GDPR P Course v1 1
GDPR P Course v1 1
EU GDPR
Practitioner Course
IT Governance
Welcome
• Housekeeping
– Fire/evacuation
– Security
Introductions
Name
Organisation
– What your organisation does
– What your part of the
organisation does
Role
Knowledge/experience
– DPA/GDPR
– Information security
Objectives
• Queries?
• Understanding?
• Implementation?
• Course objectives:
– Enable delegates to fulfil the role of data protection
officer (DPO) under the GDPR;
– Cover the regulation in depth, including
implementation requirements;
– Cover necessary policies and processes,
– Cover important elements of effective data security
management.
Baratheon PLC
GDPR Practitioner v1.1
© IT Governance Ltd 2016 7
Baratheon PLC
Baratheon PLC
• Four sites:
– Main office near Regent’s Park in London, UK
o Majority of development, account management and sales
o All corporate support services
– Localised offices in:
o New York, US
o Paris, France
o Melbourne, Australia
o Variety of staff and hardware/software in each office, specific to the local market
Course timetable
Day 1
Day 2
Day 3
Agenda - Day 4
Day 1
• OR
Achieve compliance?
• Many detailed areas of the GDPR are still subject to development
– WP 29 2017 Action Plan
o In its 2017 Action Plan, the WP29 has committed to finalize its work on
topics undertaken in 2016 including guidelines on certification and
processing likely to result in a high risk and Data Protection Impact
Assessments (DPIA), administrative fines, the setting up the European Data
Protection Board (EDPB) structure
o In the 2017 Action Plan the WP29 has also engaged to start its work with the
production of guidelines on the topics of consent and profiling and
continue in the second semester of 2017 with the production of guidelines on
the issue of transparency. At the same time, the WP29 will work on the
update of already existing opinions and referentials on data transfers to
third countries and data breach notifications.
– In December 2016, WP 29 adopted guidelines on
o The right to data portability,
o Data protection officers (DPOs)
o The lead supervisory authority.
– What of CCTV, Employee monitoring and online identifiers?
GDPR Practitioner v1.1
© IT Governance Ltd 2016 30
Exercise
• Queries?
• Understanding?
• Implementation?
Exercise
The tall, elderly man with a dachshund who lives
at number 15 and drives a Porsche Cayenne.
Minutes of a meeting
Identifiers
Anonymisation
• Queries?
• Understanding?
• Implementation?
Accountability
2
ICO on accountability
• Independence
• Openness and transparency
• Accountability
• Integrity
• Clarity of purpose
• Effectiveness
• An organization’s internal control system is the skeleton that
supports its governance framework
Internal control?
– Board accountability
– Risk assessment and risk management strategy
– Risks to rights of data subjects on corporate risk register
– Defined roles and responsibilities with clear reporting lines
o DPO
o Line and functional leadership
– Corporate policy, supported by:
o Documented processes, procedures and practices
– Monitoring, auditing, reviewing and reporting on privacy compliance
– Disciplinary policy
Data collection
Compliance Data quality Data subject Risk management
procedures
standards fair/lawful/adequate procedures access procedures strategy
System/data-
Internal audit Data disposal Privacy notices
specific
procedures procedures procedures
procedures
What is a policy?
• Policies are documents that define the objectives of an organisation.
• Policies must:
– Be capable of implementation and enforceable
– Be concise and easy to understand
– Balance protection with productivity
• Policies should:
– State reasons why policy is needed
– Describe what is covered by the policies
– Define contacts and responsibilities
– Include (at least one) objective
– Discuss how violations will be handled
Sixth Principle
‘Appropriate measures’:
Independent standards for PIMS, ISMS
Exercise
• Queries?
• Understanding?
• Implementation?
Source: BusinessWeek/Symantec
GDPR Practitioner v1.1
© IT Governance Ltd 2016 72
6 - Rights of
individuals, 1
7 - Data Security,
58
Inappropriate
handling of data,
5%
Unencrypted
storage device lost/
stolen,
13%
Lack of training,
Public disclosure of 19%
sensitive data,
5%
Unsolicited
Lack of training/ marketing,
policy, £610,000.00
£270,000.00
Unencrypted data
lost or theft,
£385,000.00
(2) The Money Shop did not delete customers’ information when
that information was no longer required, and
http://www.dailydot.com/layer8/alpha-payroll-services-phishing-
scam-w2-clients/
Exercise
Handouts
Sony (2011)
• Beginning in April, Sony suffered multiple data breaches involving its PlayStation Network
(PSN), Qriocity, Sony Online Entertainment, and other sites.
• On Sunday, new revelations surfaced that Sony apparently also suffered another data
breach earlier this month, after hackers cracked Sony BMG's website in Greece. That
would make it the seventh data breach suffered by Sony since April 2011.
• In this breach, which occurred on May 5, attackers obtained information about more than
8,000 website users, according to The Hackers News, which received a copy of the
website's SQL database from "b4d_vipera," the hacker who took responsibility for the
breach.
• The attacker also leaked a sample of the purloined database--containing 450 records--to
Pastebin. It contains usernames, passwords for the Sony website, and email addresses.
Security experts recommend that anyone with a Sony BMG account in Greece immediately
change their Sony password, and any other uses of the same password online.
• The attacker said he exploited the Greek Sony website using a SQL injection attack against
the site, which was running Internet Information Server (IIS) 6.0 on Windows 2003. SQL
injection attacks, which exploit website databases that haven't been patched against
known vulnerabilities, are much favored by attackers, in part for their simplicity.
• "It's not something that requires a particularly skillful attacker, but simply the diligence to
comb through Sony website after website until a security flaw is found,"
• Clean up cost $171 million
Information Week
GDPR Practitioner v1.1
© IT Governance Ltd 2016 87
Sony (2014)
• On November 25, a new chapter was added to the chronicles of data theft
activity. A group calling itself GOP or The Guardians Of Peace, hacked their way
into Sony Pictures, leaving the Sony network crippled for days, valuable insider
information including previously unreleased films posted to the Internet, and
vague allegations it all may have been done by North Korea in retribution for the
imminent release of an upcoming movie titled “The Interview”.
• While politically motivated attacks and theft of intellectual property is nothing
new, this incident certainly stands out for several reasons. First, via a Pastebin
link, the group released a package and links to torrent files hosted on four sites
consisting of 26 parts, broken out into 25 1GB files, and one 894 MB rar file. The
files were also uploaded to the file sharing giants MEGA and Rapidgator, but
removed by site managers shortly after. The researchers at RBS were able to
access the files and analyze the content prior to the information going off-line,
as well as reach out to GOP.
• The results of the analysis provide unprecedented insight into the inner workings
of Sony Pictures and leaked the personal information of approximately 4,000
past and present employees. As if the sensitive employee information wasn’t
troubling enough, the leak also revealed curious practices at Sony, such as
money orders used to purchase movie tickets that were apparently re-sold back
to Sony staff.
www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/
GDPR Practitioner v1.1
© IT Governance Ltd 2016 88
The data breach at Target that affected 70 million US consumers has cost the retail giant $162 million in 2013 and 2014,
and could end up totaling $1 billion or more in damages before all is said and done.
During its fourth-quarter earnings call, the big-box behemoth said that it booked $4 million related to the breach in Q4,
and $191 million in gross expenses for 2014. It also spent $61 million gross for 2013.
While the gross expenses were in part offset by insurance receivables ($46 million for 2014 and $44 million for 2013),
the losses look to only mount, as lawsuits begin to be filed. Plaintiffs were given the go-ahead for class-action litigation
by a judge in January. (Infosecurity Magazine)
GDPR Practitioner v1.1
© IT Governance Ltd 2016 89
Talk Talk
• TalkTalk lost a third of its value in the wake of the hack, which analysts have
suggested could leave it wide open to a takeover by other quad-play providers.
The company originally came out of Carphone Warehouse in 2003 before being
demerged in 2010 to become one of the biggest LLU telecoms providers in the
UK.
• The high-profile cyber attack, which began on 21 October, appears to have
been the result of a heist masked by a distributed denial-of-service attack
(DDoS).
• Some 28,000 credit and debit card details were stolen, 15,656 bank account
numbers and sort codes were accessed, and around 15,000 dates of birth were
also pinched.
• This adds to the 1.2 million email addresses, names and phone numbers that
were also taken. The credit and debit card details were partially obscured and
are of no use for financial transactions, but the 15,656 bank account details
could be used in cyber theft.
www.theinquirer.net/inquirer/news/2431728/talktalk-ddos-hack-leaves-four-million-customers-at-
risk
• Fourth breach in 12 months
• Reportedly not PCI DSS-compliant
GDPR Practitioner v1.1
© IT Governance Ltd 2016 90
Key lessons
Exercise
• Queries?
• Understanding?
• Implementation?
First Principle
Recitals 38, 40-50, 59; Articles 6-10
• Personal data shall be processed fairly and lawfully and, in
particular, shall not be processed unless:
– (a) at least one of the conditions in ARTICLE 6 is met; and
– (b) in the case of sensitive personal data, at least one of the conditions
in Schedule 9 is also met
(’processed fairly and lawfully’)
First Principle
Recitals 38, 40-50, 59; Articles 6-10
• In practice, this principle means that you must:
– Have legitimate grounds for collecting and using the personal data
– Not use the data in ways that have unjustified adverse effects on the
individuals concerned
– Be transparent about how you intend to use the data, and give
individuals appropriate privacy notices when collecting their personal
data
– Handle people’s personal data only in ways they would reasonably
expect and
– Make sure you do not do anything unlawful with the data
• Where personal data has not been obtained directly from the
data subject:
– the identity and contact details of the controller and their representative;
– the contact details of the data protection officer, where applicable;
– the purposes as well as the legal basis of the processing;
– the categories of personal data concerned;
– the recipients of the personal data, where applicable;
– the fact that the controller intends to transfer personal data to a third
country and the existence of adequacy conditions.
Exercise
• Determine key points in a Privacy Notice for Baratheon
clients purchasing software through its e-commerce
gateway
Second Principle
Second Principle
• Example
A GP discloses his patient list to his wife, who runs a travel
agency, so that she can offer special holiday deals to patients
needing recuperation. Disclosing the information for this
purpose would be incompatible with the purposes for which it
was obtained
Third Principle
• Example
Baratheon’s recruitment agency places workers in a variety of
jobs.
It sends applicants a general questionnaire, which includes
specific questions about health conditions that are only
relevant to particular manual occupations.
• It is be irrelevant and excessive to obtain such information
from an individual who was applying for an office job at
Baratheon.
Fourth Principle
• Example
An individual is dismissed for alleged misconduct.
• An Employment Tribunal finds that the dismissal was unfair
and the individual is reinstated.
• The individual demands that the employer deletes all
references to misconduct.
• However, the record of the dismissal is accurate. The
Tribunal’s decision was that the employee should not have
been dismissed on those grounds. The employer should
ensure its records reflect this.
Fifth Principle
• Example
Images from a CCTV system installed to prevent fraud at an
ATM machine may need to be retained for several weeks,
since a suspicious transaction may not come to light until the
victim gets their bank statement
In contrast, images from a CCTV system in a pub may only
need to be retained for a short period because incidents will
come to light very quickly. However, if a crime is reported to
the police, the images will need to be retained until the police
have time to collect them
NB: CCTV images are personal data, and the controller must
have a lawful reason for collecting the data, (probably)
appoint a DPO and (probably) carry out a DPIA.
There is a CCTV Code of Practice – see the ICO.
GDPR Practitioner v1.1
© IT Governance Ltd 2016 118
Exercise
• Review two contrasting website privacy policy (privacy
notice statements) and identify how each meets the
requirements of the first five principles of the GDPR.
Sixth Principle
Pseudonymisation
Encryption
Exercise
• Recommend some controls Baratheon should mandate
to protect personal data in the following scenarios:
– Outsourcing its global payroll data to a third party payroll
processor
– Using a third party to create custom-built CRM-type application
software components for its main web technology solution
• Queries?
• Understanding?
• Implementation?
• Queries?
• Understanding?
• Implementation?
EU GDPR
Practitioner Course
DAY 2
IT Governance
Day 2
• ‘Taking into account the state of the art, the costs of implementation
and the nature, scope, context and purposes of processing as well
as the risk of varying likelihood and severity for the rights and
freedoms of natural persons, the controller and the processor shall
implement appropriate technical and organisational measures to
ensure a level of security appropriate to the risk.’
• Measures as appropriate, including:
– The pseudonymisation and encryption of personal data;
– the ability to ensure the ongoing confidentiality, integrity, availability and
resilience of processing systems and services (security, continuity)
– the ability to restore the availability and access to personal data in a timely
manner in the event of a physical or technical incident (continuity)
– a process for regularly testing, assessing and evaluating the effectiveness
of technical and organisational measures for ensuring the security of the
processing (audit, penetration testing)
2 Include SCRM
1
Embedded ISO 27001 ISMS, SOC 2
The Basics
-5
Cyber Essentials
-4
-4
GDPR Practitioner v1.1
© IT Governance Ltd 2016 135
-4
GDPR Practitioner v1.1
© IT Governance Ltd 2016 136
Segmented Network
Managing Removable
User Media Monitoring
Privileges Controls
18 Compliance
GDPR Practitioner v1.1
© IT Governance Ltd 2016 142
Business Continuity
Disruptive Incident
Normal level
Recover back
to normal
Minimum
acceptable
level Recover prioritised activities
(with temporary arrangements)
Manage immediate
consequences of
disruptive incident
Time
GDPR Practitioner v1.1
© IT Governance Ltd 2016 143
Penetration testing
• Queries?
• Understanding?
• Implementation?
• Article 32: ‘The controller and the processor shall implement appropriate
technical and organisational measures to ensure a level of security
appropriate to the risk’.
• ‘In assessing the appropriate level of security account shall be taken in
particular of the risks that are presented by processing, in particular from
accidental or unlawful destruction, loss, alteration, unauthorised disclosure of,
or access to personal data transmitted, stored or otherwise processed.’
• ‘Taking into account the nature, scope, context and purposes of processing as
well as the risks of varying likelihood and severity for the rights and
freedoms of natural persons, the controller shall implement appropriate
technical and organisational measures to ensure and to be able to
demonstrate that processing is performed in accordance with this Regulation’”
(Article 24-1)
What is Risk?
• The effect of uncertainty on objectives (ISO31000 et al)
• A combination of the likelihood of an incident occurring and
the impact, if it does occur, on the organization.
• A probability or threat of damage, injury, liability, loss, or any
other negative occurrence that is caused by external or
internal vulnerabilities, and that may be avoided through pre-
emptive action (businessdictionary.com)
• Risk can be or
ISO31000
Principles of the ISO31000 standard
• Risk management:
– Creates value
– Is an integral part of organisational processes
– Is part of decision making
– Explicitly addresses uncertainty
– Is systematic, structured and timely
– Is based on the best available information and is tailored
– Takes human and cultural factors into account
– Is transparent and inclusive
– Is dynamic, iterative and responsive to change
– Facilitates continual improvement and enhancement
Context Establishment
Risk Assessment
Risk Identification
Risk Communication and
Risk Monitoring
Risk Analysis
and Review
Consultation
Risk Evaluation
Risk Treatment
Risk Decision Point 2 N
Treatment Satisfactory?
Y
Risk Acceptance
GDPR Practitioner v1.1
© IT Governance Ltd 2016 153
Organized
Process Social
engineering
crime
Exploit kits
Reputation
Natural
disasters
Ransomware
Nation states Technology Commercial
Info
Etc
Competitors
Risk Management
Treatment
Countermeasures/Controls
Identification and implementation
GDPR Practitioner v1.1
© IT Governance Ltd 2016 158
Risk Assessment/Management
Likelihood
Negative Impact
GDPR Practitioner v1.1
© IT Governance Ltd 2016 159
• Queries?
• Understanding?
• Implementation?
Prior consultation
• Queries?
• Understanding?
• Implementation?
Increase
awareness of privacy
. and data
protection issues within your organisation
Comply
with
GDPR obligations
Individuals can be
reassured your project
has followed best
practice
identify and
reduce privacy
risks
Physical privacy
The ability of a person to maintain their own physical space
or solitude.
Informational privacy
control
Ability of a person to , edit,
manage and delete information about
themselves
• Hacking
• Virus infection
• Intruders
• Phishing
• Spam
• Inadequate training
Inadequate safeguards for :
• Hard copy
• Portable media
• Smartphones
Identifiability
How easily personal data can be used to
identify specific individuals?
Quantity
How many individuals are identified
in the information (e.g. number of
records)?
Or
• Inadequate Processes
training
People
Technology
• Inadequate access control
• Encryption
Identify need for Describe the Identify privacy Identify and Sign-off and
DPIA information and related evaluate record outcome
flow risks privacy
solutions
Personal identification
Name, such as full
number, such as National
name, maiden name, Personal characteristics,
Insurance number, passport
mothers maiden name, including photo (face or
number, drivers licence,
or alias distinguishing features), finger
patient identification number,
financial account or credit prints, biometric data (retina
number scan, etc)
GDPR Practitioner v1.1
© IT Governance Ltd 2016 191
Exercise
Exercise
Risk
Likelihood/probability
Finance >2% of monthly budget >5% of monthly budget and/or >10% of monthly budget and/or
(Org’s annual budget) and/or £10,000 limit £50,000 limit £50k+ limit
Likely (3) 3 4 5
Occasional (2) 2 3 4
Likelihood
Unlikely (1) 1 2 3
Impact
Likely (3) 3 4 15
Occasional (2) 2 3 4 43
Likelihood
Unlikely (1) 1 2
2 3
Impact
Risk treatment
What actions
address the risks?
Risk options?
Terminate
Transfer
Tolerate
Treat
Discussion: List examples of each risk option
Exercise…cont’d
Likely (3) 3 4 15
Occasional (2) 2 3
4 43
Likelihood
Unlikely (1) 1 2 3
Impact
Balance
the project’s outcomes with
the impact on individuals.
Discussion:
What controls
could be used
to reduce the
risks described
in the example
HR system?
Risk Acceptance
Controls
implemented
Cost
Vulnerabilities
Number of Controls
Internal consultation
External consultation
Exercise
DPIA Exercise
Accountability
• Adequate, relevant and limited to what is necessary
3
• Is the information you are using of good enough quality for the
purposes it is used for?
• Which personal data could you not use, without compromising
the needs of the project?
• What retention periods are suitable for the personal data you
will be processing?
• Are you procuring software which will allow you to delete
information in line with your retention periods?
• Queries?
• Understanding?
• Implementation?
Identify:
Data Items
Data Formats
Transfer methods
Locations
Chapter 9 of The Object Primer 3rd Edition: Agile Model Driven Development with UML 2
GDPR Practitioner v1.1
© IT Governance Ltd 2016 237
Exercise
Data mapping
• Queries?
• Understanding?
• Implementation?
• Queries?
• Understanding?
• Implementation?
EU GDPR
Practitioner Course
DAY 3
IT Governance
Day 3
Article 7.
Lawful Consent
Article 8. Childs
1.Fair and lawful
consent
Article 13.
2.Specific
Fair Information to be
purpose(s)
provided
3. Minimum
necessary
Article 5
Principles
4. Accurate
5. Retention
6. Security
1. Right to be informed
Privacy Notice (Recital 39, 42, 58, Article 13, 14)
Not
Data obtained
Requirement obtained
directly
directly
Identity and contact details of the controller and where applicable, the
controller’s representative) and the data protection officer Y Y
Purpose of the processing and the legal basis for the processing Y Y
The legitimate interests of the controller or third party, where applicable
Y Y
Categories of personal data Y Y
Any recipient or categories of recipients of the personal data Y Y
Details of transfers to third country and safeguards Y Y
Retention period or criteria used to determine the retention period Y Y
The existence of each of data subject’s rights Y Y
The right to withdraw consent at any time, where relevant Y Y
The right to lodge a complaint with a supervisory authority Y Y
The source the personal data originates from and whether it came from
publicly accessible sources Y Y
Whether the provision of personal data part of a statutory or contractual
requirement or obligation and possible consequences of failing to provide
the personal data Y Y
The existence of automated decision making, including profiling and
information about how decisions are made,GDPR the significance
Practitioner v1.1 and the
consequences. © IT Governance Ltd 2016 Y Y 247
1. Right to be informed
Privacy Notice (Recital 39, 42, 58, Article 13, 14)
• Concise
• Clear and in plain language (consider notice if addressed to
child)
• Available and easily accessible to data subjects
1. Right to be informed
Privacy Notice (Recital 39, 42, 58, Article 13, 14)
2. Right of access
Art 12, 15, Recital 63, 64
2. Right of access
Art 12, 15, Recital 63, 64
A data subject
SAR – Individuals must provide
access request
(DSAR) is simply a Application in writing
written request made
by or on behalf of an
individual for the Proof of identity
information which he
or she is entitled.
Some direction
3. Right to rectification
Art 12, 15, Recital 63, 64
Conditions on when rectification applies
You must also inform the individuals about the third parties
to whom the data has been disclosed where appropriate
4. Right to erasure
• You need to comply with legal obligation (to keep the data)
• For vital interests or public interest
• Archiving in relation to public interest, scientific/historic and
statistical research
• Exercise of legal claims
4. Right to erasure
Children’s data
(Recital 38)
4. Rights to erasure
Recital 66
Demonstrate compliance:
• Provide data in structured format
• Data must be provided free of charge
• If individual consents’ data can be transmitted to another
organisation.
7. Right to object
Recital 67, Articles 18, 19
7. Right to object
Recital 67, Articles 18, 19
Demonstrating compliance:
You must inform individuals of their right to object “at the point of
first communication” and in your privacy notice.
7. Right to object
Recital 67, Articles 18, 19
Demonstrating compliance:
• Queries?
• Understanding?
• Implementation?
Consent
Recitals 32, 33, 38, 42, 43, 54, Article 4
Consent
Recitals 32, 33, 38,42,43,54, Article, 4
Consent
Recitals 32, 33, 38,42,43,54, Article, 4
Withdrawing consent
Consent
Recitals 32, 33, 38,42,43,54, Article, 4
Demonstrating compliance
Exercise
• Additional consent scenarios – see handouts
• Queries?
• Understanding?
• Implementation?
2. Right of access
Art 12, 15, Recital 63, 64
Records Management
Exercise
How should Baratheon deal with this DSAR?
• An individual makes a request for their personal data. When
preparing the response, you notice that a lot of it is in coded form.
For example, attendance at a particular training session is logged
as ‘A’, while non-attendance at a similar event is logged as ‘M’.
Also, some of the information is in the form of handwritten notes
that are difficult to read. Without access to the organisation’s key or
index to explain this information, it would be impossible for anyone
outside the organisation to understand.
Exercise
• Are these methods of submitting a DSAR to an
organisation acceptable?
– Letter
– Email
– Orally
– Social Media – Facebook, Twitter etc.
• Queries?
• Understanding?
• Implementation?
Controllers vs Processors
Key Definitions
Data controllers
Controllers determine:
• the legal basis for collecting data;
• which items of personal data to collect, ie the content of the
data;
• the purpose or purposes the data are to be used for;
• which individuals to collect data about;
• whether to disclose the data, and if so, who to;
• whether subject access and other individuals’ rights apply ie
the application of exemptions; and
• how long to retain the data or whether to make non-routine
amendments to the data.
General obligations
Article 24: Responsibility of controller
Adhere
to codes
of
conduct
Controller
Implement Implement
data technical and
protection organizational
measures
policies
Data processors
Within the terms of the agreement with the data controller, and its
contract, a data processor may decide:
• what IT systems or other methods to use to collect personal data;
• how to store the personal data;
• the detail of the security surrounding the personal data;
• the means used to transfer the personal data from one organisation
to another;
• the means used to retrieve personal data about certain individuals;
• the method for ensuring a retention schedule is adhered to; and
• the means used to delete or dispose of the data.
Exercise
Controller or Processor?
Market research company
A bank contracts a market research company to carry out
some research. The bank’s brief specifies its budget and
that it requires a satisfaction survey of its main retail
services based on the views of a sample of its customers
across the UK. The bank leaves it to the research
company to determine sample sizes, interview methods
and presentation of results.
Exercise
Controller or Processor?
Payment services
An online retailer works in co-operation with a third-party
payment company to process customers’ transactions.
Exercise
Controller or Processor?
Accountants
A firm uses an accountant to do its books.
Cloud providers
A local authority uses a cloud provider to store data about its
housing stock and residents, rather than holding the data on its
own IT system. The cloud provider is also contracted to delete
certain data after a particular period and to grant members of the
public access to their own records via a secure online portal. It
also hosts a residents’ discussion forum.
General obligations
Privacy by design
Respect • Lifecycle
for protection
users
Privacy
by
default
• Proactive Personal
• Preventive data
Privacy by design
General obligations
General obligations
Article 28: Processor
A legal contract must ensure that the processor:
• processes the personal data only on documented instructions from the
controller;
• ensures that persons authorised to process the personal data observe
confidentiality;
• takes appropriate security measures;
• respects the conditions for engaging another processor;
• assists the controller by appropriate technical and organisational
measures;
• assists the controller in ensuring compliance with the obligations to
security of processing;
• deletes or returns all the personal data to the controller after the end of
the provision of services;
• makes available to the controller all information necessary to
demonstrate compliance with the Regulation.
General obligations
Model Clauses set out legal contract between Controller and Processor:
Definitions – personal data, data subject etc
Details of Transfer – special categories of data etc
Third Party Beneficiary Clause – data subject can enforce legal rights
Obligations of the data exporter – adherence to data protection law
Obligations of the data importer – process in accordance with instructions
Liability – entitlement to compensation
Mediation and Jurisdiction – by an independent person or court of the member state
Co-operation with Supervisory Authorities – deposit of contract and right to audit
Governing Law – where controller is established
Variation of Contract – undertaking not to vary model clauses
Sub Processing – no subcontracting of processing without prior consent
Obligation – for processor to return data
General obligations
• Queries?
• Understanding?
• Implementation?
The GDPR limits your ability to transfer personal data outside the EU
where this is based only on your own assessment of the adequacy of the
protection afforded to the personal data.
• is not being made by a public authority in the exercise of its public powers;
• is not repetitive (similar transfers are not made on a regular basis);
• involves data related to only a limited number of individuals;
• is necessary for the purposes of the compelling legitimate interests of the
organisation (provided such interests are not overridden by the interests of the individual)
• is made subject to suitable safeguards put in place by the organisation (in the
light of an assessment of all the circumstances surrounding the transfer) to protect the
personal data.
• national security;
• defence;
• public security;
• the prevention, investigation, detection or prosecution of criminal offences;
• other important public interests, in particular economic or financial interests, including
budgetary and taxation matters, public health and security;
• the protection of judicial independence and proceedings;
• breaches of ethics in regulated professions;
• monitoring, inspection or regulatory functions connected to the exercise of official authority
regarding security, defence, other important public interests or crime/ethics prevention;
• the protection of the individual, or the rights and freedoms of others; or
• the enforcement of civil law matters.
Privacy Shield
Applies to transfers to US only
• The decision on the EU-U.S. Privacy Shield was adopted by
the European Commission on 12 July, 2016
Redress Monitoring
Directly with the company Annual joint review
With the data protection mechanism between US
authority Department of commerce
Privacy shield panel and EU Commission
Privacy Shield
Applies to transfers to US only
Privacy Shield
Applies to transfers to US only
How will an organization’s participation in the U.S.-EU Safe
Harbor Framework be affected by it joining the EU-U.S.
Privacy Shield Framework?
Privacy Shield
Applies to transfers to US only
1. Notice
2. Choice
3. Accountability for Onward Transfer
4. Security
5. Data Integrity and Purpose Limitation
6. Access
7. Recourse, Enforcement and Liability
Cloud-based services
Exercise
• Identify, in Baratheon’s relationship with Calamity Jane,
the roles of both parties in relation to one another and in
relation to the personal data that is processed within
that relationship.
• Identify the key contractual requirements that need to be
in place.
• Identify any exposures either organization may have in
terms of trans-border data flows
• Queries?
• Understanding?
• Implementation?
• Queries?
• Understanding?
• Implementation?
EU GDPR
Practitioner Course
DAY 4
IT Governance
Day 4
Learning goals
Breach landscape
• Prepare:
– Conduct a criticality assessment;
o Which critical systems are most likely to be breached?
– Carry out a cyber security threat analysis;
o Which threats are most likely to succeed
– Consider the vulnerabilities in people, process, technology and
information, including weaknesses in defence in depth
– Analyse and assess the risks.
– Identify additional control requirements;
– Review your state of readiness for cyber security incident response
• Respond:
– Identify cyber security incident/s;
– Define objectives and investigate the situation;
– Take appropriate action;
– Recover systems, data and connectivity.
• Follow up:
– Investigate incident more thoroughly;
– Report incident to relevant stakeholders;
– Carry out a post incident review;
– Communicate and build on lessons learned;
– Update key information, controls and processes;
– Perform trend analysis.
Exercise
• Identify two areas in Baratheon most vulnerable to a personal data
breach
• Propose members of a Baratheon cyber incident response team
• Queries?
• Understanding?
• Implementation?
• Queries?
• Understanding?
• Implementation?
Project team
Data inventory
• Once you have details about exactly what data flows where,
how, to whom, and in what format, you can
• Assess detailed compliance with
– Data privacy principles
– Requirements on controllers and processors
– Appropriate technical and organizational measures
– Trans-border data flows
Communications strategy
Draw breath!
• Queries?
• Understanding?
• Implementation?
• Accountability
• Transparency
• Children’s data
• Definition of personal data
• Pseudonymisation
• Data breach reporting
• Enhanced rights
• European data protection board
Principles...from 8 to 6
2 • Specific Purpose
5 • Retention
7 • Security
• Right to be forgotten
• Right to data portability
• Fee abolished
• Time period reduced from 40 days to 1 month
• IBITGQ examination
• ISO/IEC 17024-certified exam
• 90 minutes
• 40 questions
• 65% pass mark
• Queries?
• Understanding?
• Implementation?
The course?
• Queries?
• Understanding?
• Implementation?
• Objectives achieved?
Thank you!
Contains:
• Pre-written GDPR documentation, including all the
necessary policies and procedures
• Project tools to help manage and integrate the
GDPR across your organisation
• Guidance documents to help you map the flow of
data
What next?
• Further training?
Stay in touch!