SlideShare une entreprise Scribd logo
1  sur  70
Télécharger pour lire hors ligne
MRS GDPR Master Class:
Accountable Research
Organisations
January 2018
Objectives for
Today
To help participants
Develop awareness of the legal framework and context for
data protection and build confidence around responsibilities
Identify key actions for research organisations to embed the
accountability requirements of the GDPR
Share best legal and ethical practice in the market research
sector
2
Agenda Topics
10:00 – 10:05 Introductions and welcome
10:05 – 10:30 The Changing Face of Compliance:
GDPR & UK DPA 2018
10:30– 11:15 Organisational Accountability Measures
(DPO’s; record-keeping; data retention;
subject access requests)
11:15 – 11:30 Coffee and Networking Break
11:30 – 12:20 GDPR Compliant Policies & Procedures
(Contract terms; data protection policies;
privacy information notices)
12:20– 12:50 Data security and breach reporting
12:50 – 13:00 Closing questions/Discussion
3
The Changing Face
of Compliance: Key
principles in GDPR
& DPA 2018
Session Topics
Some context behind GDPR
Key definitions
Privacy principles
Risk-based demonstrable compliance
Update UK DPA 2018
5
Some context
GDPR applies from 25th May 2018
Data Protection Act 2018 will be introduced in the UK to bring
GDPR into law
Evolutionary not revolutionary:
Fairness, transparency, accuracy, security, minimisation and
respect for individuals all remain from current legislation, plus:
Strengthened individual rights
Increased business accountability
Embedded privacy-centric focus
Extra territorial
reach
GLOBAL
REACH
EU data
controllers and
processors
processing data
of EU residents
Other data
processors and
controllers offering
goods or services to
individuals in the EU
Other data
processors and
controllers
monitoring
behaviour of
individuals in the
EU
Regulation v.
national law
Current privacy framework is a Directive:
Each EU state has own law and own interpretation
GDPR is a directly applicable Regulation:
…but Member States can legislate on specific areas including
employment and research
The Regulators
In the UK Information Commissioner’s Office (ICO) will regulate
the Data Protection Act 2018
In the EU the European Data Protection Board (EDPB) will
regulate the GDPR and ICO will be part of this
BREXIT negotiations to determine regulatory arrangements after
March 2019
Enhanced Fines
Fines may be imposed instead of, or in addition to, measures that
may be ordered by supervisory authorities. There are two tiers of
administrative fines:
- Some contraventions will be subject to administrative fines
of up to €10,000,000 or, 2% of global turnover, whichever is
the higher
- Others will be subject to administrative fines of up to
€20,000,000 or 4% of global turnover, whichever is the
higher
Higher fines for breaches of basic principles including consent
conditions, data subject rights, transfers and non-compliance with
orders by supervisory authorities
New definition of
personal data
Definition of Personal Data has been expanded:
- Data from which a living individual is identifiable (by anyone)
directly or indirectly
- From data
- From data and other information which is in the possession of,
or is likely to come into the possession of, the data controller
- Includes any expression of opinion about an individual and any
indication of the intentions of the data controller or any other
person in respect of the individual
Types of Data
Three types of data:
Identifiable Data: data that identifies a data subject
Anonymous Data: data from which no individuals can be
identified - outside the scope of the Data Protection Act 2018 and
GDPR (but not the Code!)
Pseudonymous Data: Personal data that has been processed so
that it can no longer be attributed to a specific data subject
without the use of additional information e.g. coded data sets
that can not identify individuals without a “key”
New definition of
sensitive data
Sensitive data is classified as “special categories of personal data”
Sensitive data: race or ethnic origin, political opinions, religious
or philosophical beliefs, trade union membership, data concerning
health or sex life and sexual orientation
PLUS new categories genetic and biometric data
Personal data relating to criminal convictions and offences are not
included but similar safeguards apply
Definition of
Controllers and
Processors
Controller means the natural or legal person, public authority, agency of
any other body which alone or jointly with others determines the
purposes and means of the processing of personal data
Processor means a natural or legal person, public authority, agency or
any other body which processes personal data on behalf of the controller
If you are a processor: the GDPR places specific legal obligations on you,
including requirement to maintain records of personal data and
processing activities. You also have legal liability for any breaches
If you are a controller: you are not relieved of your obligations where
processors ae involved – the legislation places further obligations on
your to ensure your contracts with processors comply with the GDPR
Privacy principles:
Bedrock of GDPR
1
Privacy by
Design and
Default
Privacy by Design
and Default
1
Organisational
measures
Technical
safeguards
Privacy Impact
Assessment (PIA)
Risk-based
demonstrable
compliance
Organisations must fully consider the risks that processing poses
to the fundamental rights and freedoms of individuals.
What does this mean?
 Identify risky processing activities
 Consider implications of the risk level
 Mitigate any risks
Processing
research data
Three options available for research processing:
Consent - specific, informed and freely given consent through clear
affirmative action
Legitimate interest - based on reasonable expectations and provided
does not override the rights of individuals (research is a compatible
purpose)
Research exemption - (if implemented) where impossible to conduct
research otherwise but subject to adoption of technical and
organisational measures to limit collection to the minimum and use of
methods that de-identify
Other grounds apply but less likely to be used in research such as on
contract; compliance with legal obligation; vital interests of data subject;
public interests
Update on UK DPA
2018: Research
exemption
Scientific research in the public interest
• Scientific research broadly defined
• Exemption provides limited flexibilities on some aspects
• In determining public interest conduct balancing test that considers
rights of individuals and the public interest
• Sound methodological techniques, recognised ethical safeguards
and robust technical and organisational measures are all critical
1
Organisational
Accountability
Measures
Session Topics
Appointment of Data Protection Officer
Research agency record keeping requirements
Data retention policies
Handling subject access requests
2
DPO: New GDPR
Requirement
• regularly and systematically monitoring of
individuals on a large scale?
• processing sensitive personal data on a large
scale?
• a public authority?
Are you?
2
DPO: Mandatory for
many research
businesses
Number of data subjects (as
a specific number or
proportion of relevant
population)
Volume of data and/or range
of different items being
processed
Duration or permanence of
processing
Geographical extent
Large Scale
Data Processing
DPO: Compliance &
Liaison Role
Core role includes:
 Informing and advising on obligations to comply with the
GDPR and other data protection laws
 Monitoring compliance, including managing internal data
protection activities, training data processing staff, and
conducting internal audits
 Advising on data protection impact assessments
 Working, cooperating with and serving as the contact point
for ICO
 Dealing with inquiries from data subjects on exercise of
rights
2
DPO: Independent &
well resourced
High level appointment who must have:
 sufficient corporate resources to fulfil functions and for
own ongoing training
 access to data processing personnel and operations of
business
 significant independence in performance of the roles, and
direct reporting line “to the highest management level”
 high job security
may also perform other tasks and duties provided they do
not create conflicts of interest
Can either appoint an employee or outsource to a
consultancy service
2
DPO: Expert &
Experienced
Level of expertise depends on complexity of data
processing activities:
 Higher level of expertise required if processing more
sensitive categories of data or if often cross-border
transfers
 Expertise in national and European data protection laws
and practices and an in-depth understanding of the GDPR
 Knowledge of the research sector and understand
processing operations, information systems, data security
and data protection needs of controller
2
Business Impact –
Burdens and Benefits
- Effective way to
increase overall
compliance of
business
- Increased
public/client trust and
reputational benefit
- Additional initial and
ongoing compliance
burden
- Monetary penalty
for failure to appoint
2
DPO Checklist:
Action Points
 Determine whether appointment is necessary or desirable
 Decide between outsourcing the role or appointing an
employee
 Consider conflicts of interest before appointing current
employee
 Ensure role has sufficient autonomy and resources
 Appoint the DPO
 Publish contact details of DPO and advise ICO
2
Record-keeping for
research agencies
Written records of
data processing
(exemptions for small
business not useful for
agencies)
Types of records
depend on
whether acting as
a data controller
or data processor
Need to consider
whether kept up
to date and who is
responsible
Record keeping
requirements
Data Controller (s) Data Processors
Name and contact details (also that of other
controllers, data representatives and data
protection officers)
Name and contact details (also that of data
controllers, representatives, data protection
officer)
Purpose (s) of processing Categories of processing (on behalf of each
controller)
Description of categories of individuals and
categories of personal data
Details of transfers to third countries
Categories of recipients of personal data
(including those in third countries or
international organisations)
Description of technical and organisational
security measures
Details of data transfers to third countries
Retention schedules
Description of technical and organisational
security measures
Record Keeping
Checklist
 If over 250 employees written records of data processed must be kept
 If fewer than 250 employees, written records only required if
processing activities are risky, frequent or include sensitive personal
data
 Types of records depend on whether acting as a data controller or a
data processor
 Need to ensure that records are kept up to date
Data retention:
Interlinked
principles
Data
retention
Data
minimisation
Transparency
Is there a fixed
retention period?
 Different types of personal data records are likely to require different
retention periods.
 In deciding time limits consider if need to keep the data, delete it or
archive it?
 Current and future value?
 Costs, risks and liabilities of keeping?
 Ease or difficulty of ensuring up to date?
 Is there a relevant legal or regulatory requirement?
 Remember if information is retained there is a risk that it will become
inaccurate, out of date or irrelevant and generally it can be accessed
by subject access requests
3
Template for Data
Retention
Type of Data Retention Period Reason
Personnel Files 6 years from end employment References
Income Tax and NI 3 years after the end of the
financial year to which it relates
Income Tax Regulations
Member Application Forms 4 years To respond to member queries
and facilitate financial and audit
requirements
Customer data Permanent Suppression from list
Primary research data with
personal data
1 year from end of project Client contractual obligations;
Quality control
3
For Illustrative purposes only
Data Retention
Checklist
 Establish retention periods for different types of date including personal
research data
 Consider purpose in deciding how long to keep it for
 Is there a minimum statutory period? If not set out in privacy policies
and terms of business
 Review and adhere to your organisational data retention policy for all
different types of records – the shorter the time periods the better
 Ensure retention periods included in privacy notices
 Ensure suppliers and third parties working with your organisation’s data
understand and adhere to any data retention and deletion policies
 Update, archive or securely delete if data goes out of date
 Check with IT how deletion should be undertaken
 Conduct annual audit of data and/or periodic reviews
 Document all decisions on data retention and destruction
3
Subject access requests:
Overview
3
Criteria GDPR
Time period to respond 30 days (DPA 40 days)
Content of response Allow individual to know what information is held and what
processing is being carried out; may need to provide further
information such as data retention period and right to have
inaccurate data provided
Right to withhold If disclosure would “adversely affect the rights and freedoms
of others”
Fee Free (unless manifestly unfounded or excessive) but
reasonable charge for further copies (DPA £10 fee)
Electronic access Must be possible to make requests electronically and where
request is electronic response should be as well
Subject Access
Requests: What steps
should you take to
prepare?
• Develop policies to ensure sufficient to cover subject access requests,
data portability requests, requests to be forgotten or restrict use of
personal data
• Check which records will be covered by data portability requests
• Update procedures to handle within new timeframes
• Develop template responses
• Assess ability to identify personal data relating to an individual and
provide to them
• Appoint nominated individual(s) to deal with requests and ensure trained
• Develop performance dashboards especially for panels or online
communities
Coffee Break
GDPR Compliant
Policies and
Procedures
GDPR Myth-Busting
– True or False?
Commissioning clients
will need consent from
their customers to send
agencies details of their
customer database
All personal data
records must be
destroyed
GDPR will still apply
after Brexit
Organisations do not
need to file
notifications with the
ICO
Session Topics
Contracts in the research supply chain
Privacy information notices
Internal data protection policies
4
Contracts
required along
the supply chain
Freelance Recruiters
Fieldwork Agency/Freelance Interviewers
Research Agency
Client
Data controller, joint
data controller or
processor?
Data
Processor
Data
Controller (s)
4
Different yet similar
obligations
Data
Controller(s)
Data Processor
But also similar
obligations
•Lead responsibility
•Direct responsibilities e.g. Required
to conduct DPIA; Point of contact
for individuals; Audit of DP
responsibilities
•Contractual obligations
•Direct responsibilities
•Contractual obligations e.g. seek
approvals e.g. to appoint sub-
processor or data transfers out of
EEA
•Appointment of DPO; record-
keeping; technical and
organisational measures; privacy by
design and default, lawful basis for
processing; data breach notification
GDPR compliant
contracts - Processors
and sub-processors
Written contracts between controllers and processors are mandatory and must
contain specific minimum terms.
Points to consider and reflect in contract include:-
 Details of the specific processing activities e.g. subject matter and duration; nature
and purpose; type of personal data and categories of data subject; obligations and rights
of controller
 Terms requiring the processor to:
 Only act on written instructions of DC
 Ensure people processing subject to duty of confidence
 Appropriate security measures
 Assist DC in providing subject access and allowing data subjects to exercise rights
 Assist DC in meeting obligations regarding security; data breach notification; DPIA’s
 Delete or return all personal data to controller as requested at end of contract
 Submit to audit/inspection and ensure both meeting obligations by notifying DC if
doing something contrary to GDPR
GDPR compliant
contracts - Other
controllers?
 Additionally also consider as joint data controller:
• Research parameters such as outputs and
standard for delivery of anonymised data; Re-
contact consents
• Liabilities, assurances and indemnities
• Joint legal controllers allocation of
responsibilities on data subject requests,
applicable privacy policies
Are there any
standard contracts
available?
 Standard contract clauses for controller-processor contracts to be
developed by EU Commission and authorities such as ICO
 Clauses in GDPR Codes and certification schemes (in time) will
also meet some of compliance obligations
Contract Checklist:
Action Points
 Understand where you act as joint data controller or data
processor
 Review and revise legacy contracts (clients, freelancers
and other research suppliers)
 Allocate responsibilities between joint controllers and
agree co-operation approach with data processors e.g.
data breach reporting; data subject requests
 Consider apportionment of liability and risks (what cap do
you need? What level of insurance do you have? Are
indemnities needed? How is liability level reflected in price
of services?)
 Ensure mandatory terms reflected in contract
GDPR: External and
Internal Policies
• Privacy Information Notice
 Client requirements e.g.
procurement, due diligence
 Customer communication e.g.
what data is collected, how it is
used, etc.
• Data Protection Policy
 Parameters for activities and
organizations
 Core to staff and supplier terms
and conditions
 Appropriate behaviour and practice
4
Privacy Information
Notice
Starting point is:
 who you are;
 what you are going to do with participant information; and
 who it will be shared with.
Also consider including:
 what you are doing to ensure the security of personal
information;
 information about participants right of access to their data and
their right to withdraw consent; and
 what you will not do with their data (such as use it for marketing
purposes).
Privacy information notices will be required regardless of the
legal ground being used.
How to deliver
the information
effectively?
Transparent user-centric notices
Tailored
Layered
Blended
First Layer Information –
Actively provide this
information
Actively provide:
 name of research organisation collecting the data and any client organisation
 general subject
 purpose
 any sensitive data collection
 whether the data collection will be recorded and/or observed
 guarantee of participant anonymity and/or confidentiality
 right to access data
 right to withdraw consent
 right to object to processing
 description of any reasonably foreseeable risks (including physical or emotional harm and
discomfort or embarrassment) particularly in qualitative research projects
 details of any international data transfer to third countries in the absence of an adequacy
decision and appropriate safeguards
 length in minutes of data collection
 re-contact details including when re-contact will occur; the purpose and by who
 costs likely to be incurred by the participant (if appropriate)
 assurance that the activity is being collected in accordance with the MRS Code of Conduct
Second Layer Information
- Make this information
accessible
Make accessible:
 who will administer incentives, what it will be; when it will be received; any conditions
attached
 generic contact details for data protection officer (if applicable)
 details of any international data transfer to third countries considered adequate by the EU
 retention period for data or criteria for retention
 right to lodge a complaint with the supervisory authority in the Member State of residence,
place of work or alleged breach of GDPR. In the UK this is the ICO
 right to port data (if automated data collection)
 right to erasure of any personal data made public
 right to restrict processing
 right to rectify data held
Internal Data
Protection Policy
Core part of the accountability principle
Data and privacy policies should accurately cover:
 data activities
 data and privacy processes
 lines of responsibility (where appropriate)
 monitoring and audit arrangements
Need to reflect both legal and ethical requirements
Internal Policies: Some
Useful Headings
 Scope and Coverage
 General & Privacy
 Data Collection
 Data Use
 Data Accuracy & Cleansing
 Data Access & Sharing
 Data Retention
 Third Party Data
 Data Transfer
 Data Deletion &/or Destruction
 Data Monitoring & Audit
 Sub-Contractors
 Data Breach Reporting
 Data Policy Development
 Bring your own device
Data Policies:
Checklist
 Audit existing policies and practices
 What data exists?
 How’s it being stored?
 How’s it being used?
 Who has access and who needs access?
 How’s it being secured?
 Strengthen data policies and procedures
 Ensure external notice transparent and user friendly
 Check internal policy is robust and tailored to your organisation
 Establish systems to incorporate new data subject rights
 Educate, train staff and raise awareness
Data security and
breach reporting
Session Topics
Data security
Personal data breach notifications
Data security breach management
5
59
GDPR: Data Security
Principle
 DPA – Data Security Appropriate technical and
organisational measures
 GDPR - Integrity and Confidentiality – Personal
data should be kept secure.
6
Data Security
Pseudonymisation Encryption Hashing
Password
protection
other state of the
art
Data Security
checklist
Consider the following when assessing whether their technical and organisation measures are
appropriate:
 Are the automated systems protected by a level of security appropriate to the data held?
 Are technical measures in place to restrict access to systems holding personal data?
 Are technical measures in place to secure data during transit (e.g. to subcontractors and
interviewers)?
 How is the data stored by your sub-contractors and interviewers – is it adequate and
appropriate?
 Are the premises on which the data is held secure?
 Is access to the premises restricted?
 If the data is held on non-automated systems e.g. paper files, discs, microfilm, and
microfiche, is access still restricted or secure?
 Are copies of printouts, obsolete back-up tapes etc. disposed securely?
 Is obsolete hardware and software from which data could be recovered disposed of
securely?
 Is there an auditable data retention and destruction policy?
 Are staff trained and made aware of their responsibilities to safeguard the personal data?
Personal data breach
notifications
If you are made aware of a personal data
breach
Is the breach a risk to individuals? If yes
tell supervisory authority (if no then
document personal data breach)
Is breach “high risk”? If yes tell affected
individuals (if no end of process)
What are the
timelines for
notification?
 Inform regulators ‘without undue delay’ and ‘not later than 72
hours’ that a breach has taken place
 If notification not be made in time, then there must be ‘reasoned
justification’ for the delay
Data security breach
notification process
•response to incident should include a recovery plan
•procedures for damage limitation
1.Containment
and recovery
•assess risks as these affect what you do once the breach
has been contained
•consider potential adverse consequences for individuals
(severity and likelihood of risk)
•Critical consideration for GDPR notification
2.Assessing the
Risks
Data security breach
notification process
• Establish process for notification to DPA,
individual and controller
3.Notification
• investigate the causes of the breach and also
evaluate the effectiveness of your response to it
• Build in effective ways of detecting breaches
• If necessary, then update your policies and
procedures accordingly
4. Evaluation
and Response
And the last word
on GDPR
compliance …..
Responsibly assess the risks and
then document, document,
document and document …….
What’s coming
next?
MRS guidance &
awareness
Guidance
• MRS EFAMRO ESOMAR Guidance Note on Research Sector – Legal Bases (June 2017)
• GDPR In Brief – 7 GDPR topics covered to date
• Data Protection & Market Research: Guidance for MRS members (February 2018; April 2018)
• Fair Data, Impact, MRS Blogs and Articles
Live and Recorded Webinars
• GDPR Countdown (May 2017)
• MRS AURA Client Side Research (November 2017)
• RAS GDPR (March 2018)
• Off the Starting Blocks (March 2018)
Events
• MRS Roadshow (Leeds, Bristol, Edinburgh, Brighton, Birmingham, London March to July 2018)
• Association events e.g. EphMra; Cvent
• GDPR Master Class – Accountable Research Organisations (January 2018)
• GDPR Master Class – Transparent Research Projects (April 2018)
• Company Partner Briefings (Ongoing)
Thank you
Any questions?

Contenu connexe

Tendances

GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non expertsClaudio Bolla, CISM
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)RAKESH S
 
A practical guide to GDPR preparation
A practical guide to GDPR preparationA practical guide to GDPR preparation
A practical guide to GDPR preparationPromapp Solutions
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Ulf Mattsson
 
The Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsThe Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsElliot Reeman
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPRPaul O'Carroll
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleUlf Mattsson
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
GDPR and personal data protection in EU research projects
GDPR and personal data protection in EU research projectsGDPR and personal data protection in EU research projects
GDPR and personal data protection in EU research projectsLorenzo Mannella
 
GDPR Compliance Software | General Data Protection Regulation (GDPR) Dashboard
GDPR Compliance Software | General Data Protection Regulation (GDPR) DashboardGDPR Compliance Software | General Data Protection Regulation (GDPR) Dashboard
GDPR Compliance Software | General Data Protection Regulation (GDPR) DashboardCorporater
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findwise
 
General data protection regulation gdpr audit 2018
General data protection regulation gdpr audit 2018General data protection regulation gdpr audit 2018
General data protection regulation gdpr audit 2018Fraser Hay
 

Tendances (20)

GDPR
GDPRGDPR
GDPR
 
GDPR
GDPRGDPR
GDPR
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
A practical guide to GDPR preparation
A practical guide to GDPR preparationA practical guide to GDPR preparation
A practical guide to GDPR preparation
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 
The Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsThe Countdown to the GDPR Regulations
The Countdown to the GDPR Regulations
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? Article
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
GDPR and personal data protection in EU research projects
GDPR and personal data protection in EU research projectsGDPR and personal data protection in EU research projects
GDPR and personal data protection in EU research projects
 
GDPR Compliance Software | General Data Protection Regulation (GDPR) Dashboard
GDPR Compliance Software | General Data Protection Regulation (GDPR) DashboardGDPR Compliance Software | General Data Protection Regulation (GDPR) Dashboard
GDPR Compliance Software | General Data Protection Regulation (GDPR) Dashboard
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
 
General data protection regulation gdpr audit 2018
General data protection regulation gdpr audit 2018General data protection regulation gdpr audit 2018
General data protection regulation gdpr audit 2018
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 

Similaire à GDPR master class accountable research organisations (january 2018)

GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
De groote de man Ingrid de Poorter
De groote de man Ingrid de PoorterDe groote de man Ingrid de Poorter
De groote de man Ingrid de PoorterBigDataExpo
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkPECB
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
GDPR for Security Professionals
GDPR for Security ProfessionalsGDPR for Security Professionals
GDPR for Security ProfessionalsSaumya Vishnoi
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protectionMRS
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
GDPR - The new era of data protection
GDPR - The new era of data protectionGDPR - The new era of data protection
GDPR - The new era of data protectionInterlogica
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 

Similaire à GDPR master class accountable research organisations (january 2018) (20)

GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
De groote de man Ingrid de Poorter
De groote de man Ingrid de PoorterDe groote de man Ingrid de Poorter
De groote de man Ingrid de Poorter
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
GDPR for Security Professionals
GDPR for Security ProfessionalsGDPR for Security Professionals
GDPR for Security Professionals
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
GDPR - The new era of data protection
GDPR - The new era of data protectionGDPR - The new era of data protection
GDPR - The new era of data protection
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 

Plus de MRS

Covid 19 research - wave 2
Covid 19 research - wave 2 Covid 19 research - wave 2
Covid 19 research - wave 2 MRS
 
Respondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness projectRespondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness projectMRS
 
Supporting good Mental Health at Work
Supporting good Mental Health at Work Supporting good Mental Health at Work
Supporting good Mental Health at Work MRS
 
MRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA NetworkMRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA NetworkMRS
 
Big Semiotics - May 2019
Big Semiotics - May 2019Big Semiotics - May 2019
Big Semiotics - May 2019MRS
 
Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...MRS
 
How to write an Oppies Award Entry
How to write an Oppies Award EntryHow to write an Oppies Award Entry
How to write an Oppies Award EntryMRS
 
MRS Roadshow 2019
MRS Roadshow 2019MRS Roadshow 2019
MRS Roadshow 2019MRS
 
BBC Media Action - 2019
BBC Media Action - 2019BBC Media Action - 2019
BBC Media Action - 2019MRS
 
Using VR for immersion and audience engagement
Using VR for immersion and audience engagementUsing VR for immersion and audience engagement
Using VR for immersion and audience engagementMRS
 
Humans v tech
Humans v tech Humans v tech
Humans v tech MRS
 
Planning for new communities
Planning for new communitiesPlanning for new communities
Planning for new communitiesMRS
 
Women in Ads
Women in AdsWomen in Ads
Women in AdsMRS
 
Grooming and well-being
Grooming and well-beingGrooming and well-being
Grooming and well-beingMRS
 
Leveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic dataLeveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic dataMRS
 
MRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source AnalyticsMRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source AnalyticsMRS
 
BBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRSBBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRSMRS
 
Skin Deep: GSR
Skin Deep: GSRSkin Deep: GSR
Skin Deep: GSRMRS
 
Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.MRS
 
The Dropout Challenge
The Dropout ChallengeThe Dropout Challenge
The Dropout ChallengeMRS
 

Plus de MRS (20)

Covid 19 research - wave 2
Covid 19 research - wave 2 Covid 19 research - wave 2
Covid 19 research - wave 2
 
Respondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness projectRespondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness project
 
Supporting good Mental Health at Work
Supporting good Mental Health at Work Supporting good Mental Health at Work
Supporting good Mental Health at Work
 
MRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA NetworkMRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA Network
 
Big Semiotics - May 2019
Big Semiotics - May 2019Big Semiotics - May 2019
Big Semiotics - May 2019
 
Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...
 
How to write an Oppies Award Entry
How to write an Oppies Award EntryHow to write an Oppies Award Entry
How to write an Oppies Award Entry
 
MRS Roadshow 2019
MRS Roadshow 2019MRS Roadshow 2019
MRS Roadshow 2019
 
BBC Media Action - 2019
BBC Media Action - 2019BBC Media Action - 2019
BBC Media Action - 2019
 
Using VR for immersion and audience engagement
Using VR for immersion and audience engagementUsing VR for immersion and audience engagement
Using VR for immersion and audience engagement
 
Humans v tech
Humans v tech Humans v tech
Humans v tech
 
Planning for new communities
Planning for new communitiesPlanning for new communities
Planning for new communities
 
Women in Ads
Women in AdsWomen in Ads
Women in Ads
 
Grooming and well-being
Grooming and well-beingGrooming and well-being
Grooming and well-being
 
Leveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic dataLeveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic data
 
MRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source AnalyticsMRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source Analytics
 
BBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRSBBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRS
 
Skin Deep: GSR
Skin Deep: GSRSkin Deep: GSR
Skin Deep: GSR
 
Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.
 
The Dropout Challenge
The Dropout ChallengeThe Dropout Challenge
The Dropout Challenge
 

Dernier

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 

Dernier (20)

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 

GDPR master class accountable research organisations (january 2018)

  • 1. MRS GDPR Master Class: Accountable Research Organisations January 2018
  • 2. Objectives for Today To help participants Develop awareness of the legal framework and context for data protection and build confidence around responsibilities Identify key actions for research organisations to embed the accountability requirements of the GDPR Share best legal and ethical practice in the market research sector 2
  • 3. Agenda Topics 10:00 – 10:05 Introductions and welcome 10:05 – 10:30 The Changing Face of Compliance: GDPR & UK DPA 2018 10:30– 11:15 Organisational Accountability Measures (DPO’s; record-keeping; data retention; subject access requests) 11:15 – 11:30 Coffee and Networking Break 11:30 – 12:20 GDPR Compliant Policies & Procedures (Contract terms; data protection policies; privacy information notices) 12:20– 12:50 Data security and breach reporting 12:50 – 13:00 Closing questions/Discussion 3
  • 4. The Changing Face of Compliance: Key principles in GDPR & DPA 2018
  • 5. Session Topics Some context behind GDPR Key definitions Privacy principles Risk-based demonstrable compliance Update UK DPA 2018 5
  • 6. Some context GDPR applies from 25th May 2018 Data Protection Act 2018 will be introduced in the UK to bring GDPR into law Evolutionary not revolutionary: Fairness, transparency, accuracy, security, minimisation and respect for individuals all remain from current legislation, plus: Strengthened individual rights Increased business accountability Embedded privacy-centric focus
  • 7. Extra territorial reach GLOBAL REACH EU data controllers and processors processing data of EU residents Other data processors and controllers offering goods or services to individuals in the EU Other data processors and controllers monitoring behaviour of individuals in the EU
  • 8. Regulation v. national law Current privacy framework is a Directive: Each EU state has own law and own interpretation GDPR is a directly applicable Regulation: …but Member States can legislate on specific areas including employment and research
  • 9. The Regulators In the UK Information Commissioner’s Office (ICO) will regulate the Data Protection Act 2018 In the EU the European Data Protection Board (EDPB) will regulate the GDPR and ICO will be part of this BREXIT negotiations to determine regulatory arrangements after March 2019
  • 10. Enhanced Fines Fines may be imposed instead of, or in addition to, measures that may be ordered by supervisory authorities. There are two tiers of administrative fines: - Some contraventions will be subject to administrative fines of up to €10,000,000 or, 2% of global turnover, whichever is the higher - Others will be subject to administrative fines of up to €20,000,000 or 4% of global turnover, whichever is the higher Higher fines for breaches of basic principles including consent conditions, data subject rights, transfers and non-compliance with orders by supervisory authorities
  • 11. New definition of personal data Definition of Personal Data has been expanded: - Data from which a living individual is identifiable (by anyone) directly or indirectly - From data - From data and other information which is in the possession of, or is likely to come into the possession of, the data controller - Includes any expression of opinion about an individual and any indication of the intentions of the data controller or any other person in respect of the individual
  • 12. Types of Data Three types of data: Identifiable Data: data that identifies a data subject Anonymous Data: data from which no individuals can be identified - outside the scope of the Data Protection Act 2018 and GDPR (but not the Code!) Pseudonymous Data: Personal data that has been processed so that it can no longer be attributed to a specific data subject without the use of additional information e.g. coded data sets that can not identify individuals without a “key”
  • 13. New definition of sensitive data Sensitive data is classified as “special categories of personal data” Sensitive data: race or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, data concerning health or sex life and sexual orientation PLUS new categories genetic and biometric data Personal data relating to criminal convictions and offences are not included but similar safeguards apply
  • 14. Definition of Controllers and Processors Controller means the natural or legal person, public authority, agency of any other body which alone or jointly with others determines the purposes and means of the processing of personal data Processor means a natural or legal person, public authority, agency or any other body which processes personal data on behalf of the controller If you are a processor: the GDPR places specific legal obligations on you, including requirement to maintain records of personal data and processing activities. You also have legal liability for any breaches If you are a controller: you are not relieved of your obligations where processors ae involved – the legislation places further obligations on your to ensure your contracts with processors comply with the GDPR
  • 15. Privacy principles: Bedrock of GDPR 1 Privacy by Design and Default
  • 16. Privacy by Design and Default 1 Organisational measures Technical safeguards Privacy Impact Assessment (PIA)
  • 17. Risk-based demonstrable compliance Organisations must fully consider the risks that processing poses to the fundamental rights and freedoms of individuals. What does this mean?  Identify risky processing activities  Consider implications of the risk level  Mitigate any risks
  • 18. Processing research data Three options available for research processing: Consent - specific, informed and freely given consent through clear affirmative action Legitimate interest - based on reasonable expectations and provided does not override the rights of individuals (research is a compatible purpose) Research exemption - (if implemented) where impossible to conduct research otherwise but subject to adoption of technical and organisational measures to limit collection to the minimum and use of methods that de-identify Other grounds apply but less likely to be used in research such as on contract; compliance with legal obligation; vital interests of data subject; public interests
  • 19. Update on UK DPA 2018: Research exemption Scientific research in the public interest • Scientific research broadly defined • Exemption provides limited flexibilities on some aspects • In determining public interest conduct balancing test that considers rights of individuals and the public interest • Sound methodological techniques, recognised ethical safeguards and robust technical and organisational measures are all critical 1
  • 21. Session Topics Appointment of Data Protection Officer Research agency record keeping requirements Data retention policies Handling subject access requests 2
  • 22. DPO: New GDPR Requirement • regularly and systematically monitoring of individuals on a large scale? • processing sensitive personal data on a large scale? • a public authority? Are you? 2
  • 23. DPO: Mandatory for many research businesses Number of data subjects (as a specific number or proportion of relevant population) Volume of data and/or range of different items being processed Duration or permanence of processing Geographical extent Large Scale Data Processing
  • 24. DPO: Compliance & Liaison Role Core role includes:  Informing and advising on obligations to comply with the GDPR and other data protection laws  Monitoring compliance, including managing internal data protection activities, training data processing staff, and conducting internal audits  Advising on data protection impact assessments  Working, cooperating with and serving as the contact point for ICO  Dealing with inquiries from data subjects on exercise of rights 2
  • 25. DPO: Independent & well resourced High level appointment who must have:  sufficient corporate resources to fulfil functions and for own ongoing training  access to data processing personnel and operations of business  significant independence in performance of the roles, and direct reporting line “to the highest management level”  high job security may also perform other tasks and duties provided they do not create conflicts of interest Can either appoint an employee or outsource to a consultancy service 2
  • 26. DPO: Expert & Experienced Level of expertise depends on complexity of data processing activities:  Higher level of expertise required if processing more sensitive categories of data or if often cross-border transfers  Expertise in national and European data protection laws and practices and an in-depth understanding of the GDPR  Knowledge of the research sector and understand processing operations, information systems, data security and data protection needs of controller 2
  • 27. Business Impact – Burdens and Benefits - Effective way to increase overall compliance of business - Increased public/client trust and reputational benefit - Additional initial and ongoing compliance burden - Monetary penalty for failure to appoint 2
  • 28. DPO Checklist: Action Points  Determine whether appointment is necessary or desirable  Decide between outsourcing the role or appointing an employee  Consider conflicts of interest before appointing current employee  Ensure role has sufficient autonomy and resources  Appoint the DPO  Publish contact details of DPO and advise ICO 2
  • 29. Record-keeping for research agencies Written records of data processing (exemptions for small business not useful for agencies) Types of records depend on whether acting as a data controller or data processor Need to consider whether kept up to date and who is responsible
  • 30. Record keeping requirements Data Controller (s) Data Processors Name and contact details (also that of other controllers, data representatives and data protection officers) Name and contact details (also that of data controllers, representatives, data protection officer) Purpose (s) of processing Categories of processing (on behalf of each controller) Description of categories of individuals and categories of personal data Details of transfers to third countries Categories of recipients of personal data (including those in third countries or international organisations) Description of technical and organisational security measures Details of data transfers to third countries Retention schedules Description of technical and organisational security measures
  • 31. Record Keeping Checklist  If over 250 employees written records of data processed must be kept  If fewer than 250 employees, written records only required if processing activities are risky, frequent or include sensitive personal data  Types of records depend on whether acting as a data controller or a data processor  Need to ensure that records are kept up to date
  • 33. Is there a fixed retention period?  Different types of personal data records are likely to require different retention periods.  In deciding time limits consider if need to keep the data, delete it or archive it?  Current and future value?  Costs, risks and liabilities of keeping?  Ease or difficulty of ensuring up to date?  Is there a relevant legal or regulatory requirement?  Remember if information is retained there is a risk that it will become inaccurate, out of date or irrelevant and generally it can be accessed by subject access requests 3
  • 34. Template for Data Retention Type of Data Retention Period Reason Personnel Files 6 years from end employment References Income Tax and NI 3 years after the end of the financial year to which it relates Income Tax Regulations Member Application Forms 4 years To respond to member queries and facilitate financial and audit requirements Customer data Permanent Suppression from list Primary research data with personal data 1 year from end of project Client contractual obligations; Quality control 3 For Illustrative purposes only
  • 35. Data Retention Checklist  Establish retention periods for different types of date including personal research data  Consider purpose in deciding how long to keep it for  Is there a minimum statutory period? If not set out in privacy policies and terms of business  Review and adhere to your organisational data retention policy for all different types of records – the shorter the time periods the better  Ensure retention periods included in privacy notices  Ensure suppliers and third parties working with your organisation’s data understand and adhere to any data retention and deletion policies  Update, archive or securely delete if data goes out of date  Check with IT how deletion should be undertaken  Conduct annual audit of data and/or periodic reviews  Document all decisions on data retention and destruction 3
  • 36. Subject access requests: Overview 3 Criteria GDPR Time period to respond 30 days (DPA 40 days) Content of response Allow individual to know what information is held and what processing is being carried out; may need to provide further information such as data retention period and right to have inaccurate data provided Right to withhold If disclosure would “adversely affect the rights and freedoms of others” Fee Free (unless manifestly unfounded or excessive) but reasonable charge for further copies (DPA £10 fee) Electronic access Must be possible to make requests electronically and where request is electronic response should be as well
  • 37. Subject Access Requests: What steps should you take to prepare? • Develop policies to ensure sufficient to cover subject access requests, data portability requests, requests to be forgotten or restrict use of personal data • Check which records will be covered by data portability requests • Update procedures to handle within new timeframes • Develop template responses • Assess ability to identify personal data relating to an individual and provide to them • Appoint nominated individual(s) to deal with requests and ensure trained • Develop performance dashboards especially for panels or online communities
  • 40. GDPR Myth-Busting – True or False? Commissioning clients will need consent from their customers to send agencies details of their customer database All personal data records must be destroyed GDPR will still apply after Brexit Organisations do not need to file notifications with the ICO
  • 41. Session Topics Contracts in the research supply chain Privacy information notices Internal data protection policies 4
  • 42. Contracts required along the supply chain Freelance Recruiters Fieldwork Agency/Freelance Interviewers Research Agency Client
  • 43. Data controller, joint data controller or processor? Data Processor Data Controller (s) 4
  • 44. Different yet similar obligations Data Controller(s) Data Processor But also similar obligations •Lead responsibility •Direct responsibilities e.g. Required to conduct DPIA; Point of contact for individuals; Audit of DP responsibilities •Contractual obligations •Direct responsibilities •Contractual obligations e.g. seek approvals e.g. to appoint sub- processor or data transfers out of EEA •Appointment of DPO; record- keeping; technical and organisational measures; privacy by design and default, lawful basis for processing; data breach notification
  • 45. GDPR compliant contracts - Processors and sub-processors Written contracts between controllers and processors are mandatory and must contain specific minimum terms. Points to consider and reflect in contract include:-  Details of the specific processing activities e.g. subject matter and duration; nature and purpose; type of personal data and categories of data subject; obligations and rights of controller  Terms requiring the processor to:  Only act on written instructions of DC  Ensure people processing subject to duty of confidence  Appropriate security measures  Assist DC in providing subject access and allowing data subjects to exercise rights  Assist DC in meeting obligations regarding security; data breach notification; DPIA’s  Delete or return all personal data to controller as requested at end of contract  Submit to audit/inspection and ensure both meeting obligations by notifying DC if doing something contrary to GDPR
  • 46. GDPR compliant contracts - Other controllers?  Additionally also consider as joint data controller: • Research parameters such as outputs and standard for delivery of anonymised data; Re- contact consents • Liabilities, assurances and indemnities • Joint legal controllers allocation of responsibilities on data subject requests, applicable privacy policies
  • 47. Are there any standard contracts available?  Standard contract clauses for controller-processor contracts to be developed by EU Commission and authorities such as ICO  Clauses in GDPR Codes and certification schemes (in time) will also meet some of compliance obligations
  • 48. Contract Checklist: Action Points  Understand where you act as joint data controller or data processor  Review and revise legacy contracts (clients, freelancers and other research suppliers)  Allocate responsibilities between joint controllers and agree co-operation approach with data processors e.g. data breach reporting; data subject requests  Consider apportionment of liability and risks (what cap do you need? What level of insurance do you have? Are indemnities needed? How is liability level reflected in price of services?)  Ensure mandatory terms reflected in contract
  • 49. GDPR: External and Internal Policies • Privacy Information Notice  Client requirements e.g. procurement, due diligence  Customer communication e.g. what data is collected, how it is used, etc. • Data Protection Policy  Parameters for activities and organizations  Core to staff and supplier terms and conditions  Appropriate behaviour and practice 4
  • 50. Privacy Information Notice Starting point is:  who you are;  what you are going to do with participant information; and  who it will be shared with. Also consider including:  what you are doing to ensure the security of personal information;  information about participants right of access to their data and their right to withdraw consent; and  what you will not do with their data (such as use it for marketing purposes). Privacy information notices will be required regardless of the legal ground being used.
  • 51. How to deliver the information effectively? Transparent user-centric notices Tailored Layered Blended
  • 52. First Layer Information – Actively provide this information Actively provide:  name of research organisation collecting the data and any client organisation  general subject  purpose  any sensitive data collection  whether the data collection will be recorded and/or observed  guarantee of participant anonymity and/or confidentiality  right to access data  right to withdraw consent  right to object to processing  description of any reasonably foreseeable risks (including physical or emotional harm and discomfort or embarrassment) particularly in qualitative research projects  details of any international data transfer to third countries in the absence of an adequacy decision and appropriate safeguards  length in minutes of data collection  re-contact details including when re-contact will occur; the purpose and by who  costs likely to be incurred by the participant (if appropriate)  assurance that the activity is being collected in accordance with the MRS Code of Conduct
  • 53. Second Layer Information - Make this information accessible Make accessible:  who will administer incentives, what it will be; when it will be received; any conditions attached  generic contact details for data protection officer (if applicable)  details of any international data transfer to third countries considered adequate by the EU  retention period for data or criteria for retention  right to lodge a complaint with the supervisory authority in the Member State of residence, place of work or alleged breach of GDPR. In the UK this is the ICO  right to port data (if automated data collection)  right to erasure of any personal data made public  right to restrict processing  right to rectify data held
  • 54. Internal Data Protection Policy Core part of the accountability principle Data and privacy policies should accurately cover:  data activities  data and privacy processes  lines of responsibility (where appropriate)  monitoring and audit arrangements Need to reflect both legal and ethical requirements
  • 55. Internal Policies: Some Useful Headings  Scope and Coverage  General & Privacy  Data Collection  Data Use  Data Accuracy & Cleansing  Data Access & Sharing  Data Retention  Third Party Data  Data Transfer  Data Deletion &/or Destruction  Data Monitoring & Audit  Sub-Contractors  Data Breach Reporting  Data Policy Development  Bring your own device
  • 56. Data Policies: Checklist  Audit existing policies and practices  What data exists?  How’s it being stored?  How’s it being used?  Who has access and who needs access?  How’s it being secured?  Strengthen data policies and procedures  Ensure external notice transparent and user friendly  Check internal policy is robust and tailored to your organisation  Establish systems to incorporate new data subject rights  Educate, train staff and raise awareness
  • 58. Session Topics Data security Personal data breach notifications Data security breach management 5
  • 59. 59
  • 60. GDPR: Data Security Principle  DPA – Data Security Appropriate technical and organisational measures  GDPR - Integrity and Confidentiality – Personal data should be kept secure. 6
  • 61. Data Security Pseudonymisation Encryption Hashing Password protection other state of the art
  • 62. Data Security checklist Consider the following when assessing whether their technical and organisation measures are appropriate:  Are the automated systems protected by a level of security appropriate to the data held?  Are technical measures in place to restrict access to systems holding personal data?  Are technical measures in place to secure data during transit (e.g. to subcontractors and interviewers)?  How is the data stored by your sub-contractors and interviewers – is it adequate and appropriate?  Are the premises on which the data is held secure?  Is access to the premises restricted?  If the data is held on non-automated systems e.g. paper files, discs, microfilm, and microfiche, is access still restricted or secure?  Are copies of printouts, obsolete back-up tapes etc. disposed securely?  Is obsolete hardware and software from which data could be recovered disposed of securely?  Is there an auditable data retention and destruction policy?  Are staff trained and made aware of their responsibilities to safeguard the personal data?
  • 63. Personal data breach notifications If you are made aware of a personal data breach Is the breach a risk to individuals? If yes tell supervisory authority (if no then document personal data breach) Is breach “high risk”? If yes tell affected individuals (if no end of process)
  • 64. What are the timelines for notification?  Inform regulators ‘without undue delay’ and ‘not later than 72 hours’ that a breach has taken place  If notification not be made in time, then there must be ‘reasoned justification’ for the delay
  • 65. Data security breach notification process •response to incident should include a recovery plan •procedures for damage limitation 1.Containment and recovery •assess risks as these affect what you do once the breach has been contained •consider potential adverse consequences for individuals (severity and likelihood of risk) •Critical consideration for GDPR notification 2.Assessing the Risks
  • 66. Data security breach notification process • Establish process for notification to DPA, individual and controller 3.Notification • investigate the causes of the breach and also evaluate the effectiveness of your response to it • Build in effective ways of detecting breaches • If necessary, then update your policies and procedures accordingly 4. Evaluation and Response
  • 67. And the last word on GDPR compliance ….. Responsibly assess the risks and then document, document, document and document …….
  • 69. MRS guidance & awareness Guidance • MRS EFAMRO ESOMAR Guidance Note on Research Sector – Legal Bases (June 2017) • GDPR In Brief – 7 GDPR topics covered to date • Data Protection & Market Research: Guidance for MRS members (February 2018; April 2018) • Fair Data, Impact, MRS Blogs and Articles Live and Recorded Webinars • GDPR Countdown (May 2017) • MRS AURA Client Side Research (November 2017) • RAS GDPR (March 2018) • Off the Starting Blocks (March 2018) Events • MRS Roadshow (Leeds, Bristol, Edinburgh, Brighton, Birmingham, London March to July 2018) • Association events e.g. EphMra; Cvent • GDPR Master Class – Accountable Research Organisations (January 2018) • GDPR Master Class – Transparent Research Projects (April 2018) • Company Partner Briefings (Ongoing)