Training on Data Protection Roles of the Data Protection Office.

Slides:



Advertisements
Similar presentations
Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.
Advertisements

Tips to a Successful Monitoring Visit
Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
RESEARCH COMPLIANCE Agenda 1. No Destruction of local research documents after scanning 2. Training for shipping biological samples/specimens 3. Regulatory.
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Data Protection and the GRA. 1. Commentary on Data Protection 2. The GRA’s Role The Register Investigations, Mediation and Compensation Enforcement Notices.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
IS Audit Function Knowledge
Regulatory Body MODIFIED Day 8 – Lecture 3.
Internal Control and Internal Audit
Presented By: Donna Denker, CPA Donna Denker & Associates.
ZHRC/HTI Financial Management Training
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
By Taver Chong, SFSU Associate Internal Auditor –
Surviving Survey and Re-certification. Rural Mississippi Mississippi Stats ◦116 Hospitals ◦154 RHC’s (MSDH website) ◦28 CAH’s (35miles or “necessary.
The Information Commissioner’s Office David Evans.
Company’s short presentation. General presentation We offer a complete package of professional Occupational Health and Safety services; We hold the certification.
Implementation of Security and Confidentiality in GP Practices.
HIPAA PRIVACY AND SECURITY AWARENESS.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
Michelle Groy Johnson Quality Improvement Officer Research Integrity Office Tough Love: Understanding the Purpose and Processes of Quality Assurance.
The Data Protection Act 1998 The Eight Principles.
Internal Control in a Financial Statement Audit
Information Sharing Sheila Logan Information Commissioner’s Office Employability Partnership Event Glasgow 13 August 2009.
1 GOVERNANCE in COMMUNITY ORGANISATIONS Community Solutions- NESB Community Safety Development and Coordination Project Auspiced by Illawarra Forum Inc.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Data Protection Act AS Module Heathcote Ch. 12.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
Audit Planning Process
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
MODULE 3 Composition & Roles. TAT TEAM APPROACH UPON COMPLETION OF THIS MODULE, PARTICIPANTS SHOULD UNDERSTAND: 3 – 2  Composition of the Threat Assessment.
1 The Future Role of the Food and Veterinary Office M.C. Gaynor, Director, FVO EUROPEAN COMMISSION HEALTH & CONSUMER PROTECTION DIRECTORATE-GENERAL Directorate.
Guidance Training (F520) §483.75(o) Quality Assessment and Assurance.
INTRODUCTION TO DATA PROTECTION An overview of the Irish Data Protection legislation.
Roles and Responsibilities Explain the roles and responsibilities for health and safety of key personnel in selected workplace.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
OSHA Safety and Health Program Management Guidelines
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Information Security TechLink Seminar, 17 April 2013 James Knapton, Information Compliance Officer, Registrary’s Office.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 6 CH 5 ISO MANAGEMENT RESPONSIBILITY Philippe Bauwin Medical.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Data Protection Legislation
GENERAL DATA PROTECTION REGULATION (GDPR)
The Audit Function.
G.D.P.R General Data Protection Regulations
HUD’s Coordinated Entry Data & Management Guide
Presentation transcript:

Training on Data Protection Roles of the Data Protection Office

Contents Registration/Renewal Data Protection Compliance Overall Administration of DPO Audit Security

Registration/Renewal  Assist DC in filling application form  Verify all necessary documents submitted  Ensure that all required personal infortion are declared on application form

Data Protection Compliance Provide assistance and advice to DCs on the issues of DPA compliance Attends meeting with the DCs on data protection issues Issue enforcement Notices Carry out Security check & audit Role of DPO From enforcer to strategic advisor The role of the regulators towards compliance monitors, educators, liaisons between business and government, and active participants in privacy debates

Data Protection Compliance Provide assistance/advice to organisations Attends meeting with the DC on data protection issues Issue enforcement Notices Carry out Security check & audit

Overall Administration of DPO -Keep in touch with -Research & -Technology Process files for certificates. Attend queries of the Data Controllers Providing adequate training to staff and Data Controllers regularly -Sensitization -Investigation to complaint

Research - Keep in touch with research & emerging Technologies Produce guidelines to help DCs. Project Management & Data Protection Data Security & IT Setting up of a forensic Lab

Technology Technology opens the doors to a world of opportunities. – But there are serious privacy risks considerations. Technology developers will need to enshrine privacy in the standards development process using privacy by design approach

Auditing 1. Purpose – to obtain a complete picture, as far as possible, of the structure of personal information flows within an organisation so that the appropriate compliance procedures can be put in place to ensure that the organization deals with personal data in accordance with – data protection law, – the general law and – best practices.

Auditing 2. Organisation Chart – For large-scale and complex organisations the first stage is to obtain an organizational chart showing the operational, managerial and departmental structure of the organization together with – the names and locations of the personnel who have managerial or – operational responsibility for information within the organisation.

Auditing 3. Questionnaires Data protection audit questionnaires should then be sent to each named individual – for completion or – may be used as the basis for face to face interviews.

Auditing 4. Analysis of information Once all the questionnaires have been completed the organisation is in a position – to compile a complete diagram of the use of information within the organization which can then form the basis of a review of the organisation's compliance with data protection law and other relevant law. For large-scale and complex organizations, – it is recommended that such audits are carried out annually.

Security Security as a core business value A data controller shall – (a) take appropriate security and organisational measures for the prevention of unauthorised access to, alteration of, disclosure of, accidental loss, and destruction of the data in his control; and (b) ensure that the measures provide a level of security appropriate to – – (i) the harm that might result from the unauthorised access to, alteration of, disclosure of, destruction of the data and its accidental loss; and – (ii) the nature of the data concerned.

Other related issues Publications & ICT Laws ICTA News Releases Public Notices Tender Notices Events Publications & Reports Guidelines & Decisions Public Consultations ICT Laws Telecommunication Directives Memorandum of Understanding (MOU) Regulations Regulations on ICT Appeal Tribunal

Conclusion As the digital ecosystem evolves, regulators and organisations need to open the lines of communication. Together, regulators and organisations need to serve as the stewards of privacy protection