Privacy by Design in the Cloud

Size: px
Start display at page:

Download "Privacy by Design in the Cloud"

Transcription

1 Privacy by Design in the Cloud - some raffish reflections Ernst O. Wilhelm, Chief Privacy Officer, GFT Belgian Cyber Security Convention, EuroCloud Forum, Mechelen,

2 Agenda 1. The Data Protection Challenge 2. The Software Development Challenge 3. The Cloud Challenge 4. A new Focus on Privacy in the Cloud 5. Bringing the Unicorn down the Trenches 26/10/2017 2

3 1. The Data Protection Challenge Source: Wilhelm 3

4 1. Data Protection by Design and by Default (GDPR Art 25) (1) Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement dataprotection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. (2) The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual s intervention to an indefinite number of natural persons. (3) An approved certification mechanism pursuant to Article 42 may be used as an element to demonstrate compliance with the requirements set out in paragraphs 1 and 2 of this Article. 26/10/2017 4

5 1. Privacy by Design Principles Ann Cavoukian: Privacy by Design advances the view that the future of privacy cannot be assured solely by compliance with regulatory frameworks; rather, privacy assurance must ideally become an organization s default mode of operation.[ ] Principles of Privacy by Design may be applied to all types of personal information, but should be applied with special vigour to sensitive data such as medical information and financial data. Cavoukian s 7 Foundational Principles of Privacy by Design Proactive not Reactive, Preventative not Remedial Privacy Embedded into Design Privacy as the Default Setting Full Functionality Positive Sum, not Zero-Sum End-to-End Security, Full Lifecycle Protection Visibility and Transparency, Keep it Open Respect for User Privacy, Keep it User-Centric 26/10/2017 5

6 1. Privacy Design Strategies Jaap-Henk Hoepman: A design strategy describes a fundamental approach to achieve a certain design goal, that has certain properties that allow it to be distinguished from other (basic) approaches that achieve the same goal. [ ] A natural starting point to derive some privacy preserving strategies is to look at when and how privacy is violated,and then consider how these violations can be prevented. Hoepman s 8 Privacy Design Strategies MINIMIZE The amount of personal information that is processed should be minimal. HIDE Any personal information that is processed should be hidden from plain view. SEPARATE The processing of personal information should be done in a distributed fashion whenever possible. AGGREGATE Personal information should be processed at the highest level of aggregation and with the least possible detail in which it is (still) useful. Inform Data subjects should be adequately informed whenever personal information is processed. CONTROL Data subjects should have agency over the processing of their personal information. ENFORCE A privacy policy compatible with legal requirements should be in place and should be enforced. DEMONSTRATE Demonstrate compliance with the privacy policy and any applicable legal requirements. 6

7 1. Completeness vs. Concreteness of Vision 7 Foundational Principles of Privacy by Design Completeness of Vision 8 Privacy Design Strategies Concreteness of Vision Source: Wilhelm 7

8 Agenda 1. The Data Protection Challenge 2. The Software Development Challenge 3. The Cloud Challenge 4. A new Focus on Privacy in the Cloud 5. Bringing the Unicorn down the Trenches 26/10/2017 8

9 2. The Software Development Challenge What the client has dreamt of What has been defined as client requirements What has been designed as solution by the architect What has been delivered in the first place What is finally delivered after painful discussions with the client! 9

10 2. The Basic Software Development Model Code Fix Characteristics: Developer knows what the user needs Emphasis on individuals (heroes) Knowledge is represented by people No project management No documentation No testing or done by the user Very high variance in time,cost and quality Low scalability (complex projects tend to fail) Validation by user experience 10

11 2. The Waterfall Software Development Model Characteristics: reduction of complexity by subsequent phases with separations of concerns emphasis on process and project management increased scalability knowledge is represented by documents requirements document knows what the user needs approved artefacts are pre-requisites for transition to the subsequent phase (waterfall) late validation in verification phase by comparing requirements definition and delivery low capability for integrating change requests still high variance in time, cost and quality maintenance phase has to bridge the gap between the delivery and the expectation of the user 11

12 2. The Iterative Software Development Model Characteristics: Integrates aspects of waterfall software development Additional reduction of complexity by iterative development cycles Increased capability for integrating change requests between development cycles Requirements Document is approximating to what the user needs Emphasis on release planning and risk management Incremental validation by prototyping Maintenance phase eliminated Still significant variance in time, cost and quality 12

13 2. Agile Software Development Model Characteristics: Emphasis on visibility and values Value of individuals and interactions over processes and tools Value of working software over comprehensive documentation Value of customer collaboration over contract negotiation Value of responding to change over following a plan High capability for integrating change requests Focus on vital requirements first and fast ROI Fast validation by incremental delivery Minimum variance in time, cost and quality 13

14 2. The Devil s Triangle in Software Development Cost Schedule Scope Data Protection Requirements software development is not a repetition of standard steps like in hardware manufacturing software development involves constant invention, accurate effort estimation is impossible attempts to constrain all factors at the same time yield high uncertainty and high risk to customer satisfaction risk is minimized if only one variable is constrained 14

15 2. Privacy by Design in Agile Software Development Source: Terbu, Hötzendorfer, Leitner, Bonitz, Vogl, Zehetbauer 15

16 Agenda 1. The Data Protection Challenge 2. The Software Development Challenge 3. The Cloud Challenge 4. A new Focus on Privacy in the Cloud 5. Bringing the Unicorn down the Trenches 26/10/

17 3. The Cloud Challenge 26/10/

18 3. The Cloud Privacy Standard (ISO 27018) ISO/IEC 27018: Code of Practice for protection of PII in public clouds acting as PII processor, 2014 With special emphasis of commissioned processing of personal data in a public cloud environment, this guidance helps the DPO of a cloud service customer: to comply with applicable obligations with special emphasis on processing of personal data to select a well-governed cloud service provider on basis of transparent criteria to enter into a contractual agreement with the cloud service provider on basis of standardized requirements to establish a common understanding regarding a mechanism for exercising audit and compliance rights and responsibilities Note: Certification for this standard is not available directly but can be considered within an ISO certification. 26/10/

19 3. Essential Structure of ISO ISO (Protection of PII in public in public clouds) 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Overview 5 Information security policies 6 Organization of information security organization 7 Human resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, development and maintenance 15 Supplier relationships 16 Information Security Incident Management 17 Information security aspects of business continuity management 18 Compliance Annex A: Public cloud PII processor extended control set for PII protection ISO (Information Security Controls) 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this Standard 5 Information security policies 6 Organization of information security organization 7 Human resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, development and maintenance 15 Supplier relationships 16 Information Security Incident Management 17 Information security aspects of business continuity management 18 Compliance 26/10/

20 3. Special Privacy Requirements in ISO Anne x A: Public cloud PII processor extended control set for PII protection A.1 Consent and choice A.1.1 Obligation to co-operate regarding PII principals rights A.2 Purpose legitimacy and specification A.2.1 Public cloud PII processor s purpose A.2.2 Public cloud PII processor s commercial use A.3 Collection limitation A.4 Data minimization A.4.1 Secure erasure of temporary files A.5 Use, retention and disclosure limitation A.5.1 PII disclosure notification A.5.2 Recording of PII disclosures A.6 Accuracy and quality A.7 Openness, transparency and notice A.7.1 Disclosure of sub-contracted PII processing A.8 Individual participation and access A.9 Accountability A.9.1 Notification of a data breach involving PII A.9.2 Retention period for administrative security policies and guidelines A.9.3 PII return, transfer and disposal A.10 Information security A.10.1 Confidentiality or non-disclosure agreements A.10.2 Restriction of the creation of hardcopy material A.10.3 Control and logging of data restoration A.10.4 Protecting data on storage media leaving the premises A.10.5 Use of unencrypted portable storage media and devices A.10.6 Encryption of PII transmitted over public data-transmission networks A.10.7 Secure disposal of hardcopy materials A.10.8 Unique use of user IDs A.10.9 Records of authorized users A User ID management A Contract measures A Sub-contracted PII processing A Access to data on pre-used data storage space A.11 Privacy compliance A.11.1 Geographical location of PII A.11.2 Intended destination of PII 26/10/

21 3. The Cloud Privacy Agreement (CSA) Cloud Security Alliance: Privacy Level Agreement [V2]: A Compliance Tool for Providing Cloud Services in the EU, 2015 The PLA may be used by the DPO as a template for a description of the level of privacy protection to be provided by the Cloud Service Provider: While Service Level Agreements ( SLA ) are generally used to provide metrics and other information on the performance of the services, PLAs will address information privacy and personal data protection practices. The PLA similar to SLA should represent an appendix to a Cloud Services Agreement. The PLA provides the DPO of the Cloud Service Customers with a tool to identify a baseline of mandatory personal data protection legal requirements across the EU and to evaluate the level of personal data protection offered by different Cloud Service Providers The PLA offers Cloud Service Providers with guidance for achieving a baseline of compliance with mandatory personal data protection legislation across the EU and disclose, in a structured way, the level of personal data protection that they offer to customers. 26/10/

22 3. Essential Structure of the Cloud Privacy Agreement 26/10/2017 Source: CSA 22

23 3. Special Privacy Requirements in the Cloud Privacy Agreement 1. IDENTITY OF THE CSP (AND OF REPRESENTATIV E IN THE EU AS APPLICABLE), ITS ROLE, AND THE CONTACT INFORMATION FOR THE DATA PROTECTION INQUIRIES 2. WAYS IN WHICH THE DATA WILL BE PROCESSED 2.1. Personal data location 2.2. Subcontractors 2.3. Installation of softw are on cloud customer s system 3. DATA TRANSFER 4. DATA SECURITY MEASURES 5. MONITORING 6. PERSONAL DATA BREACH NOTIFICATION 7. DATA PORTABILITY, MIGRATION, AND TRANSFER BACK ASSISTANCE 8. DATA RETENTION, RESTITUTION AND DELETION 8.1. Data retention policy 8.2. Data retention for compliance w ith legal requirements 8.3. Data restitution and/or deletion 9. ACCOUNTABILITY 10. COOPERA TION 11. LEGALLY REQUIRED DISCLOSURE 26/10/2017 Source: CSA 23

24 Agenda 1. The Data Protection Challenge 2. The Software Development Challenge 3. The Cloud Challenge 4. A new Focus on Privacy in the Cloud 5. Bringing the Unicorn down the Trenches 26/10/

25 4. Sanction Thresholds in the GDPR Lower Threshold (2% of worldwide annual turnover or 10 million euros) Fines in the lower threshold are assessed for most provisions including most notably violations of: Obtaining a child s consent according to the applicable conditions Notifying the supervisory authority of a personal data breach Notifying the data subject of a personal data breach Designating a data protection officer Higher Threshold (4 % of worldwide annual turnover or 20 million euros) Fines in the higher threshold are assessed for more serious violations of: Basic principles for processing data including consent Data subjects rights Data transfer provisions Obligations to country specific laws Non-compliance with an order by a supervisory authority 26/10/

26 4. Setting the Focus on the Rights of the Data Subject Article 7 Article 12 Article 13 Article 14 Article 15 Article 16 Article 17 Article 18 Article 19 Article 20 Article 21 Article 22 Right to withdraw consent Transparent information, communication and modalities for the exercise of the rights of the data subject Information to be provided where personal data are collected from the data subject Information to be provided where personal data have not been obtained from the data subject Right of access by the data subject Right to rectification Right to erasure ( right to be forgotten ) Right to restriction of processing Notification obligation regarding rectification or erasure of personal data or restriction of processing Right to data portability Right to object Automated individual decision-making, including profiling 26

27 4. High risk indicators for data subjects rights in the Cloud Evaluation or scoring, including profiling and predicting, especially from aspects concerning the data subject's performance at work, economic situation, health, personal preferences or interests, reliability or behavior, location or movements Automated-decision making with legal or similar significant effect: processing that aims at taking decisions on data subjects producing legal effects concerning the natural person or which similarly significantly affects the natural person Systematic monitoring: processing used to observe, monitor or control data subjects, including data collected through a systematic monitoring of a publicly accessible area Sensitive data: this includes special categories of data as defined in Article 9 as well as personal data relating to criminal convictions or offences. Data processed on a large scale: considering the number of data subjects concerned, the volume of data and/or the range of different data items being processed, the duration or permanence of the data processing activity, the geographical extent of the processing activity Source: WP

28 4. High risk indicators for data subjects rights in the Cloud Datasets that have been matched or combined, for example originating from two or more data processing operations performed for different purposes and/or by different data controllers in a way that would exceed the reasonable expectations of the data subject Data concerning vulnerable data subjects: increased power imbalance between the data subject and the data controller Innovative use or applying technological or organisational solutions, like combining use of finger print and face recognition for improved physical access control Data transfer across borders outside the European Union taking into consideration the envisaged country or countries of destination, the possibility of further transfers or the likelihood of transfers based on derogations for specific situations When the processing in itself prevents data subjects from exercising a right or using service or a contract e.g. processings performed in a public area that people passing by cannot avoid, or processings that aims at allowing, modifying or refusing data subjects access to a service or entry into a contract. Source: WP /10/

29 4. Data Protection Risk and Impact Assessment Violation of data subject rights Source: ISO Source: WP

30 4. Games of Data Subject Rights GDPR Art 7, 12ff GDPR Art 35, Rec 78 Data Subject is entitled to rights Cloud Service Client respects the rights of DS Cloud Service Provider acts on behalf of CSC SCC Third Party Beneficiary Clause Source: Wilhelm 27/10/

31 4. Legal Provisions with Impact on the Cloud Service Provider GDPR Article 35: Where a type of processing in particular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact of the envisaged processing operations on the protection of personal data. [ ] GDPR Recital 78: [ ] When developing, designing, selecting and using applications, services and products that are based on the processing of personal data or process personal data to fulfil their task, producers of the products, services and applications should be encouraged to take into account the right to data protection when developing and designing such products, services and applications and, with due regard to the state of the art, to make sure that controllers and processors are able to fulfil their data protection obligations. The principles of data protection by design and by default should also be taken into consideration in the context of public tenders. SCC Third Party Beneficiary Clause: The data subject can enforce against the data importer this Clause [ ] in cases where the data exporter has factually disappeared or has ceased to exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. 26/10/

32 Agenda 1. The Data Protection Challenge 2. The Software Development Challenge 3. The Cloud Challenge 4. A new Focus on Privacy in the Cloud 5. Bringing the Unicorn down the Trenches 26/10/

33 5. Bringing the Unicorn down the Trenches 7 Foundational Principles of Privacy by Design Completeness of Vision 8 Privacy Design Strategies 5 Core Privacy Design Gears Concreteness of Vision 33

34 5. Core Privacy Design Gears S S G Self Service Gateway Art 7, 15, 16, 17, 22 R S H Subject Request Handler N S P Subject Notification Processor Art 12, 13, 14, 19, 22 Art 7, 12, 15, 16, 17, 18, 20, 21, 22 E R M Art 17, 18, 19 Retention and Erasure Manager 27/10/2017 P S I Art 15, 20 Standardized Portability Interface Source: Wilhelm 34

35 5. Sample: Retention and Erasure Manager in a HR Cloud Service Name Country Contract Start End Erase? Thibaut Courtois Belgium Part Time Dries Mertens Belgium Temporary Robert Lewandowski Poland Full Time Andreas Granqvist Sweden Full Time Adrian Mutu Romania Full Time /10/2017 Source: Wilhelm 35

36 5. First Order Retention Schedule BEL BEL BEL Source: Iron Mountain 36

37 5. Second Order Retention Schedule Source: Iron Mountain 37

38 5. Retention and Erasure Workflow Source: Wilhelm 38

39 Shaping the future of digital business Ernst O. Wilhelm Chief Privacy Officer GFT Technologies SE Schelmenwasenstraße Stuttgart Germany

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready? European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability

More information

Privacy by Design and Privacy by Default

Privacy by Design and Privacy by Default Privacy by Design and Privacy by Default Suk Kim, VP, General Counsel, Urban Airship, Inc. Amanda Gratchner, Principal, IdeaLegal, LLC Alex Wall, Privacy Counsel, Marketo, Inc. The General Data Protection

More information

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit EU GDPR & https://advisera.com/eugdpracademy/eu-gdpr-iso-27001-integrated-documentation-toolkit Note: The documentation should preferably be implemented in the order in which it is listed here. The order

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

SCHOOL SUPPLIERS. What schools should be asking!

SCHOOL SUPPLIERS. What schools should be asking! SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Data Processing Agreement

Data Processing Agreement Data Processing Agreement between The Data Controller Name Address Postcode and city Country and The Data Processor Idha Sweden AB Norra vägen 28 856 50 Sundsvall Sweden] Page 1 of 15 1 Content 2 Data

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017

More information

the processing of personal data relating to him or her.

the processing of personal data relating to him or her. Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the Hotel & Pensionat Björkelund. The use of

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

PRIVACY POLICY PRIVACY POLICY

PRIVACY POLICY PRIVACY POLICY PRIVACY POLICY 1 A. GENERAL PART 1.1. COLLECTION AND PROCESSING OF USER DATA Within the scope of the availability of the website hosted in www.alpinushotel.com and of the services and communications made

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

Privacy Policy. In this data protection declaration, we use, inter alia, the following terms:

Privacy Policy. In this data protection declaration, we use, inter alia, the following terms: Last updated: 20/04/2018 Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of VITO (Vlakwa). The

More information

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Privacy Policy CARGOWAYS Logistik & Transport GmbH

Privacy Policy CARGOWAYS Logistik & Transport GmbH Privacy Policy CARGOWAYS Logistik & Transport GmbH We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the CARGOWAYS

More information

Privacy Policy Hafliger Films SpA

Privacy Policy Hafliger Films SpA Hafliger Films SpA, with registered office at Via B. Buozzi no. 14-20089 Rozzano (MI), has for many years considered it of fundamental importance to protect the personal details of customers and suppliers,

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE

THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE EU DATA PROTECTION REGULATION Kalliopi Spyridaki Chief Privacy Strategist,

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

How icims Supports. Your Readiness for the European Union General Data Protection Regulation How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection

More information

Rights of Individuals under the General Data Protection Regulation

Rights of Individuals under the General Data Protection Regulation Rights of Individuals under the General Data Protection Regulation 2018 Contents Introduction... 2 Glossary... 3 Personal data... 3 Processing... 3 Data Protection Commission... 3 Data Controller... 3

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

EU GDPR and  . The complete text of the EU GDPR can be found at  What is GDPR? EU GDPR and Email The EU General Data Protection Regulation (GDPR) is the new legal framework governing the use of the personal data of European Union (EU) citizens across all EU markets. It replaces existing

More information

Our agenda. The basics

Our agenda. The basics GDPR - AVG - RGPD. Our agenda The basics Key actions Responsibilities The basics Key actions Responsibilities Who cares? Why? From directive to regulation 24 Oct 1995: a Directive 95/46/EC is adopted partially

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

DATA PROCESSING ADDENDUM

DATA PROCESSING ADDENDUM DATA PROCESSING ADDENDUM DATA PROCESSING ADDENDUM This Data Processing Addendum (this Addendum ) is executed by and between Paragon Internet Group Limited t/a Tsohost ( Tsohost ) and you ( Customer ) and

More information

27018, (27017) & Cloud en/of PII protection

27018, (27017) & Cloud en/of PII protection 27018, (27017) & 29151 Cloud en/of PII protection Beer Franken, AMC Chief information security & privacy protection officer Standards and Regulations 1 Programma ISO/IEC 27018:2014 CoP for protection of

More information

General Data Protection Regulation (GDPR) Key Facts & FAQ s

General Data Protection Regulation (GDPR) Key Facts & FAQ s General Data Protection Regulation (GDPR) Key Facts & FAQ s GDPR comes into force on 25 May 2018 GDPR replaces the Data Protection Act 1998. The main principles are much the same as those in the current

More information

1. Right of access. Last Approval Date: May 2018

1. Right of access. Last Approval Date: May 2018 Page 1 of 5 I. PURPOSE The European Union s General Data Protection Regulation (GDPR) provides greater data protection for individuals in the European Union (EU). This comprehensive regulation, effective

More information

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 25 May 2018 Contents 1. Introduction... 2 1.1. Scope

More information

Privacy Policy Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH 1. Definitions

Privacy Policy Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH 1. Definitions Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the Kühnreich & Meixner GmbH. The use of the

More information

Privacy Notice for Business Partners

Privacy Notice for Business Partners We, an affiliate of the Glatfelter group ( Glatfelter, Company, us, we, or our ), are committed to protecting your personal data responsibly and in compliance with applicable privacy and data protection

More information

Adtech and GDPR What to consider when choosing your partner

Adtech and GDPR What to consider when choosing your partner Adtech and GDPR What to consider when choosing your partner 1 Agenda What to avoid and What to do Where is Adform on GDPR Posibilities for advertisers 2 This is about GDPR, not the unknown eprivacy update

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

NOTICE OF PERSONAL DATA PROCESSING

NOTICE OF PERSONAL DATA PROCESSING Last modified: May 22, 2018 NOTICE OF PERSONAL DATA PROCESSING InVue Security Products Inc. ( InVue, "Corporation" Company, Our, and We") respects your privacy and is committed to protecting your privacy

More information

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across

More information

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know The General Data Protection Regulation (GDPR) The eprivacy Regulation (epr) The Network and Information Security Directive

More information

How the GDPR will impact your software delivery processes

How the GDPR will impact your software delivery processes How the GDPR will impact your software delivery processes About Redgate 230 17 202,000 2m Redgaters and counting years old customers SQL Server Central and Simple Talk users 91% of the Fortune 100 use

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

GDPR AND GRC: GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE FOR DATA PROTECTION

GDPR AND GRC: GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE FOR DATA PROTECTION A partner of Minerva Group Service AND GRC: GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE FOR DATA PROTECTION Andrea LEONARDI - Stefano MICHELOTTI Lugano (CH), 20 and 21 November2017 1 www.minervagroupservice.it

More information

Data Processing Agreement DPA

Data Processing Agreement DPA Data Processing Agreement DPA between Clinic Org. no. «Controller». and Calpro AS Org. nr. 966 291 281. «Processor» If the parties have executed a Data Management Agreement, the Date Management Agreement

More information

Designing GDPR compliant software

Designing GDPR compliant software Designing GDPR compliant software 1 Alain Cieslik Agenda o GDPR Summary o What does compliance with GDPR mean? o Example of GDPR Accountability o Consent & Purpose Management o What does security mean

More information

Strasbourg, 21 December / décembre 2017

Strasbourg, 21 December / décembre 2017 Strasbourg, 21 December / décembre 2017 T-PD(2017)20Rev CONSULTATIVE COMMITTEE OF THE CONVENTION FOR THE PROTECTION OF INDIVIDUALS WITH REGARD TO AUTOMATIC PROCESSING OF PERSONAL DATA COMITÉ CONSULTATIF

More information

Information technology Security techniques Code of practice for personally identifiable information protection

Information technology Security techniques Code of practice for personally identifiable information protection INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

G DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know

G DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know G DATA Whitepaper The new EU General Data Protection Regulation - What businesses need to know G DATA Software AG September 2017 Introduction Guaranteeing the privacy of personal data requires more than

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible

More information

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into

More information

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General

More information

1 About GfK and the Survey What are personal data? Use of personal data How we share personal data... 3

1 About GfK and the Survey What are personal data? Use of personal data How we share personal data... 3 Privacy Notice For ad-hoc CAWI (without target list) V1.0 June 4, 2018 Contents 1 About GfK and the Survey... 2 2 What are personal data?... 2 3 Use of personal data... 2 4 How we share personal data...

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

GDPR and the Privacy Shield

GDPR and the Privacy Shield GDPR and the Privacy Shield Mark Prinsley Partner +44 20 3130 3900 mprinsley@mayerbrown.com Kendall Burman Counsel + 202 263 3210 kburman@mayerbrown.com Speakers Kendall Burman Counsel Washington DC Mark

More information

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1 Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and

More information

Cybersecurity Considerations for GDPR

Cybersecurity Considerations for GDPR Cybersecurity Considerations for GDPR What is the GDPR? The General Data Protection Regulation (GDPR) is a brand new legislation containing updated requirements for how personal data of European Union

More information

DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018

DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 Introduction This disclosure on the processing of personal data (hereinafter, the "Disclosure") is provided pursuant to Art.

More information

GENERAL DATA PROTECTION REGULATION (GDPR)

GENERAL DATA PROTECTION REGULATION (GDPR) GENERAL DATA PROTECTION REGULATION (GDPR) Date: 01/02/17 Vendor Assessment Contents Introduction 2 Transparency 2 Collection and Purpose Limitation 4 Quality 4 Privacy Program Management 5 Security for

More information

GDPR compliance: some basics & practical to do list

GDPR compliance: some basics & practical to do list GDPR compliance: some basics & practical to do list Philippe LAURENT independent full service business law firm located in Brussels May 2017 Personal data processing = any operation or set of operations

More information

Privacy Statement for Use of the Certification Service of Swisscom (sales name: "All-in Signing Service")

Privacy Statement for Use of the Certification Service of Swisscom (sales name: All-in Signing Service) Swisscom (sales name: "All-in Signing Service") General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible and legally compliant manner is a top priority

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

FAQ about the General Data Protection Regulation (GDPR)

FAQ about the General Data Protection Regulation (GDPR) FAQ about the General Data Protection Regulation (GDPR) 1. When does the GDPR come into force? The GDPR was promulgated 25 May 2016 and comes into effect 25 May 2018. 2. Is there a transition period? We

More information

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

GDPR: A GUIDE TO READINESS

GDPR: A GUIDE TO READINESS SATORI CONSULTING GDPR: A GUIDE TO READINESS The European Union (EU) is implementing the General Data Protection Regulation (GDPR) that takes effect May of 2018. Any businesses offering goods or services

More information

Online Ad-hoc Privacy Notice

Online Ad-hoc Privacy Notice Online Ad-hoc Privacy Notice Last revised: 24 May 2018 Table of contents 1 About us and our Surveys... 2 2 What is personal data?... 2 3 Use of personal data... 2 3.1 Categories of personal data that are

More information

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal What is GDPR? GDPR (General Data Protection Regulation) is Europe s new privacy law. Adopted in April 2016, it replaces the 1995 Data Protection Directive and marks the biggest change in data protection

More information

Privacy policy SIdP website EU 2016/679

Privacy policy SIdP website EU 2016/679 Privacy policy SIdP website EU 2016/679 Categories of data subjects: Website users and users of the members-only area Update of the privacy policy: 30/08/2018 The present document contains the information

More information

Privacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018.

Privacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018. Privacy Policy MIPS Website Privacy Policy Version 1.0 Version date March 2018 Document Information Prepared for Users of MIPS websites Prepared by MIPS NV Date 27/02/2018 Contact Details Joffrey WILLEM

More information

PRIVACY POLICY OF THE WEB SITE

PRIVACY POLICY OF THE WEB SITE PRIVACY POLICY OF THE ERANOS FOUNDATION Introductory remarks The Eranos Foundation respects your privacy! Privacy policy EU Norm 2016-769 GDPR 1 We do not sell or distribute any information that we acquire

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR) Michael Eva, London Grid for Learning What is GDPR? General Data Protection Regulation (GDPR) protects the personal data of EU citizens regardless of where the

More information

In this data protection declaration, we use, inter alia, the following terms:

In this data protection declaration, we use, inter alia, the following terms: Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of Z&J Technologies GmbH. The use of the Internet

More information

What You Need to Know About Addressing GDPR Data Subject Rights in Pivot

What You Need to Know About Addressing GDPR Data Subject Rights in Pivot What You Need to Know About Addressing GDPR Data Subject Rights in Pivot Not Legal Advice This document is provided for informational purposes only and must not be interpreted as legal advice or opinion.

More information

PRIVACY POLICY. 1. Introduction

PRIVACY POLICY. 1. Introduction PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy

More information

GLOBAL DATA PROTECTION POLICY

GLOBAL DATA PROTECTION POLICY GLOBAL DATA PROTECTION POLICY BRS UK Version 1.0 TABLE OF CONTENTS SCOPE 2 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 2 Compliance with the European data protection law and any additional applicable

More information

Arkadin Data protection & privacy white paper. Version May 2018

Arkadin Data protection & privacy white paper. Version May 2018 Arkadin Data protection & privacy white paper Version May 2018 Table of Contents 1- About Arkadin 4 2- Objectives 6 3- What does the GDPR cover? 8 4- What does the GDPR require? 10 5- Who are the data

More information

I. Name and Address of the Controller

I. Name and Address of the Controller I. Name and Address of the Controller The Controller within the meaning of the General Data Protection Regulation and other national data protection acts of the member states as well as miscellaneous regulations

More information

Wonde may collect personal information directly from You when You:

Wonde may collect personal information directly from You when You: Privacy Policy Updated: 17th April 2018 1. Scope At Wonde, we take privacy very seriously. We ve updated our privacy policy ( Policy ) to ensure that we communicate to You, in the clearest way possible,

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 23 January 2019 1 Table of contents 1.1 Scope of the

More information

CEM Benchmarking Privacy Policy

CEM Benchmarking Privacy Policy CEM Benchmarking Privacy Policy Final Draft: 18/05/18 Next Review Date: 22/05/19 Page 1 Contents Page 1 Outline 3 2 Categories of personal data 3 3 Sources of personal data 3 4 Purposes 4 5 Lawful basis

More information

GDPR - Are you ready?

GDPR - Are you ready? GDPR - Are you ready? Anne-Marie Bohan and Michael Finn 24 March 2018 Matheson Ranked Ireland s Most Innovative Law Firm Financial Times 2017 International Firm in the Americas International Tax Review

More information

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) May 2018 Document Classification Public Q&A for Citco Fund Services clients in relation to The General Data Protection

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

GDPR: A technical perspective from Arkivum

GDPR: A technical perspective from Arkivum GDPR: A technical perspective from Arkivum Under the GDPR, you have a general obligation to implement technical and organisational measures to show that you have considered and integrated data protection

More information

Accelerate GDPR compliance with the Microsoft Cloud

Accelerate GDPR compliance with the Microsoft Cloud Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with

More information