SlideShare a Scribd company logo
www.iapp.org
Thursday, November 2, 2017
Time: 11:00 a.m. - noon EDT
3:00 - 4:00 p.m. UTC
Beyond PIAs:
A Tutorial on Automating
GDPR Compliance
www.iapp.org
Welcome and Introductions
Host:
John Howie, CIPP/US, CIPT
Chief Privacy Officer, Consumer BG
Huawei
Panelists:
George Chedzhemov,
Director of Client Success
BigID
2
Dave Cohen
CIPP/E,CIPP/US
Knowledge Manager
IAPP
www.iapp.org
Overview
and
Context
3
www.iapp.org
Laying Groundwork
for
Compliance with the GDPR
4
www.iapp.org
Accountability in GDPR
• Art 5 2.: The controller shall be responsible for, and be able to
demonstrate compliance with, paragraph 1 (‘accountability’).
–Lawfulness, fairness, and transparency; Purpose limitation; Data minimization;
Accuracy; Storage limitation; and Integrity and confidentiality
• Accountability is met through documentation
–Beyond what is called for in Art. 30 Records of Processing Activity
–Documentation may be in writing or in electronic form
5
www.iapp.org
Data Protection Impact Assessments (DPIAs)
• DPIAs can assist with some accountability requirements but most organizations
will not perform them routinely
–GDPR call for DPIAs to be performed when there is a high risk to the rights and freedoms of
natural persons from data processing
• Best practice calls for a Risk Assessment (RA) to be performed in all processing
activities
–Can leverage automation to gather information about processing activities, data, etc.
–RA can feed into a DPIA if one is ultimately required
6
www.iapp.org
Information gathered in a RA
• A RA can be performed by product teams, and can identify:
–Personal data elements processed (e.g. name, D.O.B., address, salary, etc.)
–The length of time data will be kept for
–The uses to which the data will be put
–Where the data will be (is already) stored and/or transferred to
• RAs should be reviewed by Privacy teams for risk/follow-up
–Review can supplement information with legal basis, etc.
• Automation to gather/store/process RAs can greatly help
7
www.iapp.org
Consent
• When Consent is Legal Basis for processing of personal data:
–Consent must be a freely given, specific, informed, unambiguous indication of the data subject’s
wishes… (Art. 4 (11))
–The “…controller shall be able to demonstrate that the data subject has consented…” (Art. 7 1.)
–Additional data subject rights are provided for
• Data subjects must be able to easily withdraw consent
–Implications for use of data, etc.
• Consent is also a valid derogation to enable data transfers outside of EEA
8
www.iapp.org
Personal data breach response
• Art. 33 and 34 specify requirements to notify supervisory authority and data subjects
–Personal data breach is a broad term
–Not every breach needs to be reported
• RA/DPIA documentation can be used to determine whether or not notification is
required, and to whom
–Based on risk to data subjects, datasets that may have been compromised, etc.
9
www.iapp.org
Data subject rights
• RA/DPIA documentation can be aid when data subjects exercise their
rights
–Good documentation will detail:
• What personal data is processed
• Where data is stored and transferred to
• Whether or not decision-making/profiling is taking place
• Consent as legal basis modifies rights
–Withdrawal of consent prohibiting further processing, data portability, automated
decision making, etc.
10
www.iapp.org
Maintenance of records
• RAs/DPIAs should be revisited on an as-needed basis, e.g.:
–When volume of data changes
–Product or service updates or features are added or withdrawn
–When technological changes are made (including storage locations)
• RAs/DPIAs can be part of your Records of processing activities
–Not required, but a best practice of end-to-end documentation
• Well maintained records are easy to show to regulators
–Stored in central location, accurate, complete, etc.
11
www.iapp.org
Questions and Answers
Host:
John Howie, CIPP/US, CIPT
Chief Privacy Officer, Consumer BG
Huawei
john@thehowies.com
Panelists:
George Chedzhemov,
Director of Client Success
BigID
gchedzhemov@bigid.c
om
12
Dave Cohen
CIPP/E,CIPP/US
Knowledge Manager
IAPP
dave@iapp.org
www.iapp.org
Thank You
to our
Sponsor
Speakers and Participants
13
www.iapp.org
Web Conference
Participant Feedback Survey
Please take this quick (2 minute) survey to let us know how satisfied you
were with this program and to provide us with suggestions for future
improvement.
Click here:
http://www.questionpro.com/t/AL2CRZa13s
Thank you in advance!
For more information: www.iapp.org
14
www.iapp.org
Attention IAPP Certified Privacy Professionals:
This IAPP web conference may be applied toward the continuing privacy education
(CPE) requirements of your CIPP/US, CIPP/E, CIPP/G, CIPP/C, CIPT or CIPM
credential worth 1.0 credit hours. IAPP-certified professionals who are the named
participant of the registration will automatically receive credit. If another certified
professional has participated in the program but is not the named participant then
the individual may submit for credit by submitting the continuing education
application form here: CPE credit application.
Continuing Legal Education Credits:
The IAPP provides certificates of attendance to web conference attendees.
Certificates must be self-submitted to the appropriate jurisdiction for
continuing education credits. Please consult your specific governing body’s
rules and regulations to confirm if a web conference is an eligible format
for attaining credits. Each IAPP web conference offers either 60 or 90 minutes of
programming.
15
www.iapp.org
For questions on this or other
IAPP Web Conferences or recordings
or to obtain a copy of the slide presentation
please contact:
Dave Cohen, CIPP/E, CIPP/US
Knowledge Manager
International Association of Privacy Professionals (IAPP)
dave@iapp.org
603.427.9221
16

More Related Content

PDF
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PPTX
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
PDF
Piwik PRO The Real Cost of Data Privacy
PDF
GDPR: Threat or Opportunity?
PDF
Web Analytics and Privacy
PDF
Finding Data at Risk for CCPA Compliance
PDF
GDPR Scotland 2017
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
Beginning your General Data Protection Regulation (GDPR) Journey
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Piwik PRO The Real Cost of Data Privacy
GDPR: Threat or Opportunity?
Web Analytics and Privacy
Finding Data at Risk for CCPA Compliance
GDPR Scotland 2017

What's hot (16)

PDF
Practical steps to GDPR compliance
PDF
GDPR Readiness
PPTX
Ensuring GDPR Compliance - A Zymplify Guide
PPTX
GDPR: Your Journey to Compliance
PDF
Guardians of Trust: Building Trust in Data & Analytics
PPTX
India'a Proposed Privacy & Personal Data Protection Law
PDF
BigID Data Sheet: Smart Data Labeling and Tagging
PDF
Beyond GDPR Compliance - Role of Internal Audit
PDF
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
PDF
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
PDF
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
PDF
Dama Ireland slides - Data Trust event 9th June 2016
PDF
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
PDF
Privacera Databricks CCPA Webinar Feb 2020
PPTX
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
Practical steps to GDPR compliance
GDPR Readiness
Ensuring GDPR Compliance - A Zymplify Guide
GDPR: Your Journey to Compliance
Guardians of Trust: Building Trust in Data & Analytics
India'a Proposed Privacy & Personal Data Protection Law
BigID Data Sheet: Smart Data Labeling and Tagging
Beyond GDPR Compliance - Role of Internal Audit
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Dama Ireland slides - Data Trust event 9th June 2016
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Privacera Databricks CCPA Webinar Feb 2020
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
Ad

Similar to BigID IAPP webinar on data-driven enterprise privacy management (20)

PDF
IAPP certification programs overview
PPTX
GDPR Benefits and a Technical Overview
PPTX
GDPR Breakfast Briefing for Business Advisors
PPTX
GDPR Breakfast Briefing for Business Advisors
PPTX
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
PPTX
GDPR for Dummies
PPTX
Associates quick guide to gdpr v 1.0
PPTX
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
PPTX
Teradata's approach to addressing GDPR
PPTX
Assessing the impact of security services
PPT
Privacy audittalkfinal
PDF
GDPR Are you ready for auditing privacy ?
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PDF
GDPRforum London
PDF
Prep your app for gdpr compliance
PDF
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
PDF
Setting the right GDPR priorities
PPTX
Microsoft dynamics 365 for small and medium sized charities - session 2 gdpr
PPTX
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
IAPP certification programs overview
GDPR Benefits and a Technical Overview
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR for Dummies
Associates quick guide to gdpr v 1.0
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
Teradata's approach to addressing GDPR
Assessing the impact of security services
Privacy audittalkfinal
GDPR Are you ready for auditing privacy ?
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPRforum London
Prep your app for gdpr compliance
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Setting the right GDPR priorities
Microsoft dynamics 365 for small and medium sized charities - session 2 gdpr
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Ad

More from BigID Inc (12)

PDF
BigID Consent Governance
PPTX
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
PPTX
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
PDF
BigID DataSheet: Data Access Intelligence
PDF
BigID Data Sheet: LGPD Compliance Automated
PDF
BigID Data Sheet HIPAA Data Security & Privacy
PDF
BigID Datasheet: CCPA Data Rights Automation
PDF
BigID Data Sheet: GDPR Compliance
PDF
BigID Data sheet: Consent Governance & Orchestration
PDF
BigID Data Sheet: Data subject rights
PDF
BigID Data Sheet: Master Your Customer Data Without MDM
PDF
BigID Data Sheet: Enterprise Privacy Management
BigID Consent Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID DataSheet: Data Access Intelligence
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet HIPAA Data Security & Privacy
BigID Datasheet: CCPA Data Rights Automation
BigID Data Sheet: GDPR Compliance
BigID Data sheet: Consent Governance & Orchestration
BigID Data Sheet: Data subject rights
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Enterprise Privacy Management

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx

BigID IAPP webinar on data-driven enterprise privacy management

  • 1. www.iapp.org Thursday, November 2, 2017 Time: 11:00 a.m. - noon EDT 3:00 - 4:00 p.m. UTC Beyond PIAs: A Tutorial on Automating GDPR Compliance
  • 2. www.iapp.org Welcome and Introductions Host: John Howie, CIPP/US, CIPT Chief Privacy Officer, Consumer BG Huawei Panelists: George Chedzhemov, Director of Client Success BigID 2 Dave Cohen CIPP/E,CIPP/US Knowledge Manager IAPP
  • 5. www.iapp.org Accountability in GDPR • Art 5 2.: The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’). –Lawfulness, fairness, and transparency; Purpose limitation; Data minimization; Accuracy; Storage limitation; and Integrity and confidentiality • Accountability is met through documentation –Beyond what is called for in Art. 30 Records of Processing Activity –Documentation may be in writing or in electronic form 5
  • 6. www.iapp.org Data Protection Impact Assessments (DPIAs) • DPIAs can assist with some accountability requirements but most organizations will not perform them routinely –GDPR call for DPIAs to be performed when there is a high risk to the rights and freedoms of natural persons from data processing • Best practice calls for a Risk Assessment (RA) to be performed in all processing activities –Can leverage automation to gather information about processing activities, data, etc. –RA can feed into a DPIA if one is ultimately required 6
  • 7. www.iapp.org Information gathered in a RA • A RA can be performed by product teams, and can identify: –Personal data elements processed (e.g. name, D.O.B., address, salary, etc.) –The length of time data will be kept for –The uses to which the data will be put –Where the data will be (is already) stored and/or transferred to • RAs should be reviewed by Privacy teams for risk/follow-up –Review can supplement information with legal basis, etc. • Automation to gather/store/process RAs can greatly help 7
  • 8. www.iapp.org Consent • When Consent is Legal Basis for processing of personal data: –Consent must be a freely given, specific, informed, unambiguous indication of the data subject’s wishes… (Art. 4 (11)) –The “…controller shall be able to demonstrate that the data subject has consented…” (Art. 7 1.) –Additional data subject rights are provided for • Data subjects must be able to easily withdraw consent –Implications for use of data, etc. • Consent is also a valid derogation to enable data transfers outside of EEA 8
  • 9. www.iapp.org Personal data breach response • Art. 33 and 34 specify requirements to notify supervisory authority and data subjects –Personal data breach is a broad term –Not every breach needs to be reported • RA/DPIA documentation can be used to determine whether or not notification is required, and to whom –Based on risk to data subjects, datasets that may have been compromised, etc. 9
  • 10. www.iapp.org Data subject rights • RA/DPIA documentation can be aid when data subjects exercise their rights –Good documentation will detail: • What personal data is processed • Where data is stored and transferred to • Whether or not decision-making/profiling is taking place • Consent as legal basis modifies rights –Withdrawal of consent prohibiting further processing, data portability, automated decision making, etc. 10
  • 11. www.iapp.org Maintenance of records • RAs/DPIAs should be revisited on an as-needed basis, e.g.: –When volume of data changes –Product or service updates or features are added or withdrawn –When technological changes are made (including storage locations) • RAs/DPIAs can be part of your Records of processing activities –Not required, but a best practice of end-to-end documentation • Well maintained records are easy to show to regulators –Stored in central location, accurate, complete, etc. 11
  • 12. www.iapp.org Questions and Answers Host: John Howie, CIPP/US, CIPT Chief Privacy Officer, Consumer BG Huawei john@thehowies.com Panelists: George Chedzhemov, Director of Client Success BigID gchedzhemov@bigid.c om 12 Dave Cohen CIPP/E,CIPP/US Knowledge Manager IAPP dave@iapp.org
  • 14. www.iapp.org Web Conference Participant Feedback Survey Please take this quick (2 minute) survey to let us know how satisfied you were with this program and to provide us with suggestions for future improvement. Click here: http://www.questionpro.com/t/AL2CRZa13s Thank you in advance! For more information: www.iapp.org 14
  • 15. www.iapp.org Attention IAPP Certified Privacy Professionals: This IAPP web conference may be applied toward the continuing privacy education (CPE) requirements of your CIPP/US, CIPP/E, CIPP/G, CIPP/C, CIPT or CIPM credential worth 1.0 credit hours. IAPP-certified professionals who are the named participant of the registration will automatically receive credit. If another certified professional has participated in the program but is not the named participant then the individual may submit for credit by submitting the continuing education application form here: CPE credit application. Continuing Legal Education Credits: The IAPP provides certificates of attendance to web conference attendees. Certificates must be self-submitted to the appropriate jurisdiction for continuing education credits. Please consult your specific governing body’s rules and regulations to confirm if a web conference is an eligible format for attaining credits. Each IAPP web conference offers either 60 or 90 minutes of programming. 15
  • 16. www.iapp.org For questions on this or other IAPP Web Conferences or recordings or to obtain a copy of the slide presentation please contact: Dave Cohen, CIPP/E, CIPP/US Knowledge Manager International Association of Privacy Professionals (IAPP) dave@iapp.org 603.427.9221 16