SlideShare a Scribd company logo
GDPR from the Information
Security Perspective
Dr. Kaleem Usmani
kaleem.usmani@gmail.com
kusmani@cert.ncb.mu (Alternate)
Personal Data Protection
• Personal data protection plays an important role in the
digital era. The right to privacy is expressly provided in
Sections 3 and 9 of the Constitution of Mauritius and Article
22 of the Mauritian Civil Code.
• Mauritius enacted the Data Protection Act in 2004. In light
of the digital evolution in Mauritius, the Data Protection Act
has been replaced by the new Data Protection Act 2017 which
came into force on 15 January 2018.
• The Act aims at strengthening the control and personal
autonomy of data subjects over their personal data and for
matters related thereto. It seeks to bring Mauritius data
protection framework into line with the General Data
Protection Regulation (Regulation (EU) 2016/679).
2
Why GDPR ?
• The GDPR is a regulation that requires businesses
to protect the personal data and privacy of EU
citizens for transactions that occur within EU
member states.
• It carries provisions that require businesses to
protect the personal data and privacy of EU citizens
for transactions that occur within EU member
states.
• The GDPR also regulates the exportation of personal
data outside the EU.
3
GDPR Impact on Organisations
• It will have an impact on any organisation that
processes personal data.
• Breaches will apply to firms that do not have
adequate customer consent for processing their
personal data or violate the principle of the privacy-
by-design concepts and model.
• It is important to note that both data controllers
and processors are subject to the rules, especially if
they fail to either carry out a privacy impact
assessment or notify the concerned authority about
a breach.
4
Characteristics of GDPR
1.Scope:
GDPR defines how EU citizens’ data must be handled by
countries inside and outside the EU.
2.Consent:
GDPR has changed and reinforced the conditions of consent in
that it expects clear, plain language consent from data subjects
in an easy, accessible and intelligible form.
3.Fines and Penalties:
GDPR sanctions substantial fines of up to €20m or four percent
of annual revenue whichever is greater.
5
Characteristics of GDPR ( Contd.)
4.Privacy by Design
Processes will need to be amended to consider privacy by design
whereby the controller must apply adequate technical and organisational
procedures to fulfill the requirements of GDPR and protect the rights of
individuals (data subjects)
5.Data Portability
Personally identifiable data must be portable by open use of common file
formats that are machine-readable when the data subject receives them.
6.Right to Access
GDPR provides the right to data subjects to request the data controller
to confirm whether their personally identifiable data is being processed,
where, and for what purpose. In addition to this, the data controller
must provide a free electronic copy of any personally identifiable data.
6
Characteristics of GDPR ( Contd.)
7.Right to be Forgotten
The data subject is entitled to request that the data controller
permanently or on-demand delete his/her personally
identifiable data, cease further distribution of the data, and
demand third parties halt processing of the data.
8.Breach Notification
As a data breach is likely to result in a risk to the rights and
freedoms of individuals, GDPR requires a mandatory breach
notification to be submitted to the relevant authority within 72
hours of the organisation first becoming aware of the breach.
9.Data Protection Officer (DPO)
It will be mandatory for data controllers and processors to
appoint a DPO
7
Sum-up
• IT Governance will be impacted by the requirements of the
GDPR and will bring benefits as well.
• The regulations will encourage organisations to have a more
secure data management approach in place.
• GDPR introduces several privacy arrangements and control
mechanisms that are intended to safeguard personal
identifiable data.
• Many of those controls are also recommended by the ISO
27000 series of information security standards including ISO
27001:2013, ISO 27002:2013 as well as the COBIT 5
standards.
8
Thank You
9

More Related Content

PDF
Talk1 esc7 muscl-gdpr_debate_v1_2
PPTX
DPA and GDPR
PDF
Introduction to gdpr
PDF
General Data Protection Regulation: what do you need to do to get prepared? -...
PDF
ESET Quick Guide to the EU General Data Protection Regulation
PPTX
What is GDPR?
PPTX
Data Protection Reform: What Businesses Need to know About GDPR and its Impac...
PPTX
UK GDPR: What New Direction?
Talk1 esc7 muscl-gdpr_debate_v1_2
DPA and GDPR
Introduction to gdpr
General Data Protection Regulation: what do you need to do to get prepared? -...
ESET Quick Guide to the EU General Data Protection Regulation
What is GDPR?
Data Protection Reform: What Businesses Need to know About GDPR and its Impac...
UK GDPR: What New Direction?

What's hot (17)

PDF
Dai Davies - GDPR Presentation
PDF
GDPR-Overview
PDF
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
PPTX
Cobb Digital Bitesize workshop - GDPR, are you compliant?
PPTX
GDPR From Implementation to Opportunity
PPTX
Introduction to GDPR
PPTX
EU GDPR - 12 Steps To Compliance
PPTX
Getting Ready for GDPR
PPTX
The GDPR Armageddon – One year on
PPTX
An Essential Guide to EU GDPR
PPTX
Everything you need to know about the GDPR
PPTX
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
PDF
The Essential Guide to GDPR
PPTX
GDPR Compliance: What You Need to Know Before May 2018
PDF
Québec's Privacy Modernization: Bill 64
PDF
"If we're leaving the EU, does GDPR even matter?" And other FAQs
Dai Davies - GDPR Presentation
GDPR-Overview
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
Cobb Digital Bitesize workshop - GDPR, are you compliant?
GDPR From Implementation to Opportunity
Introduction to GDPR
EU GDPR - 12 Steps To Compliance
Getting Ready for GDPR
The GDPR Armageddon – One year on
An Essential Guide to EU GDPR
Everything you need to know about the GDPR
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
The Essential Guide to GDPR
GDPR Compliance: What You Need to Know Before May 2018
Québec's Privacy Modernization: Bill 64
"If we're leaving the EU, does GDPR even matter?" And other FAQs
Ad

Similar to GDPR SECURITY ISSUES (20)

PPTX
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
PPTX
Operational impact of gdpr finance industries in the caribbean
PPTX
GDPRR: The Key Changes
PPTX
Gdpr action plan
PPTX
GDPR
PDF
All you need to know about GDPR
PDF
The Definitive GDPR Guide for Event Professionals
PPTX
GDPR: Are you Ready?
PPTX
A Brief Overview on GDPR
PPTX
Members evening - data protection
 
PDF
GDPR- Get the facts and prepare your business
PDF
GDPRIBMWhitePaper
PDF
Fasten Your Belts for GDPR
PDF
Fasten Your Belts for #GDPR
PDF
Are You Prepared for the GDPR?
PPTX
The General Data Protection Regulation ("GDPR")
PDF
Aon GDPR white paper
PDF
The Evolution of Data Privacy: 3 things you didn’t know
DOCX
General data protection regulation - European union
PDF
GDPR - Are you ready?
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
Operational impact of gdpr finance industries in the caribbean
GDPRR: The Key Changes
Gdpr action plan
GDPR
All you need to know about GDPR
The Definitive GDPR Guide for Event Professionals
GDPR: Are you Ready?
A Brief Overview on GDPR
Members evening - data protection
 
GDPR- Get the facts and prepare your business
GDPRIBMWhitePaper
Fasten Your Belts for GDPR
Fasten Your Belts for #GDPR
Are You Prepared for the GDPR?
The General Data Protection Regulation ("GDPR")
Aon GDPR white paper
The Evolution of Data Privacy: 3 things you didn’t know
General data protection regulation - European union
GDPR - Are you ready?
Ad

More from Sylvain Martinez (20)

PDF
PROGRAMMING AND CYBER SECURITY
PDF
INTRODUCTION TO CRYPTOGRAPHY
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
2019 CYBER SECURITY TRENDS REPORT REVIEW
PDF
INCIDENT RESPONSE CONCEPTS
PDF
PHISHING PROTECTION
PDF
VIRTUAL CISO AND OTHER KEY CYBER ROLES
PDF
INCIDENT RESPONSE OVERVIEW
PDF
OFFENSIVE IDS
PDF
IOT Security
PDF
ARE YOU RED TEAM READY?
PDF
Mobile Security Assessment
PDF
The Art of CTF
PDF
OFFICE 365 SECURITY
PDF
Risk on Crypto Currencies
PDF
INTRODUCTION TO CYBER FORENSICS
PDF
Talk1 esc7 muscl-dataprotection_v1_2
PPTX
Ethical Hacking
PDF
INCIDENT HANDLING IN ORGANISATIONS
PROGRAMMING AND CYBER SECURITY
INTRODUCTION TO CRYPTOGRAPHY
INCIDENT RESPONSE NIST IMPLEMENTATION
DATA LOSS PREVENTION OVERVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
INCIDENT RESPONSE CONCEPTS
PHISHING PROTECTION
VIRTUAL CISO AND OTHER KEY CYBER ROLES
INCIDENT RESPONSE OVERVIEW
OFFENSIVE IDS
IOT Security
ARE YOU RED TEAM READY?
Mobile Security Assessment
The Art of CTF
OFFICE 365 SECURITY
Risk on Crypto Currencies
INTRODUCTION TO CYBER FORENSICS
Talk1 esc7 muscl-dataprotection_v1_2
Ethical Hacking
INCIDENT HANDLING IN ORGANISATIONS

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Machine Learning_overview_presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Artificial Intelligence
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
sap open course for s4hana steps from ECC to s4
Machine Learning_overview_presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Artificial Intelligence
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Machine learning based COVID-19 study performance prediction

GDPR SECURITY ISSUES

  • 1. GDPR from the Information Security Perspective Dr. Kaleem Usmani kaleem.usmani@gmail.com kusmani@cert.ncb.mu (Alternate)
  • 2. Personal Data Protection • Personal data protection plays an important role in the digital era. The right to privacy is expressly provided in Sections 3 and 9 of the Constitution of Mauritius and Article 22 of the Mauritian Civil Code. • Mauritius enacted the Data Protection Act in 2004. In light of the digital evolution in Mauritius, the Data Protection Act has been replaced by the new Data Protection Act 2017 which came into force on 15 January 2018. • The Act aims at strengthening the control and personal autonomy of data subjects over their personal data and for matters related thereto. It seeks to bring Mauritius data protection framework into line with the General Data Protection Regulation (Regulation (EU) 2016/679). 2
  • 3. Why GDPR ? • The GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. • It carries provisions that require businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. • The GDPR also regulates the exportation of personal data outside the EU. 3
  • 4. GDPR Impact on Organisations • It will have an impact on any organisation that processes personal data. • Breaches will apply to firms that do not have adequate customer consent for processing their personal data or violate the principle of the privacy- by-design concepts and model. • It is important to note that both data controllers and processors are subject to the rules, especially if they fail to either carry out a privacy impact assessment or notify the concerned authority about a breach. 4
  • 5. Characteristics of GDPR 1.Scope: GDPR defines how EU citizens’ data must be handled by countries inside and outside the EU. 2.Consent: GDPR has changed and reinforced the conditions of consent in that it expects clear, plain language consent from data subjects in an easy, accessible and intelligible form. 3.Fines and Penalties: GDPR sanctions substantial fines of up to €20m or four percent of annual revenue whichever is greater. 5
  • 6. Characteristics of GDPR ( Contd.) 4.Privacy by Design Processes will need to be amended to consider privacy by design whereby the controller must apply adequate technical and organisational procedures to fulfill the requirements of GDPR and protect the rights of individuals (data subjects) 5.Data Portability Personally identifiable data must be portable by open use of common file formats that are machine-readable when the data subject receives them. 6.Right to Access GDPR provides the right to data subjects to request the data controller to confirm whether their personally identifiable data is being processed, where, and for what purpose. In addition to this, the data controller must provide a free electronic copy of any personally identifiable data. 6
  • 7. Characteristics of GDPR ( Contd.) 7.Right to be Forgotten The data subject is entitled to request that the data controller permanently or on-demand delete his/her personally identifiable data, cease further distribution of the data, and demand third parties halt processing of the data. 8.Breach Notification As a data breach is likely to result in a risk to the rights and freedoms of individuals, GDPR requires a mandatory breach notification to be submitted to the relevant authority within 72 hours of the organisation first becoming aware of the breach. 9.Data Protection Officer (DPO) It will be mandatory for data controllers and processors to appoint a DPO 7
  • 8. Sum-up • IT Governance will be impacted by the requirements of the GDPR and will bring benefits as well. • The regulations will encourage organisations to have a more secure data management approach in place. • GDPR introduces several privacy arrangements and control mechanisms that are intended to safeguard personal identifiable data. • Many of those controls are also recommended by the ISO 27000 series of information security standards including ISO 27001:2013, ISO 27002:2013 as well as the COBIT 5 standards. 8