SlideShare a Scribd company logo
Ilias Chantzos
Senior Director EMEA & APJ Government Affairs
GDPR Breach
Notification:
Demystifying What
the Regulators Want
GDPR Breach Notification:
Demystifying What the Regulators Want
• Not a finish line, just the start!
• A marathon, not a sprint
• Security vs Privacy at the
strategic level
What’s So Important Now That the Deadline Has Passed?
GDPR Breach Notification:
Demystifying What the Regulators Want
Article 32 in GDPR Reads
- Security of processing -
Taking into account the state of the art, the costs of implementation and the nature, scope,
context and purposes of processing as well as the risk of varying likelihood and severity for the
rights and freedoms of natural persons, the controller and the processor shall implement
appropriate technical and organisational measures to ensure a level of security appropriate to the
risk, including inter alia as appropriate:
(a) the pseudonymisation and encryption of personal data
(b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of
processing systems and services;
(c) the ability to restore the availability and access to personal data in a timely manner in the
event of a physical or technical incident;
(d) a process for regularly testing, assessing and evaluating the effectiveness of technical and
organisational measures for ensuring the security of the processing.
Cybersecurity is a Basic Principle in GDPR
GDPR Breach Notification:
Demystifying What the Regulators Want
“State of the Art”: Finding the ‘Goldilocks’ Technologies
Need to balance innovation with degree of confidence that the
technology will be robust enough to deliver on its promises
! “State of the Art” - a term used, but not defined in GDPR…
Mature
“Goldilocks” zone
Bleeding Edge
GDPR Breach Notification:
Demystifying What the Regulators Want
• How to define risk?
• Assessment of risk – Change over time
• Likelihood
• Consequence
• What is the likely threat – Evolution of landscape
• Criminal
• State
• Political
• Internal/External
• What type of data
• What type of processing
• Where is the data?
• Accept/Transfer/Mitigate?
Appropriate to the risk
GDPR Breach Notification:
Demystifying What the Regulators Want
The Regulatory Terms Of Reference
Article 4 Paragraph 12: THE BREACH
What can happen to data?
“… a breach of security leading to the
accidental or unlawful destruction, loss,
alteration, unauthorised disclosure of, or
access to, personal data transmitted,
stored or otherwise processed”
Recital 75: THE IMPACT
What can happen to the data subject?
“The risk to the rights and freedoms of
natural persons, of varying likelihood and
severity, may result from personal data
processing which could lead to physical,
material or non-material damage”
GDPR / DPA EXPECTATION:
Anticipate, Avoid, Mitigate, Compensate
GDPR / DPA REQUIREMENT:
Prevent, Detect, Log, Report, Remedy
GDPR Breach Notification:
Demystifying What the Regulators Want
GDPR and “Internal” Tensions: The Role of Realistic Guidance
Security
• Cannot rely on consent
• Monitoring of the environment
• Detection of a breach
• Adequate assessment of risk
• Adequate conclusions allowing
notification
• Timely deployment of
countermeasures/patches
• Encryption
Privacy of Employees
• Transparency of security
measures/monitoring
• Minimizing invasiveness of monitoring
• Incident response and access to
information
• Retention duration of records/log files
• Consultation/notification of employees
• Encryption
GDPR Breach Notification:
Demystifying What the Regulators Want
Related Articles 4(12), 33(1, 5), 34(1)
Types of personal data breaches:
• “Confidentiality breach”
• “Integrity breach”
• “Availability breach”
Consequence : The controller will be unable to ensure compliance
I. Principles of Breach Notification
GDPR Breach Notification:
Demystifying What the Regulators Want
Breach detection:
• Identify: When does a controller become “aware”?
• Speed is of essence to reduce the risk
• Assess: (High or Very-High Risk)  Implications
• Notify: Who and within which deadlines (e.g. 72h)
• Time to establish if personal data have been
compromised is crucial.
Key DPO role:
• Providing data protection advice and information to the
controller or processor
• Monitoring compliance with the GDPR
• Providing advice in relation to DPIAs
• Communicate with the DPA
II. Notification to the Supervisory Authority
GDPR Breach Notification:
Demystifying What the Regulators Want
The notification must:
a) Describe the nature of the personal data breach
including the categories and number of data
subjects concerned and the categories and
number of data records concerned;
b) Recommend measures to mitigate the possible
adverse effects of the personal data breach;
c) Describe the consequences of the personal data
breach;
d) Describe the measures proposed or taken by the
controller to address the personal data breach.
II. What Should Be in the Notification to the DPA?
GDPR Breach Notification:
Demystifying What the Regulators Want
• Clear and plain language
• Nature of the personal data breach
• Measures to mitigate its possible adverse effects
Communication not required if unlikely high-risk:
• Deployed technical and organisational measures
• E.g. Personal data unintelligible
• If a controller decides not to communicate a breach, or does so with delay:
• Should be demonstrably well founded
• Failure to do so might cause sanctions (€10M or 2% of global turnover)
• The DPA can still require a communication to be issued
• Accountability
III. Communication to Data Subjects
GDPR Breach Notification:
Demystifying What the Regulators Want
• Notification of controller by processor without assessing risk
• Partial notification is possible….
• Immediate detection of breach (Recital 87) and
technical/organizational consequences
• Planned system outage is not a breach
• Take into account interest of law enforcement investigation in
cases of disclosure to data subjects (Recital 88) – Relevant for
non-EU LEA
• No retention requirements by GDPR – Incumbent upon the
controller to keep data about the incident
• Joint controllership should foresee also in a controller taking
the lead for notification purposes
Some Technical Considerations
GDPR Breach Notification:
Demystifying What the Regulators Want
“The occurrence of several different infringements committed
together in any particular single case means that the supervisory
authority is able to apply the administrative fines at a level which
is effective, proportionate and dissuasive within the limit of
the gravest infringement”
GDPR Breach Notification:
Demystifying What the Regulators Want
What is the Difference Between On-premise & Cloud?
None in terms of the security requirements
But do you have the same visibility and control
over data in the cloud?
GDPR Breach Notification:
Demystifying What the Regulators Want
Brexit UK Government Positions
• UK law
• Data transfer impact
• Subcontractor clause
• Direct application of EU law by doing
business in Europe
• A “UK Privacy Shield” necessitated by
the Investigatory Powers Act?
• Human Rights convention and
adequacy
What About BREXIT?
Any company that works with information
relating to individuals in the EU will have to
comply with the requirements of the GDPR
GDPR Breach Notification:
Demystifying What the Regulators Want
Breaches Across Multiple Locations or Jurisdictions
• Data concerning
different nationals
within the EU
• Data within different
locations
• Data held by
different processors
/ cloud operators
• Lead DPA?
• National DPA?
• Who is your
regulator?
Different scenarios Who to notify? How is the
investigation likely
to happen?
What is the likely
risk?
GDPR Breach Notification:
Demystifying What the Regulators Want
Use Cases
Supporting GDPR Across
Data Privacy & Security
How Can
Technology
Help?
Advanced Breach Detection, Remediation, & Notification
ATP
Analytics
Endpoint
Email
Server
Web /
CASB
Cyber Security
Services
DLP
CASB
Web
CDPEncryption
Personal Data Protection Everywhere
VIP
Technology Risk Management
DLP
Data Insight
CASB
Audit
CCS
EPM
Understand
Data Risk
Understand,
Report, and
Remediate
Compliance
Unparalleled Threat Intelligence
Endpoint
175M
endpoints
protected
Email
2Bm emails
scanned/day
Web
1.2Bn web
requests
secured/day
Physical & Virtual
Workloads
64K
Datacenters
protected
Cloud
Security
12,000 cloud
applications
secured
PROTECTDETECTRESPONDPREPARE
GDPR Breach Notification:
Demystifying What the Regulators Want
Use Case 3
Minimising Risk in Case
of a Breach
o General Risk Assessment
o Risk of Breach of Sensitive
Data, Professional Secrecy
o Risk of Identity Theft or
Fraud
Relevant GDPR Articles:
o Article 5(2)
o Article 24
o Recitals 74, 77, 78, 82
o Article 32(1d)
How Can
Technology
Help?
Advanced Breach Detection, Remediation, & Notification
ATP
Analytics
Endpoint
Email
Server
Web /
CASB
Cyber Security
Services
DLP
CASB
Web
CDPEncryption
Personal Data Protection Everywhere
VIP
Technology Risk Management
DLP
Data Insight
CASB
Audit
CCS
EPM
Understand
Data Risk
Understand,
Report, and
Remediate
Compliance
PROTECTDETECTRESPONDPREPARE
Unparalleled Threat Intelligence
Endpoint
175M
endpoints
protected
Email
2Bm emails
scanned/day
Web
1.2Bn web
requests
secured/day
Physical & Virtual
Workloads
64K
Datacenters
protected
Cloud
Security
12,000 cloud
applications
secured
GDPR Breach Notification:
Demystifying What the Regulators Want
Legislative and Standards Landscape
Regulatory Level
General Data Protection Regulation (GDPR)
All Industries Holding Personal Data
Network Information Security Directive (NISD) a.k.a. Cyber Directive
Critical National Infrastructure: Financial Services; Energy; Water; Food; Transport; Health; Government; and Emergency Services
National LevelDPA 10 Steps Cyber Essentials FTSE 350 Cyber CREST
Industry LevelFinancial Services
CBEST / FCA / PRA
PCI / PSD
MAS / Swiss / Lux
Energy / Utilities
Health and Safety
CPNI
PCI / DSS
Technical Standards
ISO 27001 ISO 27005 ISO 27018 COBIT
GDPR Breach Notification:
Demystifying What the Regulators Want
• Train people
• Establish protocols
• Exercise
• Look at your contracts
• Look who you are doing business with
• Manage your risk lifecycle properly (threats, risks, technology, organization)
• Then consider how your technology investments can help you already and
where you need to invest/develop further
• GDPR does not start or end with tech but tech can help you start with GDPR
It’s Not Just About Technology
GDPR Breach Notification:
Demystifying What the Regulators Want
Plan wisely, implementation may take longer than you think
Engage with your board, report on progress in addressing data privacy via your
security program
Identify skill & knowledge gaps to determine when to bring in external
partners and which ones
Explain the risk and treat it as an opportunity to build the business case and
drive the investment you need to mitigate the risk
Define a well-documented breach notification process first, and then identify
technology that can help with breach detection, resolution, and notification
Key Takeaways
GDPR Breach Notification:
Demystifying What the Regulators Want
THANK YOU

More Related Content

PPTX
How your nonprofit can avoid data breaches and ensure privacy
PPTX
General Data Protection Regulation (GDPR)
PPTX
Robert Nichols: Cybersecurity for Government Contractors
PDF
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
PPTX
EU's General Data Protection Regulation (GDPR)
PPTX
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
PDF
The Legal Case for Cybersecurity
PDF
Legal Issues Associated with Third-Party Cyber Risk
How your nonprofit can avoid data breaches and ensure privacy
General Data Protection Regulation (GDPR)
Robert Nichols: Cybersecurity for Government Contractors
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
EU's General Data Protection Regulation (GDPR)
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
The Legal Case for Cybersecurity
Legal Issues Associated with Third-Party Cyber Risk

What's hot (20)

PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
A guide to Sustainable Cyber Security
PPTX
Legal obligations and responsibilities of data processors and controllers und...
PDF
PPTX
New Security Legislation & Its Implications for OSS Management
PPTX
New Security Legislation and its Implications for OSS Management
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PPT
Data Security For Compliance 2
PPTX
Siskinds | Incident Response Plan
PDF
7 Key GDPR Requirements & the Role of Data Governance
PPT
Cloud Computing Legal Risks And Best Practices
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PDF
Data Privacy & Security
PDF
Widepoint orc thales webinar 111313d - nov 2013
PPTX
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
PDF
Impact of GDPR on Third Party and M&A Security
PPTX
Presentation for FPANJ Spring 2015 Conference
PDF
Six Degrees: Securing your business data - Nov 29 2018
PDF
Flight East 2018 Presentation–Data Breaches and the Law
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
A guide to Sustainable Cyber Security
Legal obligations and responsibilities of data processors and controllers und...
New Security Legislation & Its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Data Security For Compliance 2
Siskinds | Incident Response Plan
7 Key GDPR Requirements & the Role of Data Governance
Cloud Computing Legal Risks And Best Practices
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Data Privacy & Security
Widepoint orc thales webinar 111313d - nov 2013
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Impact of GDPR on Third Party and M&A Security
Presentation for FPANJ Spring 2015 Conference
Six Degrees: Securing your business data - Nov 29 2018
Flight East 2018 Presentation–Data Breaches and the Law
Cross border - off-shoring and outsourcing privacy sensitive data
Ad

Similar to GDPR Breach Notification Demystifying What the Regulators Want (20)

PPTX
General Data Protection Regulation (GDPR)
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
Splunk: How Machine Data Supports GDPR Compliance
PPT
The Countdown is on: Key Things to Know About the GDPR
PPTX
The general data protection act overview
PPTX
GDPR for Security Professionals
PPTX
Data Privacy for Information Security Professionals Part 1
PDF
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
PDF
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
PDF
eu-market-access-gdpr-fundamentals-by-risk-associates
PPTX
Gdpr action plan - ISSA
PPTX
My presentation- Ala about privacy and GDPR
PPTX
GDPR Benefits and a Technical Overview
PDF
Mind Your Business: Why Privacy Matters to the Successful Enterprise
PDF
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
PDF
GDPR 11/1/2017
PPT
New Security Legislation & It's Implications for OSS Management
PPTX
Practical Guide to GDPR 2017
PDF
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
PPTX
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
General Data Protection Regulation (GDPR)
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Splunk: How Machine Data Supports GDPR Compliance
The Countdown is on: Key Things to Know About the GDPR
The general data protection act overview
GDPR for Security Professionals
Data Privacy for Information Security Professionals Part 1
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
eu-market-access-gdpr-fundamentals-by-risk-associates
Gdpr action plan - ISSA
My presentation- Ala about privacy and GDPR
GDPR Benefits and a Technical Overview
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
GDPR 11/1/2017
New Security Legislation & It's Implications for OSS Management
Practical Guide to GDPR 2017
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Tartificialntelligence_presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
Group 1 Presentation -Planning and Decision Making .pptx
Programs and apps: productivity, graphics, security and other tools
Assigned Numbers - 2025 - Bluetooth® Document
Advanced methodologies resolving dimensionality complications for autism neur...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Network Security Unit 5.pdf for BCA BBA.
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx

GDPR Breach Notification Demystifying What the Regulators Want

  • 1. Ilias Chantzos Senior Director EMEA & APJ Government Affairs GDPR Breach Notification: Demystifying What the Regulators Want
  • 2. GDPR Breach Notification: Demystifying What the Regulators Want • Not a finish line, just the start! • A marathon, not a sprint • Security vs Privacy at the strategic level What’s So Important Now That the Deadline Has Passed?
  • 3. GDPR Breach Notification: Demystifying What the Regulators Want Article 32 in GDPR Reads - Security of processing - Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing. Cybersecurity is a Basic Principle in GDPR
  • 4. GDPR Breach Notification: Demystifying What the Regulators Want “State of the Art”: Finding the ‘Goldilocks’ Technologies Need to balance innovation with degree of confidence that the technology will be robust enough to deliver on its promises ! “State of the Art” - a term used, but not defined in GDPR… Mature “Goldilocks” zone Bleeding Edge
  • 5. GDPR Breach Notification: Demystifying What the Regulators Want • How to define risk? • Assessment of risk – Change over time • Likelihood • Consequence • What is the likely threat – Evolution of landscape • Criminal • State • Political • Internal/External • What type of data • What type of processing • Where is the data? • Accept/Transfer/Mitigate? Appropriate to the risk
  • 6. GDPR Breach Notification: Demystifying What the Regulators Want The Regulatory Terms Of Reference Article 4 Paragraph 12: THE BREACH What can happen to data? “… a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed” Recital 75: THE IMPACT What can happen to the data subject? “The risk to the rights and freedoms of natural persons, of varying likelihood and severity, may result from personal data processing which could lead to physical, material or non-material damage” GDPR / DPA EXPECTATION: Anticipate, Avoid, Mitigate, Compensate GDPR / DPA REQUIREMENT: Prevent, Detect, Log, Report, Remedy
  • 7. GDPR Breach Notification: Demystifying What the Regulators Want GDPR and “Internal” Tensions: The Role of Realistic Guidance Security • Cannot rely on consent • Monitoring of the environment • Detection of a breach • Adequate assessment of risk • Adequate conclusions allowing notification • Timely deployment of countermeasures/patches • Encryption Privacy of Employees • Transparency of security measures/monitoring • Minimizing invasiveness of monitoring • Incident response and access to information • Retention duration of records/log files • Consultation/notification of employees • Encryption
  • 8. GDPR Breach Notification: Demystifying What the Regulators Want Related Articles 4(12), 33(1, 5), 34(1) Types of personal data breaches: • “Confidentiality breach” • “Integrity breach” • “Availability breach” Consequence : The controller will be unable to ensure compliance I. Principles of Breach Notification
  • 9. GDPR Breach Notification: Demystifying What the Regulators Want Breach detection: • Identify: When does a controller become “aware”? • Speed is of essence to reduce the risk • Assess: (High or Very-High Risk)  Implications • Notify: Who and within which deadlines (e.g. 72h) • Time to establish if personal data have been compromised is crucial. Key DPO role: • Providing data protection advice and information to the controller or processor • Monitoring compliance with the GDPR • Providing advice in relation to DPIAs • Communicate with the DPA II. Notification to the Supervisory Authority
  • 10. GDPR Breach Notification: Demystifying What the Regulators Want The notification must: a) Describe the nature of the personal data breach including the categories and number of data subjects concerned and the categories and number of data records concerned; b) Recommend measures to mitigate the possible adverse effects of the personal data breach; c) Describe the consequences of the personal data breach; d) Describe the measures proposed or taken by the controller to address the personal data breach. II. What Should Be in the Notification to the DPA?
  • 11. GDPR Breach Notification: Demystifying What the Regulators Want • Clear and plain language • Nature of the personal data breach • Measures to mitigate its possible adverse effects Communication not required if unlikely high-risk: • Deployed technical and organisational measures • E.g. Personal data unintelligible • If a controller decides not to communicate a breach, or does so with delay: • Should be demonstrably well founded • Failure to do so might cause sanctions (€10M or 2% of global turnover) • The DPA can still require a communication to be issued • Accountability III. Communication to Data Subjects
  • 12. GDPR Breach Notification: Demystifying What the Regulators Want • Notification of controller by processor without assessing risk • Partial notification is possible…. • Immediate detection of breach (Recital 87) and technical/organizational consequences • Planned system outage is not a breach • Take into account interest of law enforcement investigation in cases of disclosure to data subjects (Recital 88) – Relevant for non-EU LEA • No retention requirements by GDPR – Incumbent upon the controller to keep data about the incident • Joint controllership should foresee also in a controller taking the lead for notification purposes Some Technical Considerations
  • 13. GDPR Breach Notification: Demystifying What the Regulators Want “The occurrence of several different infringements committed together in any particular single case means that the supervisory authority is able to apply the administrative fines at a level which is effective, proportionate and dissuasive within the limit of the gravest infringement”
  • 14. GDPR Breach Notification: Demystifying What the Regulators Want What is the Difference Between On-premise & Cloud? None in terms of the security requirements But do you have the same visibility and control over data in the cloud?
  • 15. GDPR Breach Notification: Demystifying What the Regulators Want Brexit UK Government Positions • UK law • Data transfer impact • Subcontractor clause • Direct application of EU law by doing business in Europe • A “UK Privacy Shield” necessitated by the Investigatory Powers Act? • Human Rights convention and adequacy What About BREXIT? Any company that works with information relating to individuals in the EU will have to comply with the requirements of the GDPR
  • 16. GDPR Breach Notification: Demystifying What the Regulators Want Breaches Across Multiple Locations or Jurisdictions • Data concerning different nationals within the EU • Data within different locations • Data held by different processors / cloud operators • Lead DPA? • National DPA? • Who is your regulator? Different scenarios Who to notify? How is the investigation likely to happen? What is the likely risk?
  • 17. GDPR Breach Notification: Demystifying What the Regulators Want Use Cases Supporting GDPR Across Data Privacy & Security How Can Technology Help? Advanced Breach Detection, Remediation, & Notification ATP Analytics Endpoint Email Server Web / CASB Cyber Security Services DLP CASB Web CDPEncryption Personal Data Protection Everywhere VIP Technology Risk Management DLP Data Insight CASB Audit CCS EPM Understand Data Risk Understand, Report, and Remediate Compliance Unparalleled Threat Intelligence Endpoint 175M endpoints protected Email 2Bm emails scanned/day Web 1.2Bn web requests secured/day Physical & Virtual Workloads 64K Datacenters protected Cloud Security 12,000 cloud applications secured PROTECTDETECTRESPONDPREPARE
  • 18. GDPR Breach Notification: Demystifying What the Regulators Want Use Case 3 Minimising Risk in Case of a Breach o General Risk Assessment o Risk of Breach of Sensitive Data, Professional Secrecy o Risk of Identity Theft or Fraud Relevant GDPR Articles: o Article 5(2) o Article 24 o Recitals 74, 77, 78, 82 o Article 32(1d) How Can Technology Help? Advanced Breach Detection, Remediation, & Notification ATP Analytics Endpoint Email Server Web / CASB Cyber Security Services DLP CASB Web CDPEncryption Personal Data Protection Everywhere VIP Technology Risk Management DLP Data Insight CASB Audit CCS EPM Understand Data Risk Understand, Report, and Remediate Compliance PROTECTDETECTRESPONDPREPARE Unparalleled Threat Intelligence Endpoint 175M endpoints protected Email 2Bm emails scanned/day Web 1.2Bn web requests secured/day Physical & Virtual Workloads 64K Datacenters protected Cloud Security 12,000 cloud applications secured
  • 19. GDPR Breach Notification: Demystifying What the Regulators Want Legislative and Standards Landscape Regulatory Level General Data Protection Regulation (GDPR) All Industries Holding Personal Data Network Information Security Directive (NISD) a.k.a. Cyber Directive Critical National Infrastructure: Financial Services; Energy; Water; Food; Transport; Health; Government; and Emergency Services National LevelDPA 10 Steps Cyber Essentials FTSE 350 Cyber CREST Industry LevelFinancial Services CBEST / FCA / PRA PCI / PSD MAS / Swiss / Lux Energy / Utilities Health and Safety CPNI PCI / DSS Technical Standards ISO 27001 ISO 27005 ISO 27018 COBIT
  • 20. GDPR Breach Notification: Demystifying What the Regulators Want • Train people • Establish protocols • Exercise • Look at your contracts • Look who you are doing business with • Manage your risk lifecycle properly (threats, risks, technology, organization) • Then consider how your technology investments can help you already and where you need to invest/develop further • GDPR does not start or end with tech but tech can help you start with GDPR It’s Not Just About Technology
  • 21. GDPR Breach Notification: Demystifying What the Regulators Want Plan wisely, implementation may take longer than you think Engage with your board, report on progress in addressing data privacy via your security program Identify skill & knowledge gaps to determine when to bring in external partners and which ones Explain the risk and treat it as an opportunity to build the business case and drive the investment you need to mitigate the risk Define a well-documented breach notification process first, and then identify technology that can help with breach detection, resolution, and notification Key Takeaways
  • 22. GDPR Breach Notification: Demystifying What the Regulators Want THANK YOU