SlideShare a Scribd company logo
CERN 5 Things you should know about Data Protection
5 things you should know about Data Protection
2
David Foster
Head of Data Privacy Protection
January 2018
Opening Sing-along
My personal data are mine
To abuse them is a crime
You cannot share
You must take care
Or risk a hefty fine
3
David Foster 2018
1. My Personal data are mine
• Personal data belong to the individual
• They are not yours to use as you see fit, not even if they
are public!
• Fair processing
• Legitimate Basis (hint: consent is a problem)
• Specific Purpose
• Privacy notices should declare what, how and why data are
processed
• One is unlikely to be enough!
• One notice for each independent service.
• Data Protection Impact Assessments (DPIA) may be needed.
4
2. To abuse them is a crime
• The scope of personal data is wide
• Attributes, Photos, Electronic Identifiers ….
• The scope of processing is broad
• Analysing, Copying, Viewing ….
• This is complex to communicate inside an organisation
• Internal training
• Internal policies
• Accountability
• It may help to consolidate processes and infrastructure
• Approved storage systems
• Managed internal transfers
• Be wary of automated decision making and profiling
5
3. You cannot share
• Without safeguards because privacy travels with
the data
• Responsibility rests with the controller
• Contracts, codes of conduct, binding corporate
rules
• Records of transfers
• Extra-territorial reach
• This may be a difficult culture change within
organisations used to freely sharing personal data
• Complexity may increase with ePrivacy
6
4. You must take care
• You need to look after other peoples data
• Appropriate organisational and technical measures
• Risks with unnecessary data retention
• ISO27001 for data security and handling is a good
starting point
• Individuals have rights to their data you are
processing (even if not absolute rights)
• Must be clear mechanisms to exercise the 8 basic
rights, which should be in the privacy notice
• Privacy by default and by design
• Anonymise or pseudonymise
7
5. Or risk a hefty fine
• Its all about managing risk
• “Compliance”, per-se, does not exist
• Fines can be large depending on the infraction
• Violation of principles carry the larger fine
• Mitigation of risk of large fines
• A demonstrable attempt at implementing the
legislative requirements
• Internal Training, Policies, Accountability,
Management Commitment
• Having a DPO and accepting their advice
8
Finally …
9
Key Obligations of an Organization
• A29 Advice
• “employers should always bear in mind the fundamental data
protection principles, irrespective of the technology used;
• consent is highly unlikely to be a legal basis for data
processing at work, unless employees can refuse without
adverse consequence;
• the contents of electronic communications made from
business premises enjoy the same fundamental rights
protections as analogue communications;
• employees should receive effective information about the
monitoring that takes place; and
• any international transfer of employee data should take place
only where an adequate level of protection is ensured.”
10
Employers Must:
• A29 Advice
• “ensure that data is processed for specified and legitimate purposes that are
proportionate and necessary;
• take into account the principle of purpose limitation, while making sure that the data
are adequate, relevant and not excessive for the legitimate purpose;
• apply the principles of proportionality and subsidiarity regardless of the applicable
legal ground;
• be transparent with employees about the use and purposes of monitoring
technologies;
• enable the exercise of data subject rights, including the rights of access and, as
appropriate, the rectification, erasure or blocking of personal data;
• keep the data accurate, and not retain them any longer than necessary; and
• take all necessary measures to protect the data against unauthorised access and
• ensure that staff are sufficiently aware of data protection obligations.”
11
Typical Reactions
• Fiction: “This is just administration so doesn’t
concern me”
• Fact: This is part of the professional
responsibilities
• Fiction: “OK, I will do it and then I can forget about it”
• Fact: This is an ongoing and continual process
• Fiction: “Just tell me what to do so I don’t have to
think about it”
• Fact: Privacy considerations have to become part
of the culture as simple prescriptions for all
possible situations are not possible.
12
Monitoring
• Principles
• Employees must be informed of the existence of any monitoring, the purposes for which
personal data are to be processed and any other information necessary to guarantee fair
processing. (Necessary but not in itself sufficient)
• Data collected that includes personal data should be for a specific legitimate purpose.
• Monitoring data should be anonymised by default.
• A29 Advice on limitations to monitoring
• “geographical (e.g. monitoring only in specific places; monitoring sensitive areas such as
religious places and for example sanitary zones and break rooms should be prohibited),
• data-oriented (e.g. personal electronic files and communication should not be monitored),
and
• time-related (e.g. sampling instead of continuous monitoring).”
• Blocking is better than monitoring
• Questions
• Are you handling this appropriately?
• Are you “over-collecting” data with the risk of “further processing”?
• How will you separate personal and work-related data?
• Do you have a clear IT monitoring policy with appropriate safeguards?
13
Storage
• Principles
• Ensure that data are not accidentally processed.
• Ensure that deleted data stays deleted
• A29
• “It should be ensured that employees can designate certain
private spaces to which the employer may not gain access
unless under exceptional circumstances.”
• Some Questions
• Are all services where personal data are stored “fit for purpose”?
• Can you demonstrate adequate technical measures? (ISO27001)
• What are you policies for different classes of data on automatic
deletion?
14
End-user devices
• Principles
• Do not process non-work related personal data on devices
allowed for private use, or in a private context (home).
• A29
• “Select the most privacy protecting defaults”
• Provide (acceptable use) policies. “This allows employees
to adapt their behaviour to prevent being monitored when
they legitimately use IT work facilities for private use”
• Some Questions
• Do you have sufficient measures to allow for truly private
use of facilities? (Laptops, Network, Storage etc)
• Are you offering enough advice on the use of IT facilities?
15
Typical and generic problems
• Collecting too much data - violates data minimisation
• Because you have a single “Web form”
• Using unsecured transfer mechanisms - violates appropriate technical
measures
• Email
• Processing data without controls - violates appropriate organisational
measures
• Excel spreadsheets, Laptops etc.
• Personal Data kept because it “might be useful” - violates retention
periods.
• Archives
• Data stored on other services (internal and external) without privacy
protecting agreements - violates appropriate safeguards.
• Almost every storage system or platform
16
Finally, 5 things to do
1. Know where you are processing
• Data mapping
2. Know what you are doing
• Privacy notices
3. Know why you are doing it
• Internal review of processing operations
4. Know how you are doing is correct
• Technical measures and controls
5. Know when you should stop doing it
• Retention periods
17
Good Luck!
18
Facebooks has put together: “the largest cross functional team”
comprising “senior executives from all product teams, designers
and user experience/testing executives, policy executives, legal
executives and executives from each of the Facebook family of
companies”.
“Dozens of people at Facebook Ireland are working full time on this
effort,” it said, noting too that the data protection team at its
European HQ (in Dublin, Ireland) would be growing by 250% in
2017.
Source: https://techcrunch.com/2018/01/20/wtf-is-gdpr/

More Related Content

PPTX
Cloud computing - When is Deletion Deletion?
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PPT
Your Employees and Information Security
PPTX
Privacy: The New Software Development Dilemma
PPT
DPA seminar presentation
PPTX
Prepare Your Firm for GDPR
PDF
CISSP Prep: Ch 3. Asset Security
PPTX
Privacy experience in Plone and other open source CMS
Cloud computing - When is Deletion Deletion?
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Your Employees and Information Security
Privacy: The New Software Development Dilemma
DPA seminar presentation
Prepare Your Firm for GDPR
CISSP Prep: Ch 3. Asset Security
Privacy experience in Plone and other open source CMS

What's hot (20)

PDF
2. Asset Security
PDF
3. Security Engineering
PPT
Privacy, Security & Access to Data
PPTX
Umphrey hutcherson-ecu-cause2010-rev5
PPTX
Privacy by Design: White Papaer
PDF
GDPR for your Payroll Bureau
PPTX
Employee monitoring updated
PPTX
CISSP - Chapter 2 - Asset Security
PPTX
Introduction to Health Informatics Ch11 power point
PPTX
Privacy by Design - taking in account the state of the art
PDF
1. Security and Risk Management
PDF
PDF
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
PPTX
Steal This Data - Email Security and DLP
PDF
3GRC approach to GDPR V 0.1 www.3grc.co.uk
PDF
GDPR and ISO27001 mapping EL
PPTX
Digital Preservation Discussion Group
PPTX
Advantage ppt data breaches km approved - final (djm notes)
PDF
GDPR for Non-European Region - Financial Services EL
2. Asset Security
3. Security Engineering
Privacy, Security & Access to Data
Umphrey hutcherson-ecu-cause2010-rev5
Privacy by Design: White Papaer
GDPR for your Payroll Bureau
Employee monitoring updated
CISSP - Chapter 2 - Asset Security
Introduction to Health Informatics Ch11 power point
Privacy by Design - taking in account the state of the art
1. Security and Risk Management
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
Steal This Data - Email Security and DLP
3GRC approach to GDPR V 0.1 www.3grc.co.uk
GDPR and ISO27001 mapping EL
Digital Preservation Discussion Group
Advantage ppt data breaches km approved - final (djm notes)
GDPR for Non-European Region - Financial Services EL
Ad

Similar to CERN 5 Things you should know about Data Protection (20)

PDF
GDPR webinar for business leaders
PDF
The principles of the Data Protection Act in detail - uk
PDF
data-privacy-egypt-what-you-need-know-en.pdf
PPT
Data privacy & social media
PDF
Data Privacy Program – a customized solution for the new EU General Regulatio...
PPTX
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
PDF
data privacy handbook: A starter guide to data privacy compliance
PDF
Prep your app for gdpr compliance
PPTX
3A – DATA PROTECTION: ADVICE
 
PDF
1307 Privacy Act
PPT
Personal privacy and computer technologies
PDF
Employment and Labour Law Seminar - June 13, 2013
PDF
GDPR for your Payroll Bureau
PDF
Personal Data Protection Singapore - Pdpc corporate-brochure
PPTX
Data protection training emea new joiners. mandatory quiz
PPTX
What does GDPR mean for your business?
PPTX
Charity Law Updates for 2018: Making the Most of Change
PPT
Legal And Regulatory Dp Challenges For The Financial Services Sector
PPTX
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR webinar for business leaders
The principles of the Data Protection Act in detail - uk
data-privacy-egypt-what-you-need-know-en.pdf
Data privacy & social media
Data Privacy Program – a customized solution for the new EU General Regulatio...
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
data privacy handbook: A starter guide to data privacy compliance
Prep your app for gdpr compliance
3A – DATA PROTECTION: ADVICE
 
1307 Privacy Act
Personal privacy and computer technologies
Employment and Labour Law Seminar - June 13, 2013
GDPR for your Payroll Bureau
Personal Data Protection Singapore - Pdpc corporate-brochure
Data protection training emea new joiners. mandatory quiz
What does GDPR mean for your business?
Charity Law Updates for 2018: Making the Most of Change
Legal And Regulatory Dp Challenges For The Financial Services Sector
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
Ad

More from EUDAT (20)

PDF
EUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
PDF
EUDAT Booklet Mar22 (2).pdf
PDF
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
PDF
EUDAT Brochure - B2HANDLE.pdf
PDF
EUDAT Brochure - B2DROP.pdf
PDF
EUDAT Brochure - B2SHARE.pdf
PDF
EUDAT Brochure - B2SAFE.pdf
PDF
EUDAT Brochure - B2FIND(1).pdf
PDF
EUDAT Brochure - B2ACCESS.pdf
PDF
Rob Carrillo - Writing effective service documentation for EUDAT services
PDF
Ariyo - EUDAT CDI B2 services documentation
PDF
Introduction to eudat and its services
PPTX
Using B2NOTE: The U.Porto Pilot
PPT
OpenAIRE Advance - Kick off last week
PPT
European Open Science Cloud - Skills workshop
PPT
Linking service capabilities to data stweardship competences for professional...
PPT
FAIRness of training materials
PPT
Training by EOSC-hub - Integrating and Managing services for the European Ope...
PDF
Draft Governance Framework for the EOSC
PDF
Building Interoperable AAI for Researchers
EUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
EUDAT Booklet Mar22 (2).pdf
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
EUDAT Brochure - B2HANDLE.pdf
EUDAT Brochure - B2DROP.pdf
EUDAT Brochure - B2SHARE.pdf
EUDAT Brochure - B2SAFE.pdf
EUDAT Brochure - B2FIND(1).pdf
EUDAT Brochure - B2ACCESS.pdf
Rob Carrillo - Writing effective service documentation for EUDAT services
Ariyo - EUDAT CDI B2 services documentation
Introduction to eudat and its services
Using B2NOTE: The U.Porto Pilot
OpenAIRE Advance - Kick off last week
European Open Science Cloud - Skills workshop
Linking service capabilities to data stweardship competences for professional...
FAIRness of training materials
Training by EOSC-hub - Integrating and Managing services for the European Ope...
Draft Governance Framework for the EOSC
Building Interoperable AAI for Researchers

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”

CERN 5 Things you should know about Data Protection

  • 2. 5 things you should know about Data Protection 2 David Foster Head of Data Privacy Protection January 2018
  • 3. Opening Sing-along My personal data are mine To abuse them is a crime You cannot share You must take care Or risk a hefty fine 3 David Foster 2018
  • 4. 1. My Personal data are mine • Personal data belong to the individual • They are not yours to use as you see fit, not even if they are public! • Fair processing • Legitimate Basis (hint: consent is a problem) • Specific Purpose • Privacy notices should declare what, how and why data are processed • One is unlikely to be enough! • One notice for each independent service. • Data Protection Impact Assessments (DPIA) may be needed. 4
  • 5. 2. To abuse them is a crime • The scope of personal data is wide • Attributes, Photos, Electronic Identifiers …. • The scope of processing is broad • Analysing, Copying, Viewing …. • This is complex to communicate inside an organisation • Internal training • Internal policies • Accountability • It may help to consolidate processes and infrastructure • Approved storage systems • Managed internal transfers • Be wary of automated decision making and profiling 5
  • 6. 3. You cannot share • Without safeguards because privacy travels with the data • Responsibility rests with the controller • Contracts, codes of conduct, binding corporate rules • Records of transfers • Extra-territorial reach • This may be a difficult culture change within organisations used to freely sharing personal data • Complexity may increase with ePrivacy 6
  • 7. 4. You must take care • You need to look after other peoples data • Appropriate organisational and technical measures • Risks with unnecessary data retention • ISO27001 for data security and handling is a good starting point • Individuals have rights to their data you are processing (even if not absolute rights) • Must be clear mechanisms to exercise the 8 basic rights, which should be in the privacy notice • Privacy by default and by design • Anonymise or pseudonymise 7
  • 8. 5. Or risk a hefty fine • Its all about managing risk • “Compliance”, per-se, does not exist • Fines can be large depending on the infraction • Violation of principles carry the larger fine • Mitigation of risk of large fines • A demonstrable attempt at implementing the legislative requirements • Internal Training, Policies, Accountability, Management Commitment • Having a DPO and accepting their advice 8
  • 10. Key Obligations of an Organization • A29 Advice • “employers should always bear in mind the fundamental data protection principles, irrespective of the technology used; • consent is highly unlikely to be a legal basis for data processing at work, unless employees can refuse without adverse consequence; • the contents of electronic communications made from business premises enjoy the same fundamental rights protections as analogue communications; • employees should receive effective information about the monitoring that takes place; and • any international transfer of employee data should take place only where an adequate level of protection is ensured.” 10
  • 11. Employers Must: • A29 Advice • “ensure that data is processed for specified and legitimate purposes that are proportionate and necessary; • take into account the principle of purpose limitation, while making sure that the data are adequate, relevant and not excessive for the legitimate purpose; • apply the principles of proportionality and subsidiarity regardless of the applicable legal ground; • be transparent with employees about the use and purposes of monitoring technologies; • enable the exercise of data subject rights, including the rights of access and, as appropriate, the rectification, erasure or blocking of personal data; • keep the data accurate, and not retain them any longer than necessary; and • take all necessary measures to protect the data against unauthorised access and • ensure that staff are sufficiently aware of data protection obligations.” 11
  • 12. Typical Reactions • Fiction: “This is just administration so doesn’t concern me” • Fact: This is part of the professional responsibilities • Fiction: “OK, I will do it and then I can forget about it” • Fact: This is an ongoing and continual process • Fiction: “Just tell me what to do so I don’t have to think about it” • Fact: Privacy considerations have to become part of the culture as simple prescriptions for all possible situations are not possible. 12
  • 13. Monitoring • Principles • Employees must be informed of the existence of any monitoring, the purposes for which personal data are to be processed and any other information necessary to guarantee fair processing. (Necessary but not in itself sufficient) • Data collected that includes personal data should be for a specific legitimate purpose. • Monitoring data should be anonymised by default. • A29 Advice on limitations to monitoring • “geographical (e.g. monitoring only in specific places; monitoring sensitive areas such as religious places and for example sanitary zones and break rooms should be prohibited), • data-oriented (e.g. personal electronic files and communication should not be monitored), and • time-related (e.g. sampling instead of continuous monitoring).” • Blocking is better than monitoring • Questions • Are you handling this appropriately? • Are you “over-collecting” data with the risk of “further processing”? • How will you separate personal and work-related data? • Do you have a clear IT monitoring policy with appropriate safeguards? 13
  • 14. Storage • Principles • Ensure that data are not accidentally processed. • Ensure that deleted data stays deleted • A29 • “It should be ensured that employees can designate certain private spaces to which the employer may not gain access unless under exceptional circumstances.” • Some Questions • Are all services where personal data are stored “fit for purpose”? • Can you demonstrate adequate technical measures? (ISO27001) • What are you policies for different classes of data on automatic deletion? 14
  • 15. End-user devices • Principles • Do not process non-work related personal data on devices allowed for private use, or in a private context (home). • A29 • “Select the most privacy protecting defaults” • Provide (acceptable use) policies. “This allows employees to adapt their behaviour to prevent being monitored when they legitimately use IT work facilities for private use” • Some Questions • Do you have sufficient measures to allow for truly private use of facilities? (Laptops, Network, Storage etc) • Are you offering enough advice on the use of IT facilities? 15
  • 16. Typical and generic problems • Collecting too much data - violates data minimisation • Because you have a single “Web form” • Using unsecured transfer mechanisms - violates appropriate technical measures • Email • Processing data without controls - violates appropriate organisational measures • Excel spreadsheets, Laptops etc. • Personal Data kept because it “might be useful” - violates retention periods. • Archives • Data stored on other services (internal and external) without privacy protecting agreements - violates appropriate safeguards. • Almost every storage system or platform 16
  • 17. Finally, 5 things to do 1. Know where you are processing • Data mapping 2. Know what you are doing • Privacy notices 3. Know why you are doing it • Internal review of processing operations 4. Know how you are doing is correct • Technical measures and controls 5. Know when you should stop doing it • Retention periods 17
  • 18. Good Luck! 18 Facebooks has put together: “the largest cross functional team” comprising “senior executives from all product teams, designers and user experience/testing executives, policy executives, legal executives and executives from each of the Facebook family of companies”. “Dozens of people at Facebook Ireland are working full time on this effort,” it said, noting too that the data protection team at its European HQ (in Dublin, Ireland) would be growing by 250% in 2017. Source: https://techcrunch.com/2018/01/20/wtf-is-gdpr/