
 
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) Solutions
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Online reservation application
Online reservation applicationOnline reservation application
Online reservation application
 
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeterCA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
Co p
Co pCo p
Co p
 
ADF Performance Monitor
ADF Performance MonitorADF Performance Monitor
ADF Performance Monitor
 
Real User Experience Insight External
Real User Experience Insight ExternalReal User Experience Insight External
Real User Experience Insight External
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
 

Plus de Ben Omoakin Oguntala, developingafrica(dot)net

Plus de Ben Omoakin Oguntala, developingafrica(dot)net (15)

Developing Africa Ode Remo brochure
Developing Africa Ode Remo brochureDeveloping Africa Ode Remo brochure
Developing Africa Ode Remo brochure
 
Developing Africa - Ode Remo
Developing Africa - Ode RemoDeveloping Africa - Ode Remo
Developing Africa - Ode Remo
 
Thisday story with Oguntala
Thisday story with OguntalaThisday story with Oguntala
Thisday story with Oguntala
 
Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Risk Assessment And Risk Treatment
Risk Assessment And Risk TreatmentRisk Assessment And Risk Treatment
Risk Assessment And Risk Treatment
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
 
Privacy Impact Assessment Final
Privacy Impact Assessment FinalPrivacy Impact Assessment Final
Privacy Impact Assessment Final
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2
 
Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3
 
Iso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence AcquisitionIso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence Acquisition
 
Gprs/3G Troubleshooter
Gprs/3G TroubleshooterGprs/3G Troubleshooter
Gprs/3G Troubleshooter
 
Pci V2
Pci V2Pci V2
Pci V2
 

Dpa V3

  • 1. DPA A tool for managing end to Subject Access Requests. 1 www.dataprotectionofficer.com ||| info@dataprotectionofficer.com
  • 2. Overview Key Accounts DPA form DPA dashboard Reports • Data protection • Linked with your • Real time capture • No. of SAR Officer internet & of all requests received • SAR intranet (Zero day • No. of responses Administration • Linked with all detection) • No. of breaches team Business units • Automatically • No. of rejections • Linked with all alerts SAR team of and grounds your business the requests via • No. of requests partners email per month • Captures admin • No. of request per checks Business Unit • Allocates an officer to each request • Allows officer to log response to the request • Automatically counts down the days left for each request. • Alerts SAR team & Officer on potential breaches 2
  • 3. Key accounts Data Protection Officer account SAR Administration Team accounts 3
  • 5. SAR form Linked to Intranet Linked to Internet Linked to all Business units Linked to all Business partners Aimed to capture all the ingress points of SAR requests 5
  • 6. A completed SAR form & Acknowledgement 6
  • 9. SARID is automatically generated for the request and registered on the dashboard in real time. Once the request is registered, the 40 day timer begins automatically. The subject name is attached to the request for reference. An officer can be allocated to the request. He or she is alerted. The admin & Validity check includes option to reject query or pass the request. The response from the officer can be captured electronically or if hard copy noted on the dashboard The status of the request is maintained all throughout the lifecycle of the request. SAR administration via the dashboard 9
  • 10. The completed request from the dashboard Click here to see the form 10
  • 11. Dashboard: Admin check Options to pass, query or reject a request by the SAR Team 11
  • 12. FOI dashboard: Example of Rejection 12
  • 13. Allocation of an officer from the org chart Org chart 13
  • 14. Response to SAR requests Officer clicks on Response The response window allows the officer to select the response has been sent as well as a message to the subject. Option to add the response document & send by email 14
  • 15. Response to SAR requests: completing the response form 15
  • 16. SAR Dashboard: Completed responses 16
  • 17. Implementation & Contact details • Implementation takes about 3 months to Go live. – Solution can be custom built and deployed within your network(intranet) or hosted on our secure server (extranet). – Cost vary depending on number of licenses and scale of implementation • For more information please contact: – Mateo Isabella • London Knowledge Innovation Centre • South Bank Technopark • 90 London Road • SE1 6LN • 0207 592 9747 17