SlideShare a Scribd company logo
4
Most read
14
Most read
15
Most read
Using RACI Chart for
GDPR implementation
Andrey Prozorov, CISM, CIPP/E
2020-05-25
2
Andrey Prozorov, CIPP/E, CISM
• Information Security Methodology Manager
• 15 years in information security (12 years in data protection and privacy)
• My Patreon (ISMS and GDPR toolkits) - www.patreon.com/AndreyProzorov
• My blog (in Russian) - http://80na20.blogspot.com
Agenda
• RACI Chart (intro)
• My Case:
• My Data Protection Framework
• My Governance Model
• My GDPR Activities
• My RACI Chart
3
My first contact with RACI chart
2009-2010, COBIT 4.1, example: PO4 Define the IT Processes, Organisation and Relationships
4
Thanks, Wiki!
A responsibility assignment matrix (RAM), also known as RACI matrix
or linear responsibility chart (LRC), describes the participation by
various roles in completing tasks or deliverables for a project or
business process.
RACI is an acronym derived from the four key responsibilities most
typically used: responsible, accountable, consulted, and informed.
It is used for clarifying and defining roles and responsibilities in cross-
functional or departmental projects and processes.
There are a number of alternatives to the RACI model (e.g. RASI, PARIS,
PACSI, DACI, PDQA, RASCEIO)
5
RACI
• Responsible (R): role that performs an activity or does the work.
• Accountable (A): role that is ultimately accountable and has Yes/No/Veto.
Also approver or final approving authority. There must be only one
accountable specified for each task or deliverable.
• Consulted (C): role that helps and advises.
• Informed (I): role that needs to know of the decision or action.
6
Why is it effective?
• Simple and short description
• Adaptable
• Helicopter view (complete list and links)
7
COBIT 2019: APO13 — Managed Security
8
COBIT 2019: APO13 — Managed Security
We have used RACI for the ISMS implementation.
Let’s use it for GDPR compliance… 9
My Case
• Construction and Energy sector
• >250 employees
• EU + Russia
• ISO 9001, ISO 27001…
10
My Data Protection Framework (33 pages)
11
My Data Protection Framework (33 pages)
12
Data Protection Governance Model
Who else?
• Representatives
• Internal Audit
• Risk Manager
• Procurement
• Compliance
• …
13
1. Planning (6) 2. Processing (6)
3. Security (5)
4. Control, Report and
Respond (4)
GDPR
Activities (21)
14
15
16
17
Lessons Learned:
• Choose a suitable level of detail
• Use other examples for inspiration
• Discuss and align everything in advance
• Conduct periodic reviews and update the
chart
Andrey Prozorov, CIPP/E, CISM
• My Patreon (ISMS and GDPR toolkits) -
www.patreon.com/AndreyProzorov
• My blog (in Russian) - http://80na20.blogspot.com
• Email - prozorov.info@gmail.com
Thanks!

More Related Content

PDF
ISO 27001:2022 What has changed.pdf
PPTX
La négociation
PDF
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
PDF
COBIT 2019 Overview_v1.1.pdf
PPTX
Material master data in sap mm
PDF
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
PPTX
Getting your enterprise ready for Microsoft 365 Copilot
PPTX
Privacy & Data Protection
ISO 27001:2022 What has changed.pdf
La négociation
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
COBIT 2019 Overview_v1.1.pdf
Material master data in sap mm
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Getting your enterprise ready for Microsoft 365 Copilot
Privacy & Data Protection

What's hot (20)

PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PDF
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
PPSX
GRC Governance, Risk mgmt. & Compliance Executive
PPTX
ISO 27001 Awareness/TRansition.pptx
PPTX
Iso 27001 isms presentation
PDF
cobit 2019 presentation.pdf
PDF
Why ISO27001 For My Organisation
PPTX
Governance risk and compliance
PPTX
Presentation on GDPR
PPTX
Business continuity management per ISO 22301 - a certification training cour...
PPTX
Iso27001 Audit Services
PDF
Governance Risk Management and Compliance (GRC)
PPTX
All you wanted to know about iso 27000
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
27001 awareness Training
PPTX
Governance, Risk & Compliance Management Solution
PPTX
Basic introduction to iso27001
PPTX
PDF
PDF
ISO 27005:2022 Overview 221028.pdf
IT General Controls Presentation at IIA Vadodara Audit Club
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
GRC Governance, Risk mgmt. & Compliance Executive
ISO 27001 Awareness/TRansition.pptx
Iso 27001 isms presentation
cobit 2019 presentation.pdf
Why ISO27001 For My Organisation
Governance risk and compliance
Presentation on GDPR
Business continuity management per ISO 22301 - a certification training cour...
Iso27001 Audit Services
Governance Risk Management and Compliance (GRC)
All you wanted to know about iso 27000
Cybersecurity roadmap : Global healthcare security architecture
27001 awareness Training
Governance, Risk & Compliance Management Solution
Basic introduction to iso27001
ISO 27005:2022 Overview 221028.pdf
Ad

Similar to GDPR RACI.pdf (20)

PDF
Cobit 5 for information security
PDF
Cobit 5 for Information Security
PPT
Cobit5 and-grc
PDF
Implementation of a Decision System for a Suitable IT Governance Framework
PDF
Cobit_5_Checklist.pdf
PPTX
Introduction to COBIT 5 and IT management
PDF
Cracking the Code- Expert Tips for Mastering GRC | CollabDays Bletchley | Sep...
PDF
Blockchain workshop design thinking and technical workshop
PDF
COBIT 5 Basic Concepts
PDF
A cloud readiness assessment framework
PPTX
Introduction for COBIT 5 and GRC studying
PPTX
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
PPTX
Is Your E-Business Suite Data Visible After An M&A Event?
PPTX
Identity & Access Governance
PDF
Business Continuity and Information Security- An Excellent Fit!
PPTX
Iris business architect strategies for migrating government legacy enterpri...
PPTX
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
PPTX
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
DOCX
Mi0036 business intelligence & tools...
DOCX
Mi0036 business intelligence & tools...
Cobit 5 for information security
Cobit 5 for Information Security
Cobit5 and-grc
Implementation of a Decision System for a Suitable IT Governance Framework
Cobit_5_Checklist.pdf
Introduction to COBIT 5 and IT management
Cracking the Code- Expert Tips for Mastering GRC | CollabDays Bletchley | Sep...
Blockchain workshop design thinking and technical workshop
COBIT 5 Basic Concepts
A cloud readiness assessment framework
Introduction for COBIT 5 and GRC studying
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
Is Your E-Business Suite Data Visible After An M&A Event?
Identity & Access Governance
Business Continuity and Information Security- An Excellent Fit!
Iris business architect strategies for migrating government legacy enterpri...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Mi0036 business intelligence & tools...
Mi0036 business intelligence & tools...
Ad

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

PDF
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
PDF
pr ISMS Documented Information (lite).pdf
PDF
ISO Survey 2022: ISO 27001 certificates (ISMS)
PDF
PDF
Cybersecurity Frameworks for DMZCON23 230905.pdf
PDF
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
PDF
PDF
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
PDF
ISO 27001 How to accelerate the implementation.pdf
PDF
How to use ChatGPT for an ISMS implementation.pdf
PDF
pr Privacy Principles 230405 small.pdf
PDF
ISO Survey 2021: ISO 27001.pdf
PDF
Employee Monitoring and Privacy.pdf
PDF
GDPR and Personal Data Transfers 1.1.pdf
PDF
GDPR EU Institutions and bodies.pdf
PDF
IS Awareness in practice, isaca moscow 2019 10
PDF
Про работу на Западе (Прозоров)
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
pr ISMS Documented Information (lite).pdf
ISO Survey 2022: ISO 27001 certificates (ISMS)
Cybersecurity Frameworks for DMZCON23 230905.pdf
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to accelerate the implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
pr Privacy Principles 230405 small.pdf
ISO Survey 2021: ISO 27001.pdf
Employee Monitoring and Privacy.pdf
GDPR and Personal Data Transfers 1.1.pdf
GDPR EU Institutions and bodies.pdf
IS Awareness in practice, isaca moscow 2019 10
Про работу на Западе (Прозоров)

Recently uploaded (20)

PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Biography Text about someone important in life
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
Self management and self evaluation presentation
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Primary and secondary sources, and history
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PPTX
Project and change Managment: short video sequences for IBA
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
An Unlikely Response 08 10 2025.pptx
PPTX
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Phrase, structure, use, definition in sentence
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
What is Clause, definition and structure
PPTX
worship songs, in any order, compilation
PPTX
The spiral of silence is a theory in communication and political science that...
Learning-Plan-5-Policies-and-Practices.pptx
Biography Text about someone important in life
Instagram's Product Secrets Unveiled with this PPT
Self management and self evaluation presentation
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Primary and secondary sources, and history
Relationship Management Presentation In Banking.pptx
Intro to ISO 9001 2015.pptx wareness raising
2025-08-10 Joseph 02 (shared slides).pptx
Project and change Managment: short video sequences for IBA
_ISO_Presentation_ISO 9001 and 45001.pptx
An Unlikely Response 08 10 2025.pptx
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
Swiggy’s Playbook: UX, Logistics & Monetization
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Phrase, structure, use, definition in sentence
Emphasizing It's Not The End 08 06 2025.pptx
What is Clause, definition and structure
worship songs, in any order, compilation
The spiral of silence is a theory in communication and political science that...

GDPR RACI.pdf

  • 1. Using RACI Chart for GDPR implementation Andrey Prozorov, CISM, CIPP/E 2020-05-25
  • 2. 2 Andrey Prozorov, CIPP/E, CISM • Information Security Methodology Manager • 15 years in information security (12 years in data protection and privacy) • My Patreon (ISMS and GDPR toolkits) - www.patreon.com/AndreyProzorov • My blog (in Russian) - http://80na20.blogspot.com
  • 3. Agenda • RACI Chart (intro) • My Case: • My Data Protection Framework • My Governance Model • My GDPR Activities • My RACI Chart 3
  • 4. My first contact with RACI chart 2009-2010, COBIT 4.1, example: PO4 Define the IT Processes, Organisation and Relationships 4
  • 5. Thanks, Wiki! A responsibility assignment matrix (RAM), also known as RACI matrix or linear responsibility chart (LRC), describes the participation by various roles in completing tasks or deliverables for a project or business process. RACI is an acronym derived from the four key responsibilities most typically used: responsible, accountable, consulted, and informed. It is used for clarifying and defining roles and responsibilities in cross- functional or departmental projects and processes. There are a number of alternatives to the RACI model (e.g. RASI, PARIS, PACSI, DACI, PDQA, RASCEIO) 5
  • 6. RACI • Responsible (R): role that performs an activity or does the work. • Accountable (A): role that is ultimately accountable and has Yes/No/Veto. Also approver or final approving authority. There must be only one accountable specified for each task or deliverable. • Consulted (C): role that helps and advises. • Informed (I): role that needs to know of the decision or action. 6
  • 7. Why is it effective? • Simple and short description • Adaptable • Helicopter view (complete list and links) 7
  • 8. COBIT 2019: APO13 — Managed Security 8
  • 9. COBIT 2019: APO13 — Managed Security We have used RACI for the ISMS implementation. Let’s use it for GDPR compliance… 9
  • 10. My Case • Construction and Energy sector • >250 employees • EU + Russia • ISO 9001, ISO 27001… 10
  • 11. My Data Protection Framework (33 pages) 11
  • 12. My Data Protection Framework (33 pages) 12
  • 13. Data Protection Governance Model Who else? • Representatives • Internal Audit • Risk Manager • Procurement • Compliance • … 13
  • 14. 1. Planning (6) 2. Processing (6) 3. Security (5) 4. Control, Report and Respond (4) GDPR Activities (21) 14
  • 15. 15
  • 16. 16
  • 17. 17 Lessons Learned: • Choose a suitable level of detail • Use other examples for inspiration • Discuss and align everything in advance • Conduct periodic reviews and update the chart
  • 18. Andrey Prozorov, CIPP/E, CISM • My Patreon (ISMS and GDPR toolkits) - www.patreon.com/AndreyProzorov • My blog (in Russian) - http://80na20.blogspot.com • Email - prozorov.info@gmail.com Thanks!