EU General Data Protection Regulation (GDPR) Achieving compliance

Similar documents
The GDPR Are you ready?

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Knowing and Implementing the GDPR Part 3

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation (GDPR)

The Role of the Data Protection Officer

Cybersecurity Considerations for GDPR

Google Cloud & the General Data Protection Regulation (GDPR)

Our agenda. The basics

Data Management and Security in the GDPR Era

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

CIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

BHConsulting. Your trusted cybersecurity partner

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Accelerate GDPR compliance with the Microsoft Cloud

GDPR compliance: some basics & practical to do list

GDPR: A QUICK OVERVIEW

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

G DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know

Bring Your Own Device (BYOD)

GDPR Update and ENISA guidelines

Technology's role in General Data Protection Regulation Dr. Prokopios Drogkaris Officer in NIS SECPRE 2017 Oslo

BHConsulting. Your trusted cybersecurity partner

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

EU GDPR & ISO Integrated Documentation Toolkit integrated-documentation-toolkit

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

General Data Protection Regulation (GDPR) Key Facts & FAQ s

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Data Protection and GDPR

EXAM PREPARATION GUIDE

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

Implementing the new GDPR: what does it mean for Universities?

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

BHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD

GDPR COMPLIANCE REPORT

Certified Cyber Security Specialist

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

Cybersecurity Auditing in an Unsecure World

SCHOOL SUPPLIERS. What schools should be asking!

Conducting a data flow mapping exercise under the GDPR. Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

General Data Protection Regulation (GDPR) The impact of doing business in Asia

NYDFS Cybersecurity Regulations

Data Processing Clauses

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

Overview of Key E.U. and U.S. Privacy and Cybersecurity Laws. Brett Lockwood Smith, Gambrell & Russell, LLP May 15, 2018

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

DATA PROCESSING TERMS

Data Sheet The PCI DSS

Manchester Metropolitan University Information Security Strategy

CAN MICROSOFT HELP MEET THE GDPR

A company built on security

GDPR is here to stay. How prepared are you?

IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE

Protecting your data. EY s approach to data privacy and information security

General Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN!

01.0 Policy Responsibilities and Oversight

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

CIPP/G (Certified Information Privacy Professional US Government)

NIS, GDPR and Cyber Security: Convergence of Cyber Security and Compliance Risk

EU General Data Protection Regulation (GDPR) A Point of View for Technology Sector Organisations. For private circulation only.

Privacy by Design and the GDPR

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Layer Security White Paper

Security and Privacy Governance Program Guidelines

GDPR: Is it just another regulation or a great opportunity for operational excellence? Athens, February 2018

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere

What You Need to Know About Addressing GDPR Data Subject Rights in Pivot

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

PS Mailing Services Ltd Data Protection Policy May 2018

SECURITY & PRIVACY DOCUMENTATION

Embedding GDPR into the SDLC

GDPR Impacts. SEV GDPR Workshop Athens Giles Watkins, UK Country Leader. Wednesday 7th February,

Getting ready for GDPR

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Unified Communications Phase 2 Presentation to IT Services Users Group

General Data Protection Regulation (GDPR)

European Union Agency for Network and Information Security

Charting the Course to GDPR: Setting Sail

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Meeting GDPR Requirements with GoAnywhere MFT

Securing Your Digital Transformation

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Data Protection Policy

Islam21c.com Data Protection and Privacy Policy

Transcription:

EU General Data Protection Regulation (GDPR) Achieving compliance

GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states, with the official date for enforcement set for 25 May 2018. This reform has significant implications for business, not only for those based in the EU, but for all organizations operating within the EU market. The new EU reform regulation aims to: Reinforce the rights of the individual privacy by design and by default Strengthen the EU internal market through new, clear, and robust rules for the free movement of data Ensure consistent enforcement of these rules Set global data protection standards Safeguard a golden standard for data protection across all industries

GDPR - Key information 1. Introduction of significant fines Tier One: Up to 10 million or up to 2% of annual worldwide turnover of the parent company, the higher amount Tier Two: Up to 20 million or up to 4% of annual worldwide turnover of the parent company, the higher amount 2. The right to erasure When an individual no longer wishes for their data to be processed and there are no legitimate grounds for retaining it, the data must be deleted. The onus will now be on data controllers to prove that they need to keep the data, not on the data subject (the individual). 3. The concept of consent has been revised to ensure transparency Data subjects must be fully and specifically informed at the point of collection on all purposes for which data is used. Data subjects may now also remove their consent at any time, and for any reason. 4. Mandatory notification of a data breach Organizations will now be required to report a data breach to their Supervisory Authority and to affected data subjects, within 72 hours of becoming aware of the breach 5. Portability of data The regulations propose the right that data subjects will be able to transfer their personal data in a commonly-used electronic format from one data controller to another without hindrance from the original controller 6. Privacy by design This is one of the fundamental ideas of the new regulation and one that aims to change the overall attitude and organizational planning towards Data Protection. Article 23 stipulates that Data Protection should be designed into the development of business processes 7. Appointment of a Data Protection Officer (DPO) Organizations will now be required to appoint a DPO. The DPO must be independent and will report to the regulator and not the board of directors Achieving EU GDPR compliance We have a range of services that can help you work towards GDPR compliance and continue to improve over time. Did you know? BSI now have a standard (BS 10012) helping organizations demonstrate effective management of personal information, covering GDPR requirements. For more information visit bsigroup.com Understanding Implementation Improvement 1 Board and executive level awareness workshops 2 Data asset workflow and mapping 3 Gap analysis 4 Legal and regulatory requirements assessments 5 Data protection risk assessments 6 Training and awareness for staff 1 Outsourced Data Protection Officer (DPO) services 2 Privacy compliance framework development 3 Data protection and privacy implementation support 4 Privacy by design support - privacy impact assessments (PIAs) and change management support 5 Support services to implement, operate, and improve safe and secure principles such as: Penetration testing Encryption usage review Incident management and breach support Security controls Subject access requests including ediscovery services 1 Data Protection partner programme service for ad hoc assistance 2 Compliance expertise reviews 3 Compliance and assurance assessments Privacy compliance audits Internal audits Independent third party audits Preparation for supervisory authority audits Attendance during supervisory authority audits External audits for data transfers outside EU Certifications e.g. PCI-DSS GDPR compliance No matter where you are in meeting GDPR requirements, we can enable you achieve compliance at each stage of the journey

Data protection training courses We provide a range of training courses in privacy and data protection. They focus on giving you the knowledge and skills to confidently build and manage data protection and privacy for your organization. Certified EU General Data Protection Regulation (GDPR) foundation One day course In this one day course, our expert tutor will explain the requirements of the General Data Protection Regulation (GDPR), to help you understand how it could apply to your organization and the benefits of adopting it. This is a foundation, non-technical course for both technical and general management interested in learning about GDPR and compliance around the new regulation How does EU GDPR foundation course help: You will gain knowledge on how to adhere to the new regulation and kick-start compliance with a variety of activities, such as personal data scoping exercise and gap analysis, a privacy impact and risk assessment, or a full data protection audit. Manager (CIPM) The CIPM certification is the "how-to" in privacy operations. A CIPM is able to structure an organizations privacy team effectively. It equips you with the ability to develop, implement, and measure a privacy program framework while utilizing the privacy operational lifecycle: access, protect, sustain, and respond. How does CIPM help with GDPR requirements: A CIPP/E combined with a CIPM means that you are uniquely equipped to fulfill the requirements of a Data Protection Officer. Professional/Europe (CIPP/E) The CIPP/E covers the fundamental pan European and national data protection laws. It is the most recognized credential of its kind in the data protection and privacy field. The course examines industry best practices in privacy compliance concepts of data protection and trans-border data flows. The CIPP/E covers critical topics like the EU-U.S. Privacy Shield and the GDPR. How does CIPP/E help with GDPR requirements: Achieving the CIPP/E demonstrates you have the comprehensive GDPR knowledge and understanding to ensure compliance and data protection success. Technologist (CIPT) CIPT certifies delegates in the knowledge of privacy and data protection related issues, in the context of design and implementation of information and communication technologies. It looks at the privacy considerations for IT systems and applications. It examines industry standard guidelines for the collection, use, retention, and destruction of data. CIPT provides a solid foundational level in data protection and privacy laws, concepts and regulations, while giving delegates the knowledge to create the information privacy infrastructure. How does CIPT help with GDPR requirements: CIPT will enable you to build your organization s privacy and data protection infrastructure, ensuring privacy by design a key GDPR value.

Cybersecurity and Information Resilience services Our Cybersecurity and Information Resilience services enable organizations to secure information from cyber-threats, strengthening their information governance and in turn assuring resilience, mitigating risk whilst safeguarding them against vulnerabilities in their critical infrastructure. We can help organizations solve their information challenges through a combination of: Consulting Cybersecurity and information resilience strategy, security testing, and specialist support Research Commercial research and horizon scanning projects Training Specialist training to support personal development Technical solutions Managed cloud solutions to support your organization Our expertise is supported by: Find out more Call: +44 345 222 1711 Email: cyber@bsigroup.com Visit: bsigroup.com BSI Group BSI/UK/1047/CIR/0317/EN/BLD