GDPR AND GRC: GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE FOR DATA PROTECTION

Size: px
Start display at page:

Download "GDPR AND GRC: GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE FOR DATA PROTECTION"

Transcription

1 A partner of Minerva Group Service AND GRC: GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE FOR DATA PROTECTION Andrea LEONARDI - Stefano MICHELOTTI Lugano (CH), 20 and 21 November2017 1

2 SPEAKERS LEONARDI, Andrea (CONSULTANT, TRAINER, AUDITOR MINERVA GROUP SERVICE) Graduating from Bocconi University with over 20 years experience in several industries, functions and projects, Andrea LEONARDI is Co-Founder and Vice President of Minerva Gorup Service s.c.c.pa, a company focused in providing advisory, training and audit services. He is advisor, trainer and auditor for and related standards (e.g Information Security Management System, IT Service Management System, Business Continuity Management System). MICHELOTTI, Stefano (CHAIRMAN MINERVA GROUP SERVICE) Stefano MICHELOTTI is Co-Founder and Chairman of Minerva Group Service s.c.c.p.a, a cooperative joint stock consortium company that is the hub of a network of companies (consortium companies). Minerva Group Service is strongly committed to providing professional and business services (e.g. GRC,, Management System, Cybersecurity, Project Management, etc.). He is advisor, trainer and auditor for, Risk Management ( 31000) and Compliance Management( 19600). 2

3 IS LANDING ON YOUR PLANET ARE YOU READY? What and When? REGULATION(EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC(General Data Protection Regulation) Tempus fugit. 25 May 2018 Who and Where? Personal data information relating to an identified or identifiable natural person ( data subject ) Personal data EU Data Subjects Processing (automated means or other) Controller Why? Controller No (compliance)?! No (Business) Party.and hugeadministrativefines! Compliance Governance Risk Management up to 4 % of the total worldwide annual turnover Fines Supervisory Authority A GRC road mapto following Management Systems! 3

4 What? Foreword(173 items) CHAPTER I General provisions CHAPTER II Principles CHAPTER III Rights of the data subject Section 1 Transparency and modalities Section 2 Information and access to personal data Section3 Rectificationand erasure Section 4 Right to object and automated individual decision-making Section 5 Restrictions 4

5 What? CHAPTER IV Controller and processor Section 1 General obligations Section 2 Security of personal data Section 3 Data protection impact assessment and prior consultation Section 4 Data protection officer Section 5 Codes of conduct and certification 5

6 What? CHAPTER V Transfers of personal data to third countries or international organisations CHAPTER VI Independent supervisory authorities Section 1 Independent status Section 2 Competence, tasks and powers CHAPTER VII Cooperation and consistency CHAPTER VIII Remedies, liability and penalties CHAPTER IX Provisions relating to specific processing situations CHAPTER X Delegated acts and implementing acts 6

7 Who? CHAPTER I General provisions Applies PERSONAL DATA PROCESSING FILING SYSTEM DATA SUBJECT This Regulation applies to the processing of personal data wholly or partly by automated means and to the processing other than by automated means of personal data which form partofafilingsystemorareintendedtoformpartofafilingsystem 7

8 Who? CHAPTER I General provisions PERSONAL DATA genetic data biometric data data concerning health any information relating to an identified or identifiable natural person( data subject ); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person; 8

9 Who? CHAPTER I General provisions PERSONAL DATA PROCESSING any operation or set ofoperations which is performedon personal data oron setsof personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction profiling any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person's performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements pseudonymisat ion the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person 9

10 Where? CHAPTER I General provisions PROCESSING CONTROLLER PROCESSOR Established in EU EU EXTRA EU This Regulation applies to the processing of personal data in the context of the activities of an establishment of a controller or a processor in the Union, regardless of whether the processing takes placeintheunionornot l119/32officialjournal oftheeuropeanunionen PROCESSING Goods services CONTROLLER PROCESSOR NOT established in EU OFFERING Monitoring of behavioring DATA SUBJECT.This Regulation applies to the processing of personal data of data subjects who are in the Union by a controller or processor not established in the Union, where the processing activities are related to: (a) the offering of goods or services, irrespective of whether a payment of the data subject is required, to such data subjects in the Union; or (b) the monitoring of their behaviouras far as their behaviourtakes place within the Union. UE 10

11 Why? CHAPTER VIII Remedies, liability and penalties effective, proportionateand dissuasive. administrative fines imposition SUPERVRY AUTHORITY e.g. for Italy 11

12 Why? administrative fines up to EUR up to2 % of the total worldwide annual turnover of the preceding financial year COMPANY Infringements of the following provisions obligations of the controller and the processor CONTROLLER PROCESSOR obligations of the controller and the processor CHAPTER II Principles Art. 8 Art. 11 obligations of the controller and the processor CHAPTER IV Controller and processor Art Art

13 Why? administrative fines up to EUR up to 4 % of the total worldwide annual turnover of the preceding financial year COMPANY Infringements of the following provisions CHAPTER II Principles Art.5 Art.6 Art.7 Art.9 basic principles for processing PROCESSING Infringements of the following provisions CHAPTER III Rights of the data subject Art DATA SUBJECT 13

14 GRC Governance, Risk Management, Compliance for Data Protection GOVERNANCE PRIVACY RISK MANAGEMENT COMPLIANCE

15 29100 Standard 29100:2011 «information technology security techniques privacy framework» Standard 31000:2009 Risk management Principles and guidelines Standard 19600:2014 «Compliance management systems Guidelines» /IEC Information technology Security techniques Guidelines for privacy impact assessment Standard 19011:20111 Guidelines for auditing management Systems 15

16 29100 PRIVACY FRAMEWOK Roles, responsibilities and interactions CONTROLLER the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data PROCESSOR natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller;.. PII Mapping PROCESSING CONTROLS records of processing activities appropriate technical and organisational measures Principles Principles Policies COMPLIANCE 16

17 DATA PROTECTION OFFICER..to inform and advise the controller or the processor and the employees who carry out processing of their obligations pursuant to this Regulation and to other Union or Member State data protection provisions; to monitor compliance with this Regulation, with other Union or Member State data protection provisions and with the policies of the controller or processor in relation to the protection of personal data, including the assignment of responsibilities, awareness-raising and training of staff involved in processing operations, and the related audits; to cooperate with the supervisory authority.. to act as the contact point for the supervisory authority on issues relating to processing, including the prior consultation referred to in Article 36, and to consult, where appropriate, with regard to any other matter

18 31000 RISK MANAGEMENT FRAMEWOK Taking into account the nature, scope, context and purposes of processing the risks of varying likelihood and severity for the rights and freedoms of natural persons.. Risk Management Establishingthe context Establishingthe external context Establishingthe internal context Risk assessment Risk identification Risk analysis Risk evaluation appropriate technical and organisational measures Risk treatment 18

19 29134 Preparing the grounds for PIA process for conducting a PIA General PIA Report General Annex A (informative) Scale criteria on the level of impact and on the likelihood Determine whether a PIA is necessary (threshold analysis) Report structure Preparation of the PIA Scope of PIA Perform the PIA Risk Assessment Follow the PIA Risk Treatment Plan Conclusions and Decisions PIA Public Summary 19

20 19600 COMPLIANCE MANAGEMENT FRAMEWOK Legal, contractual, regulatory, technical Requirements Compliance Privacy Shield Standa rds SUPERVRY AUTHORITY COMPLIANCE FRAMEWOK Code of Conduct Certificati on 20

21 GRC appropriate technical and organisational measures INFORMATION SECURITY IT SERVICE GRC BUSINESS CONTINUITY

22 Standard /IEC :2011 «Information technology Service management Part 1: Service management system requirements» Standard /IEC 27001:2013 «Information technology Security Techniques Information Security Management Systems Requirements» Standard 22301:2012 Societal security Business continuity management systems Requirements 22

23 SMS and relationships with ISMS 27001andBCMS22301 SMS PROCESS Design and transition of new or changed services Capacity management Service continuity& availability management Service delivery processes Information security Management Budgeting& accounting for services Service level management Service reporting A , AnnexA Resolution processes Incident and service request management Problem management Control processes Configuration management Change management Release and deployment management Relationship processes Business relationship management Supplier management 23

24 SMS and main relationships with SMS PROCESS Design and transition of new or changed services Service delivery processes Privacy by design Privacy by default Privacy Impact assessment Rights of the data subject Privacy breach External processors and third parties Capacity management Service continuity& availability management Service level management Resolution processes Incident and service request management Problem management Information security Management Budgeting& accounting for services Service reporting Control processes Configuration management Change management Release and deployment management Relationship processes Business relationship management Supplier management 24

25 27001 INFORMATION SECURITY PHYSICAL SECURITY HR AND ORGANIZATIONAL SECURITY DATA PROTECTION PERSONAL DATA cloud IT SECURITY «CYBERSECURITY» Standard /IEC : 2012 «Information technology Security techniques Guidelines for cybersecurity» Standard /IEC 27018: 2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 25

26 27001 Threat Vulnerability assetts SW Incident DATA Processing Information Security Objectives Integrity, Availability, Confidentiality Physical and Environmental security perimeter 26

27 27001 Annex A appropriate technical and organisational measures A.5 Information Security Policy A.6 Organization of Information Security A.7 Human Resource Security A.8 Assett Management A.9 Access Control A.10 Cryptography A.11 Physical and Environmental Security A.12 Operations Security A.13 Communication Security A.14 System Acquisition, developmentand maintenance A.15 Supplier relationships A.16 Information Security Incident Management A.17 Information Security aspectsof business continuity A.18 Compliance 27

28 27001 Annex A A.18 CLAUSE A.18 Compliance CONTROL OBJECTIVE A.18.1 compliance with legal and contractual requirements CONTROL A privacy and protection of personal identifiables information(pii) 28

29 22301 Privacy breach Incident DISRUPTION PROCESSING DATA Impact Loss of Availability DATA SUBJECT RESILIENCE RISK ASSESSMENT (BIA) BUSINESS IMPACT ANALYS BUSINESS CONTINUITY STRATEGY BUSINESS CONTINUITY PLANS TESTING AND EXERCISING (PIA) Privacy Impact Assessment Privacy by design Privacy by default

30 : AN INFOGRAPHIC and relationshipswith main standards Desig nation GOVERNANCE Training and Awareness proce dures Controller DPO Processors & Data handlers Risk(confidentiality, integrity,availability) Technical and organisational measures Resilience RISK MANAGEMENT Privacy Impact Assessmen Personal data breach COMPLIANCE Rights of the Data Subject Issues of Supervisory Authority Information & Consent GRC in data processing Recordsof processing activities data EU DataSubjects doc purposes of processing DATA PROCESSING operations on data data Perimeter and means in data processing («privacy by default & privacy by design») doc Storage Transmission Dissemination (internal and external)) ORGANIZATION & HR PHYSICAL SITES (including external Datacenter) cloud («cybersecurity») INFORMATION TECHNOLOGY 30

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

EU GDPR and  . The complete text of the EU GDPR can be found at  What is GDPR? EU GDPR and Email The EU General Data Protection Regulation (GDPR) is the new legal framework governing the use of the personal data of European Union (EU) citizens across all EU markets. It replaces existing

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal What is GDPR? GDPR (General Data Protection Regulation) is Europe s new privacy law. Adopted in April 2016, it replaces the 1995 Data Protection Directive and marks the biggest change in data protection

More information

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

G DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know

G DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know G DATA Whitepaper The new EU General Data Protection Regulation - What businesses need to know G DATA Software AG September 2017 Introduction Guaranteeing the privacy of personal data requires more than

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

Conducting a data flow mapping exercise under the GDPR. Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017

Conducting a data flow mapping exercise under the GDPR. Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017 Conducting a data flow mapping exercise under the GDPR Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017 TM Introduction Alan Calder Founder of IT Governance The single

More information

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready? European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability

More information

Cybersecurity Considerations for GDPR

Cybersecurity Considerations for GDPR Cybersecurity Considerations for GDPR What is the GDPR? The General Data Protection Regulation (GDPR) is a brand new legislation containing updated requirements for how personal data of European Union

More information

GDPR compliance: some basics & practical to do list

GDPR compliance: some basics & practical to do list GDPR compliance: some basics & practical to do list Philippe LAURENT independent full service business law firm located in Brussels May 2017 Personal data processing = any operation or set of operations

More information

Privacy Policy. In this data protection declaration, we use, inter alia, the following terms:

Privacy Policy. In this data protection declaration, we use, inter alia, the following terms: Last updated: 20/04/2018 Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of VITO (Vlakwa). The

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017

More information

the processing of personal data relating to him or her.

the processing of personal data relating to him or her. Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the Hotel & Pensionat Björkelund. The use of

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

Data Processing Agreement

Data Processing Agreement Data Processing Agreement This Data Processing Agreement ( the Agreement or DPA ) constitutes the obligations for TwentyThree ApS Sortedam Dossering 5D 2200 Copenhagen N Denmark (hereinafter The Data Processor

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates IMPACT OF INTERNATIONAL PRIVACY REGULATIONS Michelle Caswell, Coalfire Julia Jacobson, K&L Gates Introduction to International Privacy Law General Data Protection Regulation 2 2018 HITRUST Alliance What

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Information technology Security techniques Code of practice for personally identifiable information protection

Information technology Security techniques Code of practice for personally identifiable information protection INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Arkadin Data protection & privacy white paper. Version May 2018

Arkadin Data protection & privacy white paper. Version May 2018 Arkadin Data protection & privacy white paper Version May 2018 Table of Contents 1- About Arkadin 4 2- Objectives 6 3- What does the GDPR cover? 8 4- What does the GDPR require? 10 5- Who are the data

More information

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit EU GDPR & https://advisera.com/eugdpracademy/eu-gdpr-iso-27001-integrated-documentation-toolkit Note: The documentation should preferably be implemented in the order in which it is listed here. The order

More information

GDPR Privacy Policy. The data protection policy of AlphaMed Press is based on the terms found in the GDPR.

GDPR Privacy Policy. The data protection policy of AlphaMed Press is based on the terms found in the GDPR. GDPR Privacy Policy PRIVACY POLICY The privacy and security of data are a priority for AlphaMed Press and our management and staff. While accessing and using our website does not require your submission

More information

Privacy Policy CARGOWAYS Logistik & Transport GmbH

Privacy Policy CARGOWAYS Logistik & Transport GmbH Privacy Policy CARGOWAYS Logistik & Transport GmbH We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the CARGOWAYS

More information

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

How icims Supports. Your Readiness for the European Union General Data Protection Regulation How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection

More information

GLOBAL DATA PROTECTION POLICY

GLOBAL DATA PROTECTION POLICY GLOBAL DATA PROTECTION POLICY Last update: April 2nd, 2018 SCOPE 3 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 3 Compliance with the European Data Protection Law and any additional applicable data

More information

Data Breaches and the EU GDPR

Data Breaches and the EU GDPR Data Breaches and the EU GDPR Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 30 June 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC Consultant Infrastructure Services Business Process

More information

Protecting your data. EY s approach to data privacy and information security

Protecting your data. EY s approach to data privacy and information security Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

- GDPR (General Data Protection Regulation) is the new Data Protection Regulation of the European Union;

- GDPR (General Data Protection Regulation) is the new Data Protection Regulation of the European Union; PRIVACY NOTICE INTRODUCTION During the operation of the website data controller processes the data of persons registered on the website in order to be able to provide them with adequate services. Service

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Privacy Policy Hafliger Films SpA

Privacy Policy Hafliger Films SpA Hafliger Films SpA, with registered office at Via B. Buozzi no. 14-20089 Rozzano (MI), has for many years considered it of fundamental importance to protect the personal details of customers and suppliers,

More information

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland. PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

How the GDPR will impact your software delivery processes

How the GDPR will impact your software delivery processes How the GDPR will impact your software delivery processes About Redgate 230 17 202,000 2m Redgaters and counting years old customers SQL Server Central and Simple Talk users 91% of the Fortune 100 use

More information

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General

More information

Privacy Policy Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH 1. Definitions

Privacy Policy Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH Kühnreich & Meixner GmbH 1. Definitions Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the Kühnreich & Meixner GmbH. The use of the

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Overview of Akamai s Personal Data Processing Activities and Role

Overview of Akamai s Personal Data Processing Activities and Role Overview of Akamai s Personal Data Processing Activities and Role Last Updated: April 2018 This document is maintained by the Akamai Global Data Protection Office 1 Introduction Akamai is a global leader

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

GLOBAL DATA PROTECTION POLICY

GLOBAL DATA PROTECTION POLICY GLOBAL DATA PROTECTION POLICY BRS UK Version 1.0 TABLE OF CONTENTS SCOPE 2 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 2 Compliance with the European data protection law and any additional applicable

More information

Privacy Notice for Business Partners

Privacy Notice for Business Partners We, an affiliate of the Glatfelter group ( Glatfelter, Company, us, we, or our ), are committed to protecting your personal data responsibly and in compliance with applicable privacy and data protection

More information

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know The General Data Protection Regulation (GDPR) The eprivacy Regulation (epr) The Network and Information Security Directive

More information

GDPR and the Privacy Shield

GDPR and the Privacy Shield GDPR and the Privacy Shield Mark Prinsley Partner +44 20 3130 3900 mprinsley@mayerbrown.com Kendall Burman Counsel + 202 263 3210 kburman@mayerbrown.com Speakers Kendall Burman Counsel Washington DC Mark

More information

Information leaflet about processing of personal data (

Information leaflet about processing of personal data ( Information leaflet about processing of personal data (www.magyarfoldgazkereskedo.hu) In accordance with articles 13 and 14 of the regulation (EU) 2016/679 OF the European Parliament and of the Council

More information

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into

More information

Data subject ( Customer or Data subject ): individual to whom personal data relates.

Data subject ( Customer or Data subject ): individual to whom personal data relates. Privacy Policy 1. Information on the processing of personal data We hereby inform you in this document about the principles and procedures for processing your personal data and your rights, in accordance

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

DISCLOSURE PURSUANT TO ART. 13 EU REGULATION No. 2016/679 (GDPR) Customers and prospects

DISCLOSURE PURSUANT TO ART. 13 EU REGULATION No. 2016/679 (GDPR) Customers and prospects DISCLOSURE PURSUANT TO ART. 13 EU REGULATION No. 2016/679 (GDPR) Customers and prospects The company SORMA S.p.A., with registered office in Mestre (VE), 30174, Via Don Tosatto, no. 8, as the data controller

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

General Data Protection Regulation (GDPR) Key Facts & FAQ s

General Data Protection Regulation (GDPR) Key Facts & FAQ s General Data Protection Regulation (GDPR) Key Facts & FAQ s GDPR comes into force on 25 May 2018 GDPR replaces the Data Protection Act 1998. The main principles are much the same as those in the current

More information

CAPGEMINI BINDING CORPORATE RULES

CAPGEMINI BINDING CORPORATE RULES CAPGEMINI BINDING CORPORATE RULES Introduction As one of the world s foremost providers of consulting, technology and outsourcing services to a wide array of clients around the world, Capgemini is committed

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

What is ISO/IEC 27001?

What is ISO/IEC 27001? An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified Data Protection Officer The objective of the PECB Certified Data Protection Officer examination is to ensure that the candidate has acquired the knowledge and skills

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

WELCOME ISO/IEC 27001:2017 Information Briefing

WELCOME ISO/IEC 27001:2017 Information Briefing WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

Data Processing Agreement

Data Processing Agreement Data Processing Agreement between The Data Controller Name Address Postcode and city Country and The Data Processor Idha Sweden AB Norra vägen 28 856 50 Sundsvall Sweden] Page 1 of 15 1 Content 2 Data

More information

First edition Reference number ISO/IEC 27018:2014(E) ISO/IEC 2014

First edition Reference number ISO/IEC 27018:2014(E) ISO/IEC 2014 INTERNATIONAL STANDARD ISO/IEC 27018 First edition 2014-08-01 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security management Technologies de l'information Techniques de

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 25 May 2018 Contents 1. Introduction... 2 1.1. Scope

More information

ISO/IEC Information technology Security techniques Code of practice for information security management

ISO/IEC Information technology Security techniques Code of practice for information security management This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security

More information

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data Privacy Policy Datacenter.com (referred to as we, us, our, Datacenter or the Company ) is committed to protecting your privacy and handling your data in an open and transparent manner. The personal data

More information

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM AIRMIC ENTERPRISE RISK MANAGEMENT FORUM Date 10 November 2016 Name Nick Gibbons Position, PARTNER BLM T: 0207 457 3567 E: Nick.Gibbons@blmlaw.com SUMMARY Cyber crime is now a daily reality Every business

More information

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services

More information

PRIVACY STATEMENT August 2018

PRIVACY STATEMENT August 2018 PRIVACY STATEMENT August 2018 1 ABOUT GDPR GDPR, or the General Data Protection Regulation is a new set of EU regulations set to come into force, as a replacement to the existing Data Protection Act. It

More information

SDL Privacy Policy Cloud Services

SDL Privacy Policy Cloud Services SDL Privacy Policy Cloud Services Software-As-A-Service Products Version 11-04-2017 v1.4 SDL plc Globe House Clivemont Road, Maidenhead SL6 7DY England www.sdl.com SDL Tridion Infrastructure Summary This

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability

ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability Prof. Dr. Paolo Balboni Founding Partner Professor of Privacy, Cybersecurity, and IT Contract

More information

PRINCIPLES OF PROTECTION OF PERSONAL DATA (GDPR) WITH EFFICIENCY FROM

PRINCIPLES OF PROTECTION OF PERSONAL DATA (GDPR) WITH EFFICIENCY FROM PRINCIPLES OF PROTECTION OF PERSONAL DATA (GDPR) WITH EFFICIENCY FROM 25.5.2018 Through our Privacy Policy ("Policy"), we inform the entities of the data we process our personal data, as well as all the

More information

The GDPR: The catalyst for customer July 2017

The GDPR: The catalyst for customer July 2017 The GDPR: The catalyst for customer 360 5 July 2017 TM Speakers Alan Calder Tim Vincent Founder and Executive Chairman, IT Governance Ltd EMEA Solution Engineer Team Lead DataStax TM Introduction Alan

More information

Data management guidelines. COMBIT Information Technology Private Limited Company. General information about the aim of the data management guidelines

Data management guidelines. COMBIT Information Technology Private Limited Company. General information about the aim of the data management guidelines Data management guidelines COMBIT Information Technology Private Limited Company I.) General information about the aim of the data management guidelines COMBIT Information Technology Private Limited Company

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Data Privacy Notice. Madsen Advisory Limited ("Madsen") is committed to protecting and respecting your privacy.

Data Privacy Notice. Madsen Advisory Limited (Madsen) is committed to protecting and respecting your privacy. Data Privacy Notice 1.INTRODUCTION Madsen Advisory Limited ("Madsen") is committed to protecting and respecting your privacy. We pledge to handle your data fairly and legally at all times and are committed

More information

A practical guide to using ScheduleOnce in a GDPR compliant manner

A practical guide to using ScheduleOnce in a GDPR compliant manner A practical guide to using ScheduleOnce in a GDPR compliant manner Table of Contents Glossary 2 Background What does the GDPR mean for ScheduleOnce users? Lawful basis for processing Inbound scheduling

More information

BHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD

BHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD BHBIA New Data Protection Rules Pharma Company Perspective Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD Pharma Company Perspective Data Controllers Responsibilities

More information

An Introduction to the ISO Security Standards

An Introduction to the ISO Security Standards An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

NEWSFLASH GDPR N 8 - New Data Protection Obligations

NEWSFLASH GDPR N 8 - New Data Protection Obligations GDPR N 8 May 2017 NEWSFLASH GDPR N 8 - New Data Protection Obligations Following the adoption of the new EU General Data Protection Regulation (GDPR) on 27 April 2016, most organisations began to re-examine

More information

EU - GDPR Solution Brief. New York GDPR Cybersecurity. EventTracker 8815 Centre Park Drive, Columbia MD 21045

EU - GDPR Solution Brief. New York GDPR Cybersecurity. EventTracker 8815 Centre Park Drive, Columbia MD 21045 EU - Solution Brief New York Cybersecurity EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker delivers business critical solutions that transform high-volume cryptic

More information

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report KuppingerCole Report WHITE PAPER by Mike Small December 2017 GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com

More information

ISO/IEC Information technology Security techniques Code of practice for information security controls

ISO/IEC Information technology Security techniques Code of practice for information security controls INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de

More information