The document discusses preparations for the General Data Protection Regulation (GDPR) which takes effect in May 2018. It provides an overview of key GDPR requirements such as conducting privacy impact assessments, obtaining explicit consent, data breach notification, and appointing a Data Protection Officer. The presentation recommends organizations undertake a data discovery and gap analysis to assess compliance needs. Penalties for non-compliance under GDPR are also highlighted.
Even though GDPR is a European Union regulation, it impacts any company with customers in that region. One of the first key tasks of the data management team should be to create awareness regarding the impact of GDPR on the business with all key stakeholders across the organization. In order to generate awareness, organizations need to have clearly defined documentation defining the policies, rules, requirements and the impact of non-compliance. Kim Brushaber will look at what is involved with GDPR, what you should be concerned with, and how to get the conversation started between the business and technical teams within your organization using ER/Studio.
In May 2018, the European Union’s General Data Protection Regulation (GDPR) will take effect. Companies that do not comply might be fined 20M or 4% of the annual global turnover whichever is greater. Despite the evident threat, GDPR is also a huge opportunity to rethink how your business works and to turn that threat into an opportunity. GRAKN.AI – a knowledge base – provides all you need to turn the centralized record of users that GDPR is asking companies to create and use it to provide value to your users. Adding them to the knowledge base as well as your content or product opens many new perspectives.
Norfolk Chamber delivered a morning conference based around the European General Data Protection Regulation (GDPR), which will come into force on May 25 2018. Delegates heared from a variety of GDPR expert speakers from legal, marketing, IT and Data Protection perspectives.
The document provides an overview of an upcoming presentation on the General Data Protection Regulation (GDPR). It begins with introductions and disclaimers from the presenter and VMware. It then outlines the areas that will be covered in the 30 minute presentation, including timeframes for GDPR compliance, key changes from the previous Data Protection Directive, myths about GDPR requirements, potential fines, and VMware products that can help with GDPR compliance.
The document provides an overview and agenda for a conference on achieving compliance with the General Data Protection Regulation (GDPR). It discusses key aspects of GDPR compliance including identifying personal data, data subject rights, security requirements, international data transfers, and remedies for non-compliance. Various vendors also present on how their products can help organizations meet GDPR requirements through features such as digital consent management and customizable reporting on personal data. An example case study highlights how one company used DocuSign to address challenges around manual processes, GDPR readiness, and security of personal information.
This document provides an overview of the General Data Protection Regulation (GDPR). It discusses what personal data is, the rights to privacy and data protection under the GDPR and European law. It explains that the GDPR applies broadly to any company that processes personal data of EU residents, regardless of location. Companies have obligations around obtaining permission for data processing, providing transparency around data usage, implementing security measures, and designating a data protection officer if required. The GDPR aims to better protect privacy and give individuals more control over their personal data.
GDPR: Is Your Organization Ready for the General Data Protection Regulation?DATUM LLC
The new European GDPR privacy regulations will significantly impact data governance for multinational companies worldwide. This presentation introduces GDPR, its implications, and a six step process for compliance. In May of 2018 the European Union’s General Data Protection Regulation (GDPR) will go into effect and the fines associated with non-compliance are significant with as much as 4% of global sales.
The General Data Protection Regulation (GDPR) comes into force on 25 May 2018. GDPR is a hugely important piece of legislation designed to replace antiquated data protection rules with a new framework which accounts for recent technological advancements.
Fundamentally, GDPR is about protecting people: in this digital age, our world is awash with data and individuals are generating a continuous flow of personal information. This data can hold huge socio-economic value, from individual preference and personalisation, to understanding national health trends and global business insights. But while the digital age has brought forth huge possibilities and benefits, it also carries inherent dangers.
Some of the most powerful companies in the world have established a business model predicated on the basis of data capture. Increasingly, services like email, search and social media have become available free of charge, but this often involves a trade-off where user access comes at the cost of relinquishing control of data. As the value of this information has become clear, there has been growing recognition that a new framework is needed to police this delicate balance and restore ownership and control.
GDPR will significantly raise the bar of obligation and accountability, ensuring that all organisations which handle personal data adhere to strict regulations around privacy, security and consent. This conference will contextualise the changing regulatory landscape, explain the significance of incoming rules, and define the key areas that organisations need to be aware of.
Core conference topics include:
Key legal issues and obligations
Privacy Impact Assessments
Data security and breach notification
Privacy by design
DPO requirements
Practical strategy implementation
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
The General Data Protection Regulation is the biggest change to the law on data in years. This webinar features Vicky Brown, Deputy General Counsel at WPP, and Paul King, Head of Data at OgilvyOne discussing what it is, why it matters and what companies are doing.
GDPR From the Trenches - Real-world examples of how companies are approaching...Ardoq
As GDPR enforcement approaches, companies around the world are making changes to their internal processes and systems to ensure they are compliant by May 2018. For many, getting started can be a daunting task, especially at larger organizations.
There’s no one-size-fits-all strategy for GDPR compliance, but there are some steps that every business should take:
1. Document the data and processes that power your organization
2. Assess the realistic compliance risks that you need to protect against
3. Keep your documentation up-to-date to demonstrate continuous compliance.
In this slide deck, you’ll read about a real-world example of a company that has started their compliance project and how they structured it.
A recording of this webinar is available for free here: http://bit.ly/2hMsQmu
This document discusses the European Union's General Data Protection Regulation (GDPR) and how the log analysis software Splunk can help organizations comply with GDPR requirements. The GDPR aims to strengthen data protection for all EU citizens and applies to any company processing personal data of EU residents. It introduces fines of up to 4% of annual global turnover for violations. Splunk allows organizations to detect, prevent and investigate data breaches, search and report on personal data processing activities to comply with GDPR provisions, and prove that appropriate technical and organizational security measures are in place.
Do You Have a Roadmap for EU GDPR Compliance?Ulf Mattsson
The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?Join this webinar to learn:
• Case study and legal/regulatory impact to GDPR• Security Metrics• Oversight of third parties• How to measure cybersecurity preparedness
Presenters : Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh
Date & Time : Aug 17 2017 5:00 pm
Timezone : United States - New York
The document discusses key aspects of preparing for and complying with the EU General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018. It outlines some of the major changes and requirements introduced by the GDPR, including its expanded territorial reach, new obligations for data processors, strengthened consent requirements, increased penalties for non-compliance, and the role of supervisory authorities. The document emphasizes that organizations must conduct assessments, secure resources and budgets, and implement technologies and processes to ensure they have a defensible position and are prepared to address the challenges and opportunities created by the GDPR.
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
Ensuring GDPR Compliance - A Zymplify GuideZymplify
The GDPR will come into force on 25 May 2018 and will change data protection laws across the EU. Organisations can face heavy fines if they are found to be in breach of the GDPR, so take a look at Zymplify's guide to the most important parts of the regulation. Act now to get ready for the GDPR. Book a Demo with Zymplify - http://d36.co/12vWD
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
In May of 2018 the European Union’s General Data Protection Regulation (GDPR) will go into effect and organizations seeking to be ready by the deadline will need to move quickly. There are a multitude of considerations: policies, marketing programs, systems, operations and the overall information architecture. This session provides a primer on GDPR, the required data management capabilities, and how governance will need to evolve for compliance.
This document is a presentation on GDPR given at the University of Dundee. It provides an overview of key GDPR concepts such as personal data, processing, lawful bases for processing including consent, and the principles of accountability. It discusses how GDPR compliance applies even when personal data from EU citizens is processed outside the EU. Examples are given of how services like Padlet, Peerwise and Teammates can be used in education in a GDPR-compliant way. The presentation emphasizes obtaining consent, anonymizing or obscuring personal data, and having alternatives for students who do not wish to provide personal data.
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
This document provides an overview of the General Data Protection Regulation (GDPR) and how Windows 10 can help organizations comply with it. It begins with background on the GDPR, including its key implications like enhanced privacy rights for EU citizens and mandatory breach reporting. It defines personal and sensitive data under the GDPR. The document then outlines the key steps for an organization's GDPR compliance journey and describes various security and privacy capabilities in Windows 10 that can help with compliance, such as threat protection, identity protection, and information protection features. It concludes by providing Windows 10 resources to help organizations meet GDPR requirements.
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
The document provides an overview of the General Data Protection Regulation (GDPR) and its impact on digital advertising. It discusses GDPR's aim to give individuals more control over their personal data and create a single set of privacy rules across the EU. The GDPR will increase obligations for companies, including strengthened consent requirements, data subject rights, and accountability measures. It will also allow for fines of up to 20 million euros or 4% of global revenue. The document also summarizes Ghostery's privacy tools and an industry initiative to enhance ad transparency and user control in compliance with the GDPR.
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq
How do you build and sustain organisational resilience?
Beyond the cyber threats, data breaches, risks and compliance, where are the opportunities for digital transformation and innovation in a post GDPR world?
More info:
https://content.ardoq.com/ardoq-events-join_us
Event created together with Sympatico Consulting:
https://www.sympaticoconsulting.co.uk/
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
With a fine of up to 4% of an organisation’s annual turnover on the line, Individuals accountable and responsible for data protection are actively seeking clarification and advice regarding the impending changes to the EU General Data Protection Regulation.
The question now? How prepared are you to meet the EU General Data Protection Regulation?
IRM’s resident Data Protection expert Paul Sexby, addresses the areas that need to be considered in order to prepare for the new requirements.
We now have to obey the law and comply with GDPR, ensuring people's data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there's still a long way to go.
In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced "privacy by design" as just another "by design" mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.
This document summarizes a presentation on getting to grips with the General Data Protection Regulation (GDPR). It discusses the challenges organizations face in complying with GDPR, which takes effect in May 2018. The presentation provides tips on where to get help with GDPR compliance, how to conduct an audit of personal data holdings, and the top 10 actions organizations should take now to prepare, such as forming an implementation task force and reviewing privacy policies and consent procedures. It emphasizes that May 25, 2018 marks the beginning of GDPR compliance obligations.
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
Data has emerged as one of the most important resources of today's world. However, there does not exist clear rules on how to make use of this resource. There are spillover effects and negative externalities in the form of privacy breaches while exploiting this resource. In such a situation, what should be the legal remedy?
The law should find a balance between the interests of the customers and the corporations. The customers want safety and privacy, whereas corporations want commercial use of data which risks the customer's interests.
This document discusses key terms and requirements of the GDPR, provides an example of TalkTalk being fined for a data breach, and outlines the three main causes of data breaches and next steps for compliance. It discusses how existing processes, staff, and cybersecurity need to be addressed to comply with GDPR requirements for handling personal data. Specific actions mentioned include performing a data audit and mapping, implementing documentation and policies, and securing data through appropriate technical measures.
Nadia Kosak Astrid
Siteimprove
Partner Manager
The deadline for GDPR compliance is May 25, 2018. Are you an eZ Platform editor? Are you ready for GDPR? Learn how to use the Siteimprove plugin for eZ Platform to support your GDPR compliance process.
The General Data Protection Regulation (GDPR) comes into force on 25 May 2018. GDPR is a hugely important piece of legislation designed to replace antiquated data protection rules with a new framework which accounts for recent technological advancements.
Fundamentally, GDPR is about protecting people: in this digital age, our world is awash with data and individuals are generating a continuous flow of personal information. This data can hold huge socio-economic value, from individual preference and personalisation, to understanding national health trends and global business insights. But while the digital age has brought forth huge possibilities and benefits, it also carries inherent dangers.
Some of the most powerful companies in the world have established a business model predicated on the basis of data capture. Increasingly, services like email, search and social media have become available free of charge, but this often involves a trade-off where user access comes at the cost of relinquishing control of data. As the value of this information has become clear, there has been growing recognition that a new framework is needed to police this delicate balance and restore ownership and control.
GDPR will significantly raise the bar of obligation and accountability, ensuring that all organisations which handle personal data adhere to strict regulations around privacy, security and consent. This conference will contextualise the changing regulatory landscape, explain the significance of incoming rules, and define the key areas that organisations need to be aware of.
Core conference topics include:
Key legal issues and obligations
Privacy Impact Assessments
Data security and breach notification
Privacy by design
DPO requirements
Practical strategy implementation
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
The General Data Protection Regulation is the biggest change to the law on data in years. This webinar features Vicky Brown, Deputy General Counsel at WPP, and Paul King, Head of Data at OgilvyOne discussing what it is, why it matters and what companies are doing.
GDPR From the Trenches - Real-world examples of how companies are approaching...Ardoq
As GDPR enforcement approaches, companies around the world are making changes to their internal processes and systems to ensure they are compliant by May 2018. For many, getting started can be a daunting task, especially at larger organizations.
There’s no one-size-fits-all strategy for GDPR compliance, but there are some steps that every business should take:
1. Document the data and processes that power your organization
2. Assess the realistic compliance risks that you need to protect against
3. Keep your documentation up-to-date to demonstrate continuous compliance.
In this slide deck, you’ll read about a real-world example of a company that has started their compliance project and how they structured it.
A recording of this webinar is available for free here: http://bit.ly/2hMsQmu
This document discusses the European Union's General Data Protection Regulation (GDPR) and how the log analysis software Splunk can help organizations comply with GDPR requirements. The GDPR aims to strengthen data protection for all EU citizens and applies to any company processing personal data of EU residents. It introduces fines of up to 4% of annual global turnover for violations. Splunk allows organizations to detect, prevent and investigate data breaches, search and report on personal data processing activities to comply with GDPR provisions, and prove that appropriate technical and organizational security measures are in place.
Do You Have a Roadmap for EU GDPR Compliance?Ulf Mattsson
The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?Join this webinar to learn:
• Case study and legal/regulatory impact to GDPR• Security Metrics• Oversight of third parties• How to measure cybersecurity preparedness
Presenters : Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh
Date & Time : Aug 17 2017 5:00 pm
Timezone : United States - New York
The document discusses key aspects of preparing for and complying with the EU General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018. It outlines some of the major changes and requirements introduced by the GDPR, including its expanded territorial reach, new obligations for data processors, strengthened consent requirements, increased penalties for non-compliance, and the role of supervisory authorities. The document emphasizes that organizations must conduct assessments, secure resources and budgets, and implement technologies and processes to ensure they have a defensible position and are prepared to address the challenges and opportunities created by the GDPR.
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
Ensuring GDPR Compliance - A Zymplify GuideZymplify
The GDPR will come into force on 25 May 2018 and will change data protection laws across the EU. Organisations can face heavy fines if they are found to be in breach of the GDPR, so take a look at Zymplify's guide to the most important parts of the regulation. Act now to get ready for the GDPR. Book a Demo with Zymplify - http://d36.co/12vWD
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
In May of 2018 the European Union’s General Data Protection Regulation (GDPR) will go into effect and organizations seeking to be ready by the deadline will need to move quickly. There are a multitude of considerations: policies, marketing programs, systems, operations and the overall information architecture. This session provides a primer on GDPR, the required data management capabilities, and how governance will need to evolve for compliance.
This document is a presentation on GDPR given at the University of Dundee. It provides an overview of key GDPR concepts such as personal data, processing, lawful bases for processing including consent, and the principles of accountability. It discusses how GDPR compliance applies even when personal data from EU citizens is processed outside the EU. Examples are given of how services like Padlet, Peerwise and Teammates can be used in education in a GDPR-compliant way. The presentation emphasizes obtaining consent, anonymizing or obscuring personal data, and having alternatives for students who do not wish to provide personal data.
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
This document provides an overview of the General Data Protection Regulation (GDPR) and how Windows 10 can help organizations comply with it. It begins with background on the GDPR, including its key implications like enhanced privacy rights for EU citizens and mandatory breach reporting. It defines personal and sensitive data under the GDPR. The document then outlines the key steps for an organization's GDPR compliance journey and describes various security and privacy capabilities in Windows 10 that can help with compliance, such as threat protection, identity protection, and information protection features. It concludes by providing Windows 10 resources to help organizations meet GDPR requirements.
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
The document provides an overview of the General Data Protection Regulation (GDPR) and its impact on digital advertising. It discusses GDPR's aim to give individuals more control over their personal data and create a single set of privacy rules across the EU. The GDPR will increase obligations for companies, including strengthened consent requirements, data subject rights, and accountability measures. It will also allow for fines of up to 20 million euros or 4% of global revenue. The document also summarizes Ghostery's privacy tools and an industry initiative to enhance ad transparency and user control in compliance with the GDPR.
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq
How do you build and sustain organisational resilience?
Beyond the cyber threats, data breaches, risks and compliance, where are the opportunities for digital transformation and innovation in a post GDPR world?
More info:
https://content.ardoq.com/ardoq-events-join_us
Event created together with Sympatico Consulting:
https://www.sympaticoconsulting.co.uk/
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
With a fine of up to 4% of an organisation’s annual turnover on the line, Individuals accountable and responsible for data protection are actively seeking clarification and advice regarding the impending changes to the EU General Data Protection Regulation.
The question now? How prepared are you to meet the EU General Data Protection Regulation?
IRM’s resident Data Protection expert Paul Sexby, addresses the areas that need to be considered in order to prepare for the new requirements.
We now have to obey the law and comply with GDPR, ensuring people's data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there's still a long way to go.
In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced "privacy by design" as just another "by design" mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.
This document summarizes a presentation on getting to grips with the General Data Protection Regulation (GDPR). It discusses the challenges organizations face in complying with GDPR, which takes effect in May 2018. The presentation provides tips on where to get help with GDPR compliance, how to conduct an audit of personal data holdings, and the top 10 actions organizations should take now to prepare, such as forming an implementation task force and reviewing privacy policies and consent procedures. It emphasizes that May 25, 2018 marks the beginning of GDPR compliance obligations.
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
Data has emerged as one of the most important resources of today's world. However, there does not exist clear rules on how to make use of this resource. There are spillover effects and negative externalities in the form of privacy breaches while exploiting this resource. In such a situation, what should be the legal remedy?
The law should find a balance between the interests of the customers and the corporations. The customers want safety and privacy, whereas corporations want commercial use of data which risks the customer's interests.
This document discusses key terms and requirements of the GDPR, provides an example of TalkTalk being fined for a data breach, and outlines the three main causes of data breaches and next steps for compliance. It discusses how existing processes, staff, and cybersecurity need to be addressed to comply with GDPR requirements for handling personal data. Specific actions mentioned include performing a data audit and mapping, implementing documentation and policies, and securing data through appropriate technical measures.
Nadia Kosak Astrid
Siteimprove
Partner Manager
The deadline for GDPR compliance is May 25, 2018. Are you an eZ Platform editor? Are you ready for GDPR? Learn how to use the Siteimprove plugin for eZ Platform to support your GDPR compliance process.
Using GDPR to Transform Customer ExperienceMongoDB
Infosys and MongoDB – A strategic relationship
What is GDPR?
Overview of GDPR – Infosys PoV [Key Focus Areas, Own Journey]
Infosys Solution Framework to GDPR
What Organizations are doing to be GDPR Ready and Infosys’ Relevant experience
Cloud data security and GDPR complianceSalim Benadel
Slides from the joint webinar session by Salim Benadel of Storm Internet & Mark Gracey of Digital Compliance Hub on how the right data storage provider solves your business’s GDPR security and breach compliance problems.
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
This document discusses the General Data Protection Regulation (GDPR) and what North American companies need to know about complying with it. It provides an overview of the GDPR, its impact on companies outside the EU, and who is responsible for protecting personal data under the regulation. It also discusses technology considerations for GDPR compliance, such as knowing where personal data is located, having the right security controls, and being able to detect and respond to breaches. The document concludes by offering advice on how companies can get started with GDPR compliance efforts by focusing first on their data and putting security basics in place.
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
Learn what the EU Global Data Protection Regulation means for your business – Carrot or Stick its your choice but with fines of €20m or up to 4% of Global Revenue (whichever is the larger) being applied for every data breach and every data mis-use after May 2018 the carrot is the better option.
Are you aware? Are you prepared? Do you comply?
To book a free non sales consultation about GDPR with Ian West contact us [email protected]
DevOps vs GDPR: How to Comply and Stay AgileBen Saunders
A joint webinar between Contino and Delphix explaining how DevOps, Cloud and Data Virtualization can be used to accelerate application delivery, yet still allow organisations to remain GDPR compliant.
Superfast Business - What are businesses looking for from suppliers?Superfast Business
Superfast Business Supplier Network Launch - Peninsula Enterprise launched the Superfast Business service in Devon and Somerset May 2013. As part of this service we are building a database of IT suppliers in the South West region. This presentation is for suppliers who attended either of the network launch events in April. The presentation was given by Cosmic’s Business and Operations Director, Kate Doodson and gives an insight into the future of IT and use of digital technology inside businesses and what they are looking for from their IT suppliers.
This document summarizes a presentation about the EU's General Data Protection Regulation (GDPR) given 58 days before the May 25, 2018 enforcement date. The presentation covers the GDPR landscape and compliance requirements, how to start a compliance project, and key risks to mitigate before the deadline. It emphasizes that GDPR compliance requires a cultural change and demonstrates protection of the six data processing principles and eight data subject rights. The presenter urges starting compliance assessments and plans immediately given the extensive work required to be fully prepared by the deadline.
The EU’s GDPR is the first major overall of data privacy requirements in the EU since the 1990s and is effective May 25, 2018. The GDPR is more than a regulation; it is a way of integrating data privacy and information security into day-to-day operations. This session will use case studies to bring alive the key issues to be addressed and best practices to address them whether in the EU or not.
Learning Objectives:
1: Understand that the GDPR contains significant food for thought.
2: Learn how organizations can build on previous compliance and policy efforts.
3: Understand why doing business in Europe post-GPDR requires planning and privacy initiatives.
(Source: RSA Conference USA 2018)
Date: 15th November 2017
Location: AI Lab Theatre
Time: 16:30 - 17:00
Speaker: Elisabeth Olafsdottir / Santiago Castro
Organisation: Microsoft / Keyrus
Investment Director Anders Bach Waagstein's slides from PreSeed Academy StartupTalk #26: Startup Practices for Privacy and Compliance. (2 of 3 speakers).
The document discusses the General Data Protection Regulation (GDPR) which represents the biggest change to data privacy laws. It outlines key changes including expanded definitions of personal data, strengthened consent requirements, data portability, accountability, and individual rights such as the right to access personal data. The document recommends that organizations create a GDPR program that includes governance, reviewing business processes, skills and awareness training, data inventory and classification, and security controls to achieve compliance. It describes an approach involving discovery of current data practices, remediation of any issues, and ensuring ongoing sustainability of GDPR compliance over time.
The document discusses preparing organizations for compliance with the EU General Data Protection Regulation (GDPR). It provides an overview of key GDPR requirements, such as obtaining consent for personal data use, implementing privacy by design, and responding to data breaches. The document recommends developing a GDPR action plan that includes conducting privacy impact assessments and audits. Overall, the summary emphasizes the need for organizations to understand how they use personal data and ensure they can meet GDPR requirements for data protection.
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
The document summarizes a presentation about maintaining security and compliance with the General Data Protection Regulation (GDPR) in the cloud. It discusses key aspects of the GDPR, challenges of GDPR compliance in the cloud, and how Symantec products like Data Loss Prevention, Cloud Access Security Broker, and Information Centric Security solutions can help organizations address those challenges by providing visibility, protection and control of personal data across on-premise and cloud environments. Representatives from Symantec and Deloitte then took questions from the audience.
This webinar discusses preparing for the EU's General Data Protection Regulation (GDPR) which takes effect in May 2018. It introduces GDPR and its global implications. The presenters are experts from IBM who discuss key GDPR requirements around technical and architectural preparedness. They address requirements around data subject rights, security, consent, accountability and other areas. Organizations are advised to conduct risk assessments, data discovery, and plan how to address GDPR requirements as there are significant fines for noncompliance.
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
Speakers: Paige Bartley, Senior Analyst, Data and Enterprise Intelligence, Ovum + Cameron Tovey, Head of Information Security, Confluent
For many organizations that want to adopt streaming data, strengthening their governance protocol is a key requirement. While this certainly poses a challenge for data protection regulations and standards, it also limits the potential of data in broader enterprise initiatives that look to maximize the value of information.
There’s a prevailing enterprise perception that compliance with data protection regulations and standards, such as General Data Protection Regulation (GDPR) in the EU, Payment Card Industry (PCI), International Standards Organization (ISO) and many others is a burden: limiting the leverage of data. However, the core requirement of compliance—better control of data—has multiple downstream benefits. When compliance objectives are aligned with existing business objectives, the business can experience net gain.
For many organizations that want to adopt streaming data, strengthening their governance protocol is a key requirement. While this certainly poses a challenge for data protection regulations and standards, it also limits the potential of data in broader enterprise initiatives that look to maximize the value of information.
Learning objectives:
-Understand how data compliance can be a facilitator of existing business objectives rather than a burden
-Find out how to align existing business initiatives with compliance initiatives for maximum business benefit
-Learn about the place of streaming data and data-in-motion in the compliance effort
-Identify governance and tooling needs, existing controls and how they apply to new and emerging technology
-Discover your options for improving governance
The survey conducted by Tsaaro Academy aimed to understand the privacy job market and privacy as a career choice. Key findings include:
- 96% of privacy professionals had less than 3 years of experience, indicating a growing field.
- 90% felt that privacy job opportunities would grow exponentially.
- 73% of professionals who obtained privacy certifications experienced promotions and salary increases.
- Common certifications held were IAPP and in-house certificates, with an average post-certification pay hike of 15-23%.
- Respondents were satisfied with their privacy roles, giving an average 7.44/10 rating.
- The majority earned between 6-18 LPA, with 33% under 6 LPA
n this webinar, GDPR expert, Richard Hogg, answers the following questions:
What will the GDPR mean for my organization?
Where do I start on the journey to compliance?
What tools and technology are available to help?
Attendees: Operations, Finance, Compliance, Governance, IT
https://www.integro.com/recorded-webinar/nov-17-2016-gdpr
The Secure Business in the Digital Age - 27th September 2017Exponential_e
The document outlines an agenda for a security event hosted by Exponential-e focused on digital security in the digital age. The agenda includes welcome remarks and presentations on digital transformation, Exponential-e's security developments, and ransomware protection. It also provides background on Exponential-e's 14 years of innovation and strategic focus on cloud, security, and enabling digital transformation for customers.
Becoming your customer's security partner in the digital ageExponential_e
This document outlines an agenda for a seminar on becoming a security partner in the digital age. The agenda includes presentations on digital transformation, introducing the Exponential-e security portfolio, and creating value and advocacy with customers. There will also be a presentation from SentinelOne on ransomware protection and a networking lunch.
Unified Communications
The integration of real-time communication services such as instant messaging, presence information, telephony, video conferencing, desktop sharing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging.
Unified Communications - Collaborative services that deliver greater busines...Exponential_e
Unified Communications - Collaborative services that deliver greater business efficiency
Built on Exponential-e’s fully resilient platform, our UCC offering includes presence, IM, voice, video and collaboration tools - and we believe reflects the next generation in telephony communications.
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
Can we spend less on IT, work less, but accomplish more?
Join us at The Ritz to discover how Exponential-e’s innovative hybrid services combine the best of traditional IT competencies, with world leading connectivity, Cloud and communication services - and make the impossible, possible.
Our CEO, Lee Wade, will be amongst a selection of key speakers, who will share their views on how innovations in Cloud services can be combined with advanced networking technology and service provider experience to deliver the real benefits businesses have been seeking.
We'll seek to explain how you can spend less on IT, work less and still accomplish more. We'll demonstrate why your Cloud is only as good as your network, and how you can transition to the Cloud efficiently and securely.
Seems too good to be true? Come and see for yourself.
View our Cloud video and more on YouTube: https://www.youtube.com/user/Exponentialltd
This document discusses EMC and its business focus on enabling customer's business agility through cloud services. It highlights EMC's global presence with over 53,500 employees in 85 countries. It then discusses EMC's partnership with Exponential-e to provide cooperative cloud services including infrastructure assessments, migration services, and ongoing performance management for customers' virtual and physical environments. The document emphasizes that the right IT services can create efficiency while allowing customers to retain control, trust and security over their environments and data.
Private Clouds - Business Agility SeminarExponential_e
This document discusses Exponential-e's private cloud offering. It provides customers flexibility to use a private cloud for core applications, public cloud for non-critical workloads, and a secondary private cloud for business continuity. The private cloud is built on Exponential-e's carrier-grade network and enterprise-class hardware with a choice of orchestration layers. It offers billing simplicity, consumption-based or fixed pricing, and robust reporting and forecasting tools. The private cloud allows for extended VLAN configurations to integrate customer environments for scenarios like iSCSI storage, flexible compute resources, and server replication without DNS changes.
The mobile workforce – A real IT challengeExponential_e
This session will consider what the next generation
carrier networks are and now they can help housing
associations including:
- How to enable a mobile workforce in multisite organisations
- What the top five problems to be solved are when enabling mobility
- Maintaining security
- Maintaining simplicity and ease of management
- Scaling the solution
- Enabling resilience
- Coping with change in the IT landscape.
Building the silver lining seminar slidesExponential_e
These slides explore report findings from a survey where 250 IT decision makers shared their views on the role of the network, data centre and downtime on their cloud strategies. The slides also examine how the UK’s underlying IT infrastructure is coping with the demands of the mature Cloud.
Cloud Aggregation: Smart Access to a Smarter CloudExponential_e
The noise in the market is all about placing data in the cloud – security,
compliance and risk. However, a good cloud strategy is underpinned with the network providing the access to cloud services and providers. How secure is the route to the cloud, is the infrastructure fit for purpose and is bandwidth scalable?
Convered Voice and Data (tIPicall and Exponential-e)Exponential_e
The document summarizes a meeting between representatives from Exponential-e, tIPicall, and Tata Communications to discuss converged voice and data services. Steve Harrington from tIPicall discusses how tIPicall has launched hosted and managed IP PBX, contact center, SIP trunking, and voice services. Alan Sawyer from Tata Communications then provides information about Tata Communications and its global network.
Cloud Connectivity and Amazon Direct ConnectExponential_e
This document summarizes a breakfast briefing on cloud connectivity and Amazon Direct Connect held on July 19th 2012. The agenda included introductions, a presentation on cloud computing and whether IT is right for businesses, a discussion of private cloud connectivity, an overview of Amazon Direct Connect, a cloud case study, and a Q&A session. Speakers included the Business Development Director at Exponential-e, a Partner from Moundsmere Management and Technology, the CTO of Exponential-e, and the Head of Cloud Operations at Exponential-e. The document provides background on one of the speakers and outlines some of the topics to be covered, such as whether IT adds value for businesses, how cloud computing differs from previous outs
Alaska Silver: Developing Critical Minerals & High-Grade Silver Resources
Alaska Silver is advancing a prolific 8-km mineral corridor hosting two significant deposits. Our flagship high-grade silver deposit at Waterpump Creek, which contains gallium (the U.S. #1 critical mineral), and the historic Illinois Creek mine anchor our 100% owned carbonate replacement system across an expansive, underexplored landscape.
Waterpump Creek: 75 Moz @ 980 g/t AgEq (Inferred), open for expansion north and south
Illinois Creek: 525 Koz AuEq - 373 Koz @ 1.3 g/t AuEq (Indicated), 152 Koz @ 1.44 g/t AuEq (Inferred)
2024 "Warm Springs" Discovery: First copper, gold, and Waterpump Creek-grade silver intercepts 0.8 miles from Illinois Creek
2025 Focus: Targeting additional high-grade silver discoveries at Waterpump Creek South and initiating studies on gallium recovery potential.
The Institute for Public Relations Behavioral Insights Research Center and Leger partnered on this 5th edition of the Disinformation in Society Report. We surveyed 2,000 U.S. adults to assess what sources they trust, how Americans perceive false or misleading information, who they hold responsible for spreading it, and what actions they believe are necessary to combat it.
Brandon Flatley masterfully blends creativity and community impact. As a mixologist and small business owner, he delivers unforgettable cocktail experiences. A musician at heart, he excels in composition and recording.
Alan Stalcup is the visionary leader and CEO of GVA Real Estate Investments. In 2015, Alan spearheaded the transformation of GVA into a dynamic real estate powerhouse. With a relentless commitment to community and investor value, he has grown the company from a modest 312 units to an impressive portfolio of over 29,500 units across nine states. He graduated from Washington University in St. Louis and has honed his knowledge and know-how for over 20 years.
Looking for Reliable BPO Project Providers?"anujascentbpo
"Looking for Reliable BPO Project Providers?" tailored for businesses potentially seeking outsourcing partners, especially those in or considering Noida and India.
Explore the growing trend of payroll outsourcing in the UK with key 2025 statistics, market insights, and benefits for accounting firms. This infographic highlights why more firms are turning to outsourced payroll services for UK businesses to boost compliance, cut costs, and streamline operations. Discover how QXAS can help your firm stay ahead.
for more details visit:- https://qxaccounting.com/uk/service/payroll-outsourcing/
**Title:** Accounting Basics – A Complete Visual Guide
**Author:** CA Suvidha Chaplot
**Description:**
Whether you're a beginner in business, a commerce student, or preparing for professional exams, understanding the language of business — **accounting** — is essential. This beautifully designed SlideShare simplifies key accounting concepts through **colorful infographics**, clear examples, and smart layouts.
From understanding **why accounting matters** to mastering **core principles, standards, types of accounts, and the accounting equation**, this guide covers everything in a visual-first format.
📘 **What’s Inside:**
* **Introduction to Accounting**: Definition, objectives, scope, and users
* **Accounting Concepts & Principles**: Business Entity, Accruals, Matching, Going Concern, and more
* **Types of Accounts**: Asset, Liability, Equity explained visually
* **The Accounting Equation**: Assets = Liabilities + Equity broken down with diagrams
* BONUS: Professionally designed cover for presentation or academic use
🎯 **Perfect for:**
* Students (Commerce, BBA, MBA, CA Foundation)
* Educators and Trainers
* UGC NET/Assistant Professor Aspirants
* Anyone building a strong foundation in accounting
👩🏫 **Designed & curated by:** CA Suvidha Chaplot
www.visualmedia.com digital markiting (1).pptxDavinder Singh
Visual media is a visual way of communicating meaning. This includes digital media such as social media and traditional media such as television. Visual media can encompass entertainment, advertising, art, performance art, crafts, information artifacts and messages between people.
The Fascinating World of Hats: A Brief History of Hatsnimrabilal030
Hats have been integral to human culture for centuries, serving various purposes from protection against the elements to fashion statements. This article delves into hats' history, types, and cultural significance, exploring how they have evolved and their role in contemporary society.
Top 5 Mistakes to Avoid When Writing a Job ApplicationRed Tape Busters
Applying for jobs can be tough, especially when you’re making common application mistakes. Learn how to avoid errors like sending generic applications, ignoring job descriptions, and poor formatting. Discover how to highlight your strengths and create a polished, tailored resume. Stand out to employers and increase your chances of landing an interview. Visit for more information: https://redtapebusters.com/job-application-writer-resume-writer-brisbane/
AI isn’t a replacement; it’s the tool that’s unlocking new possibilities for start-ups, making it easier to automate tasks, strengthen security, and uncover insights that move businesses forward. But technology alone isn’t enough.
Real growth happens when smart tools meet real Human Support. Our virtual assistants help you stay authentic, creative, and connected while AI handles the heavy lifting.
Want to explore how combining AI power and human brilliance can transform your business?
Visit our website and let’s get started!
🔗 Learn more here: BestVirtualSpecialist.com
Diagrams are key to architectural work, aligning teams and guiding business decisions. This session covers best practices for transforming text into clear flowcharts using standard components and professional styling. Learn to create, customize, and reuse high-quality diagrams with tools like Miro, Lucidchart, ... Join us for hands-on learning and elevate your diagramming skills!
The Mexico office furniture market size attained around USD 840.32 Million in 2024. The market is projected to grow at a CAGR of 3.60% between 2025 and 2034 and reach nearly USD 1196.86 Million by 2034.
2. AGENDA 11:30 - 12:00 Arrival & Registrations.
12:00 - 12:20 Welcome & Introduction to Exponential-e:
Lee Wade - CEO & Founder, Exponential-e.
12:20 - 13:00 Are you ready for GDPR?
Neil May - Director of Technology Risk Management, Newable.
13:00 - 13:15 Break.
13:15 - 13:45 GDPR: Gap Analysis & Remediation Plans:
Neil May - Director of Technology Risk Management, Newable.
13:45 - 14:15 GDPR and Data Security:
Jeff Finch - Head of Security Services, Exponential-e.
14:15 - 14:40 QA & Panel Discussion.
14:40 - 15:00 Lunch and Networking.
4. www.exponential-e.com
GDPR OVERVIEW
GDPR Overview
• GDPR is a long-overdue upgrade to the existing Data Protection Act 1998
• Fundamentally, businesses need to be more transparent about the personal data they hold; why they
captured it and what they intend to do with it
• The concept is simple: if I have given you my data, then I should be able to retrieve it or even transfer it to
someone else
• Companies who do not handle this data in line with the new rules could be faced with a hefty fine of up to 4%
of its global annual turnover, or €20,000,000, whichever is more . . .
• And that’s not all. Businesses that don’t comply risk legal action from the individuals whose personal data they
are using, since GDPR gives EU residents direct rights to obtain court orders and compensation
5. www.exponential-e.com
CONNECTIVITY
SERVICES
10GigE Business
Internet, SD-WAN,
Bandwith
Management,
Cloud Connect,
Superconnected Cities,
Software Defined
Networking
CLOUD SERVICES
Cloud for Enterprise,
Cloud-Network
solutions,
Desktop-as-a-Service,
DaaS GPU, Workplace
Recovery, IaaS (VDC),
Server Replication,
Online Backup,
Enhanced Analytics &
Big Data, Object &
HDFS Storage
VOICE & UNIFIED
COMMUNICATIONS
Hosted PBX, Smart
Audio Conferencing,
Inbound Call
Management, SIP
Trunking, Call
Recording.
DATA CENTRE
SERVICES
Enterprise-class
Colocation, Managed
Colocation, Shared
Colocation, Smart
Hands
SERVICE PORTFOLIO
MANAGED IT
& PROFESSIONAL
SERVICES
Professional Services,
Managed Services,
Digital Transformation,
AWS/Azure
Management,
Network Monitoring,
Windows Server 2003
SECURITY SERVICES
CyberSecurity & consultancy, PEN Testing, SSL VPN , Firewall design
7. www.exponential-e.com
GDPR OVERVIEW
GDPR Overview
This morning, we will cover off many questions about GDPR Compliance such as:
• Understanding the implications of GDPR
• Understanding the new obligations to achieve compliance.
• Preparing for GDPR: Discovery and Remediation plans
• What exactly is ‘explicit consent’?
• What are the implications for my data stored in my CRM system?
• What is the ‘right to be forgotten’ and what does this mean for my data?
• What does ‘pseudonymisation’ mean for all my encrypted data files?
• Will the auditors sign off my 2018 accounts if we are not GDPR compliant next year?
• Do we ALL now really need a Data Protection Officer?
8. www.exponential-e.com
GDPR OVERVIEW
GDPR Overview
• The General Data Protection Regulation (GDPR) is the European’s view on what the baseline expectations are
for processing personal information of EU citizens as we continue through the digital revolution
• The GDPR introduces a raft of onerous and complex requirements and regulations
• Importantly, for the first time we will have a single set of privacy rules across EU member states, and this
harmonization goes even further as the GDPR has cross-territorial implications
• It comes into force in the UK in May 25th, 2018 – And we all have a lot of work to do!
We have 317 days left to prepare for GDPR
10. www.exponential-e.com
GDPR OVERVIEW – SIMPLE GAME PLAN
2
DO AN
ASSESSMENT
Undertake a broad
Data Protection
Assessment of your
organisation
3
DO A GAP
ANALYSIS
Compliance: Where
you are vs Where you
need to be for GDPR
6
DECIDE IF
A DPO IS
REQUIRED
Become aware
and take action! 1
TAKE ACTION
Roll out training across
your organisation
Create a detailed Compliance
Roadmap with clear timelines
4
TRAIN YOUR
STAFF
5
CREATE A
ROADMAP
If you need to appoint a qualified
Data Protection Officer
12. www.exponential-e.com
GDPR – WHY NOW?
GDPR – Why Now?
The interdependence between data sharing and data privacy
• Companies know more about their customers than ever before. In the last 24 hours, your company probably
amassed more information about customers than was conceivable a decade ago
• As consumers, we benefit from this closeness. The fitness apps that tracks our steps, the messaging apps we
use to send pictures from the beach, or the telematics technology in our cars that lowers our insurance
premiums
• When we use our iPads and smart phones there is often an assumed understanding: we’ll give you our
data/information in exchange for that excellent service or product that makes our lives easier, richer and
sometimes cheaper. This is the trade-off at the heart of the digital economy
• But there are limits to this trade-off. People are increasingly aware that companies are collecting, using,
retaining and sharing their information - including buying and selling it! And they are growing uneasy . . .
13. www.exponential-e.com
GDPR OVERVIEW
THE DRIVE TOWARDS DATA PRIVACY
The interdependence between data sharing and data privacy
• But our willingness to share our personal information varies dramatically
according to gender, age, wealth, nationality and education . . .
• More than 50% are willing to share information about gender, ethnicity & education whilst
less than 20% are willing to share their income, location, medical records or address.
• Surveys reveal that 43% of people are uneasy about smart meters in their homes
• Many people in all countries are concerned about wi-fi data analytics and
web-browser spying
• In spite of our ‘uneasiness’ in the way corporates are utilizing our data, personal data is
the fuel of the digital future and the enabler of disruptive technologies
14. www.exponential-e.com
The interdependence between data sharing and data privacy
• Hence, GDPR marks a fundamental shift towards the view that PRIVACY must be at the
forefront of organizations’ minds when dealing with our personal data
• It is the most comprehensive attempt to define a coherent regulatory framework for privacy.
Governments around the world are sharpening their focus on the issue and introducing
legislation to offer greater protection to consumers — and far harsher penalties for
violations
• Hence, companies need to consider a new attitude to privacy—and they need to do it
quickly to minimize the risks to their balance sheet and their reputation
• GDPR CATAPULTS PRIVACY towards the top of organizations’ risk radars
GDPR OVERVIEW
THE DRIVE TOWARDS DATA PRIVACY
15. www.exponential-e.com
PREPARING FOR GDPR
ICO CHECKLIST SUMMARY
1. Awareness (Raising awareness throughout the organisation) 7. Explicit consent (Needs your urgent attention now)
You should review NOW how you seek, record and manage consent
and whether you need to make any changes.
2. Review the information you hold – (Data Discovery) 8. Children (Extra measures if you process child personal data)
3. Review the current privacy notices you send 9. Data breaches (Must be reported within 72 hours)
4. Individual Rights 10. Data Protection by Design – (Promotes Privacy & Data Protection)
Check your procedures to ensure they cover all the rights
individuals have, including how you would delete personal data or provide 11. Data Protection Officer (Do you need one?)
data electronically and in a commonly used format. 12. International – Cross – border trading checks
The main rights for individuals under the GDPR will be:
• the right to be informed;
• the right of access;
• the right to rectification;
• the right to erasure;
• the right to restrict processing;
• the right to data portability;
• the right to object; and
• the right not to be subject to automated decision-making including profiling.
5. Subject Data Requests (Will be 30 days)
6. Lawful basis for processing personal data
16. www.exponential-e.com
PREPARING FOR GDPR
ICO CHECKLIST SUMMARY
ICO: GDPR Preparation Recommendations – 12 Point Checklist Available at:
https://ico.org.uk/media/1624219/preparing-for-the-gdpr-12-steps.pdf
17. www.exponential-e.com
GDPR COMPLIANCE
GDPR Compliance
• Although we only have 317 days - DON’T PANIC!
• The burden of compliance may be less onerous if you are ISO 27001/9001 or FCA accredited.
Processes may already exist for data privacy, disclosure, retention and management
• Many companies already employ Data Protection or compliance personnel
• Finally, Exponential-e & Newable can help guide you through the entire GDPR compliance process
starting with your Data Discovery and Remediation plans that Mark Childs will detail later on . . .
20. Are You Ready For GDPR?
Neil May – Director of Technology Risk Management
12 July 2017
21. Before we start
BREXIT
We are not off the GDPR hook. In fact, the UK will have to try extra-hard to prove
Adequacy.
4 July 2017PRIVATE AND CONFIDENTIAL3
22. Timetable
― EU directive formally adopted 25 May 2016
― 2 year implementation period
― Becomes law on the 25th May 2018 – everyone must be compliant by then.
― DCMS is still working on the UK legislation!
PRIVATE AND CONFIDENTIAL4 4 July 2017
23. The ‘New Y2K’
― An immovable deadline
― A technical deliverable
― A skills shortage
― Cue – PANIC in the boardroom
― Beware the snake oil salesmen
PRIVATE AND CONFIDENTIAL5 4 July 2017
24. Beware
― No quick fixes
― If it seems to good to be true…..
― It is not possible to be ‘compliant’ yet – you can at best be ‘ready’
― Over 50 Articles yet to be fully defined
PRIVATE AND CONFIDENTIAL6 4 July 2017
25. But – good news for IT!
― GDPR – the business finally has to accept ownership of its data
― It is no longer “IT’s problem”
PRIVATE AND CONFIDENTIAL7 4 July 2017
26. General Data Protection Regulation
― Establish a single, pan-European law to replace the current inconsistent
patchwork of national laws
― Modernize the principles enshrined in the 1995 Data Protection Directive
― Immature internet
― No “cloud”
― No Facebook, Twitter, etc.
― No smartphones
― But, new principles much the same as the old ones
PRIVATE AND CONFIDENTIAL26 4 July 2017
27. Benefits of the new Regulation
― Benefits for organisations
― One EU market, one law
― One-stop-shop – a single supervisory authority
― Same rules for all organisations
― Even those outside the EU
― Benefits for EU citizens
― Better data security
― Putting people in control
PRIVATE AND CONFIDENTIAL9 4 July 2017
28. Some definitions
― More personal data covered (e.g. IP addresses; URLs)
― 'Pseudonymised data' is personal data
― Sensitive personal data extended (genetic, biometric, sexual orientation)
― Manual records extended (structured or unstructured)
― Main establishment and one stop shop: likely to involve a "concerned
supervisory authority"
― Issues resolved at the European Data
Protection Board
PRIVATE AND CONFIDENTIAL28 4 July 2017
29. Data processing activities
― No requirement to notify ICO
― Data Controllers and Data Processors must keep a record of their processing
activities
― Must make available to the ICO on request
PRIVATE AND CONFIDENTIAL29 4 July 2017
30. Impact assessments
― Requirement to perform privacy impact assessments
― Specifically where the processing of personal data is ‘likely to result in a high risk for the rights
and freedoms of individuals’
― Eg when processing personal data through new technologies or when engaging in people
profiling
PRIVATE AND CONFIDENTIAL30 4 July 2017
31. Impact assessments
― If assessment reveals that processing of personal data would result in a high risk
(eg due to the absence of mitigating controls), data controllers will be required to
consult with the ICO
― If the ICO believes that any processing of personal data would be non-compliant
with the Regulation then:
― Advise data controller on how to proceed
― Require an organisation to undergo a data protection audit
PRIVATE AND CONFIDENTIAL31 4 July 2017
32. Consent
― Consent given by data subjects must be “unambiguous” for all processing of
personal data
― Requires a “clear affirmative action”
― Consent has to be “explicit” for sensitive data
― Silence, pre-ticked boxes or inactivity does not constitute consent
― Must have an audit trail
― List brokers?
PRIVATE AND CONFIDENTIAL32 4 July 2017
33. Right to be forgotten
― Data subject has the right to have his or her personal data
erased where the retention of data breaches the regulation
― The right to erasure does not provide an absolute right to be
forgotten
― Data Controller and Processors have an obligation to ensure
that any third party with whom data is shared also erase the
personal data unless it is impossible or involves
disproportionate effort to do so
13 July 2017PRIVATE AND CONFIDENTIAL33
Data
Subject
34. Liability
― Data controllers and data processors have shared liability
― Even more important to have proper contractual arrangements in place
― Processors as well as controllers must provide a security level “appropriate” to
the processing risks
― Risk assessments for each customer
― Varying standards of data security for different
types of processing
PRIVATE AND CONFIDENTIAL34 4 July 2017
35. Data Protection Officer
― Mandatory appointment of a DPO for
― Public authority or body
― Those who monitor data subjects on a large scale
― Core activities process sensitive personal data
― ICO says so!
― Can be outsourced
― Must be…
― involved in all issues which relate to the protection of
personal data
― provided with necessary resources to perform their
required tasks
PRIVATE AND CONFIDENTIAL35 4 July 2017
36. Data Protection Officer tasks
― To inform and advise the data controller, data processor and their employees of
their regulatory obligations
― To monitor compliance with the Regulation. Including…
― Policies
― Assignment of responsibilities
― Raising awareness and training of staff
― To provide advice, related to data protection
impact assessments and to monitor impact
assessment performance
― To cooperate with the ICO
― To act as the contact point for data subjects and
the ICO
PRIVATE AND CONFIDENTIAL36 4 July 2017
37. Data Protection Officer position
― The Data Protection Officer must not receive any instructions regarding the
exercise of these tasks
― Independent, whether or not an employee
― They shall not be dismissed or penalised for performing
their tasks
― The Data Protection Officer shall directly report to the
highest management level of the controller or
the processor
PRIVATE AND CONFIDENTIAL37 4 July 2017
38. Data breaches
― ICO must be notified within 72 hours of becoming aware of the breach
― Where this cannot be achieved within 72 hours, an explanation of the reasons for the delay
should accompany the notification and information may be provided in phases without undue
further delay
― The notification must at least…
― Describe the nature of the breach
― Communicate the name and contact details
of the Data Protection Officer or other
contact point where more information can
be obtained
PRIVATE AND CONFIDENTIAL38 4 July 2017
39. Data breaches
― Fines for unprotected data breaches will range up to €20 million or 4% of annual
global turnover (whichever is higher!)
― If you suffer a breach and can show that the personal data can't be accessed by
unauthorized people (e.g. it was encrypted):
― The likelihood of being fined should be very greatly reduced
― You won't need to notify affected data subjects of the breach
PRIVATE AND CONFIDENTIAL39 4 July 2017
40. Data portability
― Where processing of personal data is carried out
by automated means, the data subject should be
allowed to receive their personal data in a
structured, commonly used, machine-readable
and interoperable format and transmit it to
another controller.
― The data subject has the right to request that the
data is transmitted directly from controller to
controller where technically
feasible.
PRIVATE AND CONFIDENTIAL40 4 July 2017
41. Contacts
Data protection by design
― Data protection must not be treated
as an afterthought or ignored
altogether
― Consider when…
― Building new IT systems for storing or
accessing personal data
― Developing policy or strategies that
have privacy implications
― Embarking on a
data sharing initiative
― Using data for new
purposes
PRIVATE AND CONFIDENTIAL41
Portfolio
Service
4 July 2017
42. Contacts
Data protection by design
― Potential problems are identified at
an early stage, when addressing
them will often be simpler and less
costly
― Increased awareness of privacy and
data protection across an
organisation
― Organisations are more likely to meet
their legal obligations
― Actions are less likely to be privacy
intrusive and have a
negative impact on
individuals
PRIVATE AND CONFIDENTIAL42
Portfolio
Service
4 July 2017
43. Codes of practice
― Codes of practice (or "codes of conduct" to use the correct Regulation-speak)
become more important
― If one DP authority produces a code of practice it can be more or less adopted in
other countries
― European Data Protection Board has a role
PRIVATE AND CONFIDENTIAL43 4 July 2017
44. Codes of practice
― In the UK there are already Codes of Practice in areas such as Marketing, CCTV,
Human Resources, Direct Marketing, Subject Access, Privacy Impact
Assessments, Personal Information Online and Data Sharing
― Aligning data protection procedures now with the content of ICO Codes of
Practice should get you ahead of the field
PRIVATE AND CONFIDENTIAL44 4 July 2017
45. Suggested Codes of Conduct
― Processing in the data controller's legitimate interests
― Consumer rights & dispute resolution procedures
― Fair data collection and transparency re data processing
― Pseudonymisation of personal data
― Exercise of their rights of data subjects
― Protection of children
― Security of processing and data loss
― Transfers of data to other countries
PRIVATE AND CONFIDENTIAL45 4 July 2017
46. What to do now?
― Be compliant with the DPA 1998!
― Know what personal data you process
― Data permeation maps
― Where does the data come from?
― What do we do with it?
― Where does it go?
― Information asset inventory
PRIVATE AND CONFIDENTIAL46 4 July 2017
47. What to do now?
― Ensure policies and procedures are up to date and relevant
― Review information security arrangements
― In processing personal data, be
― Fair
― Transparent
― Understand your basis of data processing!
PRIVATE AND CONFIDENTIAL47 4 July 2017
51. Why do you need a Gap Analysis
― The GDPR contains 99 articles
― Article “a separate clause or paragraph of a legal document or agreement, typically one outlining
a single rule or regulation”
― The GDPR contains 173 recitals
― Recital “the part of a legal document that explains its purpose and gives other factual information”
― Do you think you have the capability to successfully
interpret all of these on your own?
4 July 2017PRIVATE AND CONFIDENTIAL51
52. There is a lot of rubbish talked about GDPR!
― If somebody tells you they can make you GDPR compliant they simply aren’t
credible!!
― The GDPR will be enforced from May 2018 and is now well into the implementation period
― EU member states are able to vary aspects of the GDPR even though it is a Regulation, designed
to harmonise data protection law. These parts that can be varied are known as derogations
― The Department of Culture, Media and Sport (DCMS) who run the consultation said: “The UK
pressed hard throughout negotiations to ensure that the GDPR does not place unnecessary
burdens on business. There are also derogations (exemptions) within the GDPR where the UK
can exercise discretion over how certain provisions will apply.”
― An example of a derogation in the GDPR is the age of consent for children, which can be set
between 13-16 years old. It is up to a member state to decide and this consultation will address
these questions
PRIVATE AND CONFIDENTIAL52 4 July 2017
53. NO YOU WON’T!!!!!
So where does that leave us?
― There are still 50 articles that the DCMS needs to ratify.
― Well on the basis I’ll wait then…..
PRIVATE AND CONFIDENTIAL53 4 July 2017
54. The Act comes into force May 2018!!
― All countries in the EEA will need to be fully complaint with all of the requirements
at this time
― Failure to do so and you are risking considerable fines and reputational damage
to your business
― The current fines regime is set at €20 million or 4% of your annual global turnover, whichever is
the higher
― Countries who process European Subjects data are not exempt
― For example, if you have offices in the Middle
East and process European Subject Data you
are “in-scope”
PRIVATE AND CONFIDENTIAL54 4 July 2017
55. So what does a Gap Analysis look like?
― There is no such thing as a “typical gap analysis”
― All organisations are different so the duration required to perform one ranges from
days to weeks to months depending on size, complexity etc.
― So where do you start?
― Do you understand your “Data Estate”?
― Are you able to evidence this?
― Do you have an Information Asset Inventory?
― Are you able to evidence this?
― Do you have a record of all of your 3rd Parties who process
personal data on your behalf?
― Are you able to evidence this?
PRIVATE AND CONFIDENTIAL55 4 July 2017
56. So what does a Gap Analysis look like?
― So where do you start?
― Have all of your staff including contractors, part-time, volunteers etc. received Data Protection
Awareness Training and do they receive this on a regular basis?
― Are you able to evidence this?
― Have you received unambiguous Positive Consent from all of your Staff, Clients etc.as to how
you intend to process their data?
― Are you able to evidence this?
― Have you received unambiguous Positive Consent from all
of your clients held on your current CRM system(s) as
to how you intend to process their data?
― Are you able to evidence this?
PRIVATE AND CONFIDENTIAL56 4 July 2017
57. Should I be concerned?
― If you aren’t then you should be!!
― GDPR is probably the single most ground breaking piece of legislation that has
come into force in the past 20yrs
― The Gap Analysis is just the start of it. This will:
― Identify as to where you are and aren’t complaint with the proposed GDPR
― It will provide you with a set of Data Permeation Maps,
which map your respective personal data flows in the
business; this will include both Logical and Physical
data namely your Data Estate
― It will provide you with an indication of the effort
required to bring yourself to being GDPR ready
― So what's next?
PRIVATE AND CONFIDENTIAL57 4 July 2017
58. Remediation plans
― Please don’t underestimate the time you will require for remediation
― GDPR came into force in May 2016 and you have until May 2018 to be compliant
― 2 years is probably a reasonable estimate as to how long it would take the
average business to perform a gap analysis and put in place controls and
measures, to demonstrate that they were GDPR ready
― No matter what the size or complexity of your organisation GDPR will have an
impact on how you do business
― Unfortunately most businesses have significantly underestimated the impact of
GDPR or are simply in denial!
PRIVATE AND CONFIDENTIAL58 4 July 2017
59. Remediation plans
― Lets start with some good advice. As a minimum you will need to consider:
― Data Permeation Maps
― Data Inventory
― Data Protection Officer
― Data Protection Training and Awareness
― Data Protection Policies and Procedures
― Third Party Assurance Programme
― Third Party Contracts
― Penetration Testing and Vulnerability Analysis
PRIVATE AND CONFIDENTIAL59 4 July 2017
60. Remediation plans
― Lets start with some good advice. As a minimum you will need to consider:
― The Right To Be Forgotten
― Subject Access Requests
― Privacy by Design
― Privacy Impact Assessments
― Positive Consent
― CRM Systems
― CCTV
― Data Portability
― Cross Border Transfers
PRIVATE AND CONFIDENTIAL60 4 July 2017
61. What to do now?
― There is no time like the present:
― Get yourself a copy of the GDPR
― Perform a Gap Analysis
― Produce a Remediation Plan - You have less than a year to get yourself GDPR ready
― Do not underestimate the time and effort required - YES it is going to cost ££s so budget for it.
― Ignore it at your peril!!! Compliance is not an option – this is the law!
PRIVATE AND CONFIDENTIAL61 4 July 2017
63. www.exponential-e.com #GDPREXPO
CYBER SECURITY BY DESIGN
• GDPR, Articles 25, 32, 33,34, and 35 contain details on securing data
• The Top Five
• Discover the weaknesses
• Privacy by Design = Security By Design
• Security Appropriate to Risk
• The Principle of Least Privilege
• Better Control of Customer Data
• How can we support you?
64. www.exponential-e.com #GDPREXPO
DISCOVER THE WEAKNESSES
• The world of self denial!
• Your own audit will not find it!
• Independent assessment of where you are.
• Exponential-e provide access to trusted renowned partners in this field.
• Pen Test Partners LLP.
• We facilitate! Its the customers report!
• And they are accredited.
65. www.exponential-e.com #GDPREXPO
PRIVACY BY DESIGN
SECURITY BY DESIGN
We take Security Seriously:
• All our Solutions Engineers are trained to High Standards.
• Platinum Partner with Fortinet.
• MSP Partner Palo Alto.
• Gold Partner for Gemalto / Safenet.
• Senior Partner for Foresite.
• Only MSP Partner for Sentinel One.
• We design based on the solution you need.
• Our Partners ensure we are well trained.
66. www.exponential-e.com #GDPREXPO
SECURITY APPROPRIATE TO RISK.
THE PRINCIPLE OF LEAST PRIVILEGE.
• How do you judge these two?
• Evaluate the risk and impose the security!
• How often do you review users privileges?
• Advanced Security Monitoring
• Log collection and correlation from any device under one pane of glass!
• Generates reports
• Has 24 x 7 Analyst support
• Alerts and advice on remediation
67. www.exponential-e.com #GDPREXPO
BETTER CONTROL OF CUSTOMER DATA
Where’s The Cloud for Exponential-e ?
• Cloud Storage is located within UK Borders.
• We Provide encryption.
• Structured Storage offering dedicated arrays.
• Which means that customers can store in a
structured, searchable, encrypted platform their
essential data which is already GDPR ready!
What does The Exponential-e Cloud provide to our
Customers ?
• Information Governance.
• Configurable to meet regulatory and compliance
standards.
• Provides a Data classification application
• On Structured and unstructured data
• Regardless of where data resides (premises or
Cloud).
• Data ownership, Data retention periods, Data
Sensitivity.
68. www.exponential-e.com #GDPREXPO
A Unified Platform
Use a single platform for data governance and
policy management, and extend data
governance and control to cloud-based data.
69. www.exponential-e.com #GDPREXPO
A UNIFIED PLATFORM
• By knowing exactly where personal data lives across your organization, you can:
o Identify the presence of personal data in all data locations.
o Automate special handling of information with standard data policies (i.e., access control, security,
encryption, retention).
o Support the export and erasure of personal data from all data sources.
o Detect and delete unneeded copies of personal data.
o Maintain an auditable chain of custody on an individual's personal data.
o Understand data leakage risk and speed up data breach analysis.
#6: HAVE REQUESTED FROM DAVID - PRODUCT
Portfolio areas broken down in to 6 key areas (AS ABOVE) – Note underpinned by our security offering – From our infrastructure/VPLS technology, our multiple services and other security services
Portfolio has been developed alongside our customers based on Innovation and bringing new services to market
Our drive is to develop a portfolio and roadmap that meets all the needs of our customers
Services and delivered in-house and as part of the Exponential-e team and delivered and supported by higher qualified, accredited and experienced team
Our services come with industry leading SLA’s – end to end sla’s covering all services
Our services are delivered on best of breed infrastructure – Cloud, UCC and state of the ART VPLS network
Your xxx is only as good as your network
#15: GDPR is the strait-jacket of privacy being fitted to the good, the anarchic and the ugly exploiters of our personal assets
#69: By eliminating the need for multiple point products to manage your data, Commvault software does more than just lay a foundation for GDPR compliance — it also helps you improve operational efficiency, gain business advantage and boost employee productivity.
#70: By eliminating the need for multiple point products to manage your data, Commvault software does more than just lay a foundation for GDPR compliance — it also helps you improve operational efficiency, gain business advantage and boost employee productivity.