Cyberforum 2018 March 8, 2018 Los Angeles GDPR & SECURITY

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
The Data Protection (Jersey) Law 2005.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
CMG Events 2016 Cybersecurity Briefing 24 February 2016 John Magee William Fry.
Information Security TechLink Seminar, 17 April 2013 James Knapton, Information Compliance Officer, Registrary’s Office.
The EU General Data Protection Regulation Frank Rankin.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
General Data Protection Regulations: Key Articles Overview Craig Clark Information Security & Compliance Manager UNIVERSITY OF EAST LONDON – LONDON’S LEADING.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
General Data Protection Regulation (EU 2016/679)
Nassau Association of School Technologists
Data Protection Officer’s Overview of the GDPR
Accountability & Structured Privacy Management
Unpacking the European Commission General Data Protection Regulation
Information Governance Support Information Governance Services
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Data protection headaches: GDPR, brexit AND perimeter risk
Responding to a Data Breach 360° of IT Compliance
WORLD OF CLOUD COMPUTING AFTER GDPR challenges, opportunities and the unknown Matjaž Drev, MA. National Supervisor for Personal Data Protection, Information.
Presentation to GTMC on GDPR
General Data Protection Regulation (GDPR
General Data Protection Regulation
Data Protection Update – GDPR or bust
Service-centric policies – Update (NA3.2)
Public Sector Organisations - are you GDPR ready?
Bob Siegel President Privacy Ref, Inc.
GDPR - Individual’s Rights
GENERAL DATA PROTECTION REGULATION (GDPR)
6 Principles of the GDPR and SQL Provision
GDPR - New Data Protection Regulation
Introduction to GDPR 09/11/2018.
GDPR and paper records Why it’s not all cyber and fines Gary Shipsey
The General Data Protection Regulation (GDPR)
Incident Reporting Webinar Begins at 12.30
Security measures Introducing Risk Assessment in GDPR
#IASACFO.
State of the privacy union
G.D.P.R General Data Protection Regulations
The GDPR and research data
GDPR – Practical Implementation Managing contracts, procurement and relationships with suppliers Terry Brewer Chief Executive.

General Data Protection Regulation
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Data Mapping On the Journey to Accountability
GDPR Workshop MEU Symposium Prague 2018
Welcome!.
Management of a Data Breach under the GDPR
Detecting, reporting & investigating data breaches under GDPR
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Governing the risk of GDPR compliance
Mandatory Breach Reporting (isn’t *that* bad)
HIPAA Security Standards Final Rule
The General Data Protection Regulation: Are You Ready?
Data protection by design, Art.25.1 of the GDPR
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
This project is funded by the European Union
Fines, Sanctions and Compensation The teeth in the GDPR & Data Protection Act 2018 by Simon McGarr, CIPP/E Data Compliance Europe.
GDPR Module 4:Other Significant Changes
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
Data Protection What can I do? GDPR Principles General Data Protection
General Data Protection Regulation “11 months in”
THE IMPACT OF DATA PROTECTION RULES ON CORPORATE INFO SECURITY AND INCIDENT RESPONSE MANAGEMENT – The Energy sector CEER Cybersecurity Workshop Massimo.
EU Data Privacy: What US Orgs Need to Do Now to Prepare for the GDPR
Presentation transcript:

Cyberforum 2018 March 8, 2018 Los Angeles GDPR & SECURITY Peter Z. Stockburger, Senior Managing Associate, Dentons Francoise Gilbert, Shareholder, Greenberg Traurig, LLP Thomas Peistrup, General Counsel, InStyler/Tre Milano Elvis Stumbergs, Counsel, Office of Privacy, Sprint

Security – One of the 7 Data Protection Principles Personal data must be processed in a manner that ensures appropriate security of the personal data, including Protection against unauthorized or unlawful processing Protection against accidental loss, destruction, or damages Using appropriate technical and organizational measures Controller is responsible for, and must be able to demonstrate compliance

Security Obligations of Controllers & Processors Implement appropriate technical and organizational security measures that take into account the state of the art, the cost of implementation, the nature, scope, context and purpose of the processing, and the risk of varying likelihood and severity for the rights and freedoms of individuals (Art. 32) Including, as appropriate: Pseudonymization and encryption of personal data Ability to ensure confidentiality, integrity, availability and resilience of the processing systems and services Ability to restore the availability and access to personal data in a timely manner in the event of physical and or technical incident Process for regularly testing, assessing and evaluating the effectiveness of the measure Maintain a record of the technical and organizational security measures (Art. 30) May instead comply with a Code of Conduct

Security Obligations of Controllers & Processors Data Protection Impact Assessment (DPIA), when required, must: Indicate the measures envisaged to address the risks to the data and to the rights of the data subjects, including the security measures and mechanisms to ensure the protection of personal data, and Demonstrate compliance with the GDPR Controller dealing with Processors Conduct appropriate due diligence when selecting processors and subprocessors Enter into written contracts with processors regarding scope of data uses and protection of personal data

Personal Data Breach “Personal Data Breach” : a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, access to, personal data transmitted, stored or otherwise processed Controller must document any personal data breach: Facts relating to the breach Its effects The remedial action taken Documentation must enable the Supervisory Authority to verify compliance Controller Notification to Supervisory Authority (Art. 33) Without undue delay, and where feasible within 72 hours of identifying an incident If notification is not made within 72 hours, Controller must provide reasons for the delay Exception: If Controller can demonstrate that the breach is unlikely to result in a risk to the rights and freedoms of individuals

Personal Data Breach Controller notification to affected individuals (Art. 34) Required only if the breach is likely to result in a high-risk to the rights and freedom of the individuals Not required if data is unintelligible, Controller has taken measures to ensure that the high risk is no longer likely; or contacting each individual would require disproportionate effort Supervisory Authority may require the Controller to make the notification, even if the Controller previously determined that the notification was not required Processor Notification to Controller Required without undue delay