SlideShare a Scribd company logo
1 of 31
Download to read offline
1
vPrivacy Insight Series - truste.com/insightseries
v
Path to GDPR Compliance
June 29, 2016
2
vPrivacy Insight Series - truste.com/insightseries
v
• We will be starting a couple minutes after the hour
• This webinar will be recorded and the recording and slides sent out
later today
• Please use the GotoWebinar control panel on the right hand side to
submit any questions for the speakers
Thank you for joining the webinar
3
vPrivacy Insight Series - truste.com/insightseries
Today’s Speakers
Eleanor Treharne-Jones, CIPP/E
VP Consulting
TRUSTe
(moderator)
Beth Sipula
Senior Privacy Consultant
TRUSTe
Bojana Bellamy, CIPP/E
President Hunton & Williams Centre for
Information Policy Leadership (CIPL)
4
vPrivacy Insight Series - truste.com/insightseries
v
The New EU Data Protection
Regulation: A Catalyst for Sea Change
for All?
Bojana Bellamy, CIPP/E
President,
Hunton & Williams Centre for information Policy Leadership (CIPL)
5
vPrivacy Insight Series - truste.com/insightseries
Harmonisation and
some progress
•Harmonised rules,
but not fully (e.g.
employee data,
children data)
•One Stop Shop:
Lead DPA for pan-
European matters, in
cooperation with other
DPAs; Local DPA for
local matters and
redress for individuals
•Risk-based
approach
•Some reduction of
administrative
burden (no national
registration of
processing. or prior
authorisation)
•BCR, seals and
certifications
•Greater cooperation
and consistency by
DP regulators
Broader scope
•Obligations on both
controller and
processor
•Extraterritorial
application to foreign
controller and
processor
•Wider definition of
personal data and
sensitive data;
anonymous data and
pseudonymisation
•Processing data of
children under 16
requires parental
consent
Increased
obligations
•DP principles
tightened (consent,
transparency/notices)
• Profiling rules
•Privacy Impact
Assessment
•Privacy by Design
•Breach notification -
to DPAs and
individuals
•Direct obligations
and liability for
processor
•Accountability -
privacy program
•Internal record of
processing
•DP Officer
Strengthened
rights of
individuals
•Right to erasure
•Data portability
•Right not to be
subject to automated
profiling / right to
object
Increased
enforcement, fines,
liability
•Regulatory fines up to
4% of annual
worldwide turnover
•Individual action
•Class action
•Criminal sanctions
(in national laws)
•Larger role for
European Data
Protection Board
(EDPB)
EU Data Protection Regulation at a Glance
6
vPrivacy Insight Series - truste.com/insightseries
Accountability in GDPR – Privacy Programme
Controllers must:
•Be responsible for compliance with GDPR
•Implement appropriate and effective technical and
organisational measures to comply with the GDPR
•Demonstrate compliance & effectiveness of the measures
Taking into account:
•The nature, scope, context, and purposes of the data
processing
•The risk for individuals - physical, moral, material damages
7
vPrivacy Insight Series - truste.com/insightseries
Accountability,
Effective
Compliance
and Protection
for Individuals
Leadership
and oversight
Risk
assessment
Policies and
Procedures
Privacy by
Design
Transparency
Training and
awareness
Monitoring
and
verification
Response and
enforcement
Privacy Management Programme –
Universal Elements
8
vPrivacy Insight Series - truste.com/insightseries
Internal privacy policies
and procedures -
compliance rules for DP
principles and individual
rights
Security policies
External transparency
measures
Measures to implement
Privacy by
Design/Default
Maintaining internal
records of processing
Keeping documentation
and evidence - consent,
legitimate interest,
notices, PIA, processing
agreements, breach
response
Conducting Privacy Impact
Assessments - for high risk
processing
Processor choice and
management
Documenting and notifying
personal data breaches - to
the DPA and individuals
Maintaining transfer
mechanisms for global
data transfers
Appointing a DP Officer,
with independent status,
protected employment and
statutory responsibilities
Co-operating with DPAs, on
request
8
Accountability Measures Under GDPR
9
vPrivacy Insight Series - truste.com/insightseries
Accountability can be demonstrated via:
•BCR
•Approved Codes of Conduct
•Approved certifications
•Seals?
•Other accountability frameworks – e.g. ISO Cloud
Privacy and Security Standard? CBPR?
Demonstrating Accountability under GDPR
10
vPrivacy Insight Series - truste.com/insightseries
Game Changer or Business as Usual?
DP Program –
Corporate
Digital
Responsibility
DPO led,
documented,
risk-based,
verified,
demonstrated
Data transfers
strategy
Big Data
enablement
DPIA Process
Privacy
Engineers
Vendor
management
Breach
management
Relationship
with DPAs
Legal
uncertainty
and disputes
management
11
vPrivacy Insight Series - truste.com/insightseries
Systematic Changes Ahead for Organisations
Greater need for managing external engagement and relationships (DPAs, EDPB,
individuals, media, privacy advocates)
DP Officer (DPO) becomes a more strategic, senior and multi-skilled role
Holistic and joined-up approach between CIO, CISO, CDO, CMO, CPO, Legal and
communications / media relations
DP becomes high-profile and board-level issue – higher enterprise risk; larger
business, legal and compliance impact; security breach notification and management
DP becomes a business issue - wide impact on company’s globalisation, digital
transformation and data strategy
GDPR Implementation - company-wide change management program required
12
vPrivacy Insight Series - truste.com/insightseries
WP29 Project Work Plan 2016
WP 29 Guidance
Risk DPO
Data
Portability
Certifications
Main Establishment, Consistency Procedure, Governance and
working of EDPB
13
vPrivacy Insight Series - truste.com/insightseries
Some examples of further rules and
implementation
Member States
• Age of children (13-
16)
• Rules for health,
genetic, criminal
convictions
• Rules to authorise
profiling / automated
decision taking
• Restrictions to rights /
breach notifications
• Responsibility of joint
controllers
• DPO appointment
• Employee data
• Statistical, scientific,
historical purposes
• National ID numbers
Commission
• Icons and
standardised privacy
policies
• Technical standards
for certifications /
seals
EDPB /DPAs
• Standard processing
contracts
• List of high risk
processing
• Conditions for
profiling
• High risk re data
breaches
14
vPrivacy Insight Series - truste.com/insightseries
Key Themes and Takeaways from CIPL GDPR Project
Workshop I Report (1)
Open engagement between industry, regulators, Member States and the Commission is essential for
consistent implementation and interpretation of the GDPR.
The successful GDPR implementation will require (1) taking into account the aims of the European Digital
Single Market, (2) “future-proof” and technologically neutral interpretation and implementation guidance,
(3) EU-wide harmonisation, and (4) consideration of other overlapping EU laws.
“Accountability” is central to the GDPR (for both controllers and processors) and must be coherently
understood and actively incentivised by the regulators.
“Smart regulation” may enable European DPAs to discharge their GDPR roles more effectively and
tackle the significant changes in their role, powers and national and pan-European operations.
DPO is a cornerstone of organisational accountability and it is essential to clarify the functional and
organisational aspects of the role of the DPO, to ensure effectiveness of the role.
15
vPrivacy Insight Series - truste.com/insightseries
Key Themes and Takeaways from CIPL GDPR
Project Workshop I Report (2)
The understanding of “risk” and “high risk” must be harmonized, and effective risk assessment
methodologies that consider both the risks and the benefits of processing must be developed and
agreed, without determining the definitive list of high risk processing.
Codes of conduct, certifications, seals and BCR can be effective compliance and accountability tools;
they must work at the “programmatic” level rather than at the product-level only and be incentivised by the
relevant authorities.
Implementing the right to data portability raises various problems, such as the interactions between data
portability and other legal areas.
Transparency to individuals is the other side to organisational accountability – the implementation of
transparency requirements should minimise any tension between effective transparency and detailed
legal notice requirements; industry queried whether icons are suitable and should be imposed top-down
by the Commission
The GDPR will raise specific challenges for start-ups and SMEs that need to be addressed, for example,
by involving these organisations in the stakeholder engagement process and leveraging tool and
processes of larger organisations.
16
vPrivacy Insight Series - truste.com/insightseries
v
Beth Sipula
Senior Privacy Consultant, TRUSTe
GDPR: Your Path to Compliance
17
vPrivacy Insight Series - truste.com/insightseries
Your Path to GDPR Compliance
TRUSTe has developed a four-step process designed to provide you with a
path to achieving GDPR compliance. This multi-step program provides both
guidance on what to do, along with options for how TRUSTe can help.
Are you impacted? Where
do you stand?
What do I need to do to
secure stakeholder
commitment and resources
for execution?
How do I build a plan that’s
prioritized based on risks?
How do I efficiently
implement all of the
modules required in the
GDPR program?
18
vPrivacy Insight Series - truste.com/insightseries
Step 1: Assess Readiness
Are you impacted?
• Do you “offer goods or services to EU residents”?
• Do you “monitor the behavior of EU residents”?
• Are you a “Data Processor” of EU resident personal data” (any information
relating to an identified or identifiable natural person)?
Where do you stand?
• Use a controls checklist, build one yourself, or leverage the TRUSTe GDPR
Readiness Assessment that guides you through core GDPR requirements:
✓ Transparency (i.e., Privacy Policy)
✓ Collection & Purpose Limitation
✓ Consent
✓ Data Quality
✓ Privacy Program Management
✓ Security in the Context of Privacy
✓ Data Breach Readiness & Response
✓ Individual Rights & Remedies
19
vPrivacy Insight Series - truste.com/insightseries
Step 2: Build Consensus
What do I need to do to secure stakeholder commitment
and resources for execution?
Gather relevant info to present to others
• Overview of the GDPR and its impact
• Best practice frameworks / industry benchmarks
• Scoreboard of where the company currently stands
• Review of the company’s current gaps and risks
• Summary of what it would take to close the gaps
• Rough time and cost analysis of the work required
Facilitate internal kickoff and on-going planning sessions
with relevant stakeholders across the organization. Goals:
• Formalize GDPR response team structure / roles / responsibilities
• Agree on short, medium and long-term goals
• Set measurable objectives with success criteria, key milestones
• Secure commitment to, and budget for, the GDPR program
20
vPrivacy Insight Series - truste.com/insightseries
Step 3: Develop Plan
How do I build a plan that’s prioritized based on risks?
Data
Collection
Storage Processing
Resources
Involved
Retention /
Deletion
• Map personal data flows across the business at
each stage
• Take into account broader definition of “personal
data” (“any information concerning an identified or
identifiable natural person”, e.g., geo, IP addresses)
• Resources include all internal systems, 3rd party
service providers, and cloud providers
• For new products – review requirements, database
schemas, third party integration agreements
• For M&A situations - include data flow analysis for
all new entities
Conduct a data flow analysis to add to the initial gap analysis
21
vPrivacy Insight Series - truste.com/insightseries
Step 3: Develop Plan
Build project timeline with commitment dates based on:
• Privacy team’s goals – short, mid, long-term
• Key milestones, e.g., 2018 GDPR enforcement start
• Budget and people resources available
• Remediation activities required from gap analysis
• Prioritized areas for “high risk” and longer implementation times
• Consider using the Privacy Shield to cover a large percentage quickly
22
vPrivacy Insight Series - truste.com/insightseries
Step 4: Implement Programs…
Triage … conduct PIAs & remediate “high risk”
areas
• GDPR requires you to conduct PIAs for “high risk”
activities and implement operational changes
• Most common “high risk” areas tend to center around
new products that change the way the business uses /
collects / stores personal data
• Put processes in place to conduct ongoing PIAs –
templates, technology, training
• Maintain record to demonstrate compliance
Prioritize … implement components with “long timelines”
• Search for qualified DPOs
• New processes and tech capabilities to manage obligations
around “Right to be Forgotten” and “Data Portability Rights”
• Security – revise information security policies & deploy training
• Data breach response plans – new 72 hour notification, “without
undue delay” for breaches with potential for serious harm
23
vPrivacy Insight Series - truste.com/insightseries
• Conduct Final GDPR Assessment to ensure
all gaps are closed
• Leverage an assessment repository to house
all past, present and future PIAs
• Keep detailed records of any processing
performed on personal data
• Leverage template library for ongoing PIAs
against the GDPR requirements along with
any local or evolving requirements
• Have a Findings Report ready that shows that
all GDPR requirements have been met
Step 4: Implement Programs continued …
Demonstrate … build compliance audit trail and on-going
PIA process
24
vPrivacy Insight Series - truste.com/insightseries
v
How TRUSTe Can Help
25
vPrivacy Insight Series - truste.com/insightseries
GDPR Readiness Assessment
• A comprehensive online tool to help assess readiness to
meet GDPR requirements
• Control questions mapped to GDPR requirements
• Real-time gap analysis and recommendations
• Remediation management
• Centralized, on-demand reporting
• Easy implementation (no software to
install)
Get visibility on where you stand with the IAPP GDPR
Assessment Powered by TRUSTe
26
vPrivacy Insight Series - truste.com/insightseries
GDPR Priorities Assessment
Gap Assessment and Findings Report provides a “heat map”
and prioritized GDPR remediation plan followed by an onsite
review with Key Stakeholders to build consensus
• Summary of company’s current posture
assessed against the GDPR and the desired
position
• “Heat map” identifying areas of high, mid, low
risk
• Level of effort assessment for all operational
changes
• Plan organized in immediate, mid-term and
long-term priorities to get GDPR program
completed
• Onsite Review with Key Stakeholders to help
build awareness, secure buy-in, and
agreement on an initial program
• The half day on-site interactive sessions led
by a TRUSTe Privacy Consultant and custom-
tailored to your organization
27
vPrivacy Insight Series - truste.com/insightseries
Implementation Programs
Privacy Shield
Assessment / Certification against Privacy Shield requirements
Data Discovery & Classification
Building data flow visualizations to understand associated privacy risks
PIAs / Privacy Risk Assessments + PIA Program Development
Assess specifically identified “high risk” activities against the GDPR requirements, remediate
and develop a sustainable PIA program going forward.
Consent Manager
Technology implementation on your digital properties to meet explicit and implied consent
requirements, whether in the context of Cookie Consent or Data Processing
Ads Compliance Manager
Technology implementation on your digital properties to meet consent and choice
requirements for Interest Based Advertising (IBA) and Profiling
TRUSTe has a suite of services that can help with all GDPR
program implementation steps
28
vPrivacy Insight Series - truste.com/insightseries
Implementation Programs
Assessment Manager & AM Managed Service
TRUSTe has a suite of services that can help with all GDPR
program implementation steps
For companies that have robust in-house privacy assessment operations
and want to further optimize, implement our SaaS-based Assessment
Manager platform
• Quickly streamline your privacy
assessment process
• Get a dashboard view of progress
at the tactical level
• Get an enterprise view of risk and
mitigation at the Board-level
29
vPrivacy Insight Series - truste.com/insightseries
v
Questions?
30
vPrivacy Insight Series - truste.com/insightseries
v
Bojana Bellamy bbellamy@hunton.com
Beth Sipula bsipula@truste.com
Eleanor Treharne-Jones eleanor@truste.com
Contacts
31
vPrivacy Insight Series - truste.com/insightseries
v
Our 2016 Summer/Fall Webinar Series will be launched today. Look out for
details and register for our next webinar on July 21 “Validating Vendor
Assessments – Preparing for Privacy Shield”
See http://www.truste.com/insightseries for the 2016 Privacy Insight Series
and past webinar recordings.
Thank You!

More Related Content

Viewers also liked

Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkLeigh Hill
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Stephanie Vasey
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?DATUM LLC
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
EU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTeEU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTeTrustArc
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to KnowTrustArc
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...Google
 

Viewers also liked (12)

Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
EU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTeEU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTe
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
 

More from TrustArc

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 

More from TrustArc (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 

Recently uploaded

THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书Sir Lt
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 

Recently uploaded (20)

THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 

[GDPR Webinar Slides] Path to GDPR Compliance

  • 1. 1 vPrivacy Insight Series - truste.com/insightseries v Path to GDPR Compliance June 29, 2016
  • 2. 2 vPrivacy Insight Series - truste.com/insightseries v • We will be starting a couple minutes after the hour • This webinar will be recorded and the recording and slides sent out later today • Please use the GotoWebinar control panel on the right hand side to submit any questions for the speakers Thank you for joining the webinar
  • 3. 3 vPrivacy Insight Series - truste.com/insightseries Today’s Speakers Eleanor Treharne-Jones, CIPP/E VP Consulting TRUSTe (moderator) Beth Sipula Senior Privacy Consultant TRUSTe Bojana Bellamy, CIPP/E President Hunton & Williams Centre for Information Policy Leadership (CIPL)
  • 4. 4 vPrivacy Insight Series - truste.com/insightseries v The New EU Data Protection Regulation: A Catalyst for Sea Change for All? Bojana Bellamy, CIPP/E President, Hunton & Williams Centre for information Policy Leadership (CIPL)
  • 5. 5 vPrivacy Insight Series - truste.com/insightseries Harmonisation and some progress •Harmonised rules, but not fully (e.g. employee data, children data) •One Stop Shop: Lead DPA for pan- European matters, in cooperation with other DPAs; Local DPA for local matters and redress for individuals •Risk-based approach •Some reduction of administrative burden (no national registration of processing. or prior authorisation) •BCR, seals and certifications •Greater cooperation and consistency by DP regulators Broader scope •Obligations on both controller and processor •Extraterritorial application to foreign controller and processor •Wider definition of personal data and sensitive data; anonymous data and pseudonymisation •Processing data of children under 16 requires parental consent Increased obligations •DP principles tightened (consent, transparency/notices) • Profiling rules •Privacy Impact Assessment •Privacy by Design •Breach notification - to DPAs and individuals •Direct obligations and liability for processor •Accountability - privacy program •Internal record of processing •DP Officer Strengthened rights of individuals •Right to erasure •Data portability •Right not to be subject to automated profiling / right to object Increased enforcement, fines, liability •Regulatory fines up to 4% of annual worldwide turnover •Individual action •Class action •Criminal sanctions (in national laws) •Larger role for European Data Protection Board (EDPB) EU Data Protection Regulation at a Glance
  • 6. 6 vPrivacy Insight Series - truste.com/insightseries Accountability in GDPR – Privacy Programme Controllers must: •Be responsible for compliance with GDPR •Implement appropriate and effective technical and organisational measures to comply with the GDPR •Demonstrate compliance & effectiveness of the measures Taking into account: •The nature, scope, context, and purposes of the data processing •The risk for individuals - physical, moral, material damages
  • 7. 7 vPrivacy Insight Series - truste.com/insightseries Accountability, Effective Compliance and Protection for Individuals Leadership and oversight Risk assessment Policies and Procedures Privacy by Design Transparency Training and awareness Monitoring and verification Response and enforcement Privacy Management Programme – Universal Elements
  • 8. 8 vPrivacy Insight Series - truste.com/insightseries Internal privacy policies and procedures - compliance rules for DP principles and individual rights Security policies External transparency measures Measures to implement Privacy by Design/Default Maintaining internal records of processing Keeping documentation and evidence - consent, legitimate interest, notices, PIA, processing agreements, breach response Conducting Privacy Impact Assessments - for high risk processing Processor choice and management Documenting and notifying personal data breaches - to the DPA and individuals Maintaining transfer mechanisms for global data transfers Appointing a DP Officer, with independent status, protected employment and statutory responsibilities Co-operating with DPAs, on request 8 Accountability Measures Under GDPR
  • 9. 9 vPrivacy Insight Series - truste.com/insightseries Accountability can be demonstrated via: •BCR •Approved Codes of Conduct •Approved certifications •Seals? •Other accountability frameworks – e.g. ISO Cloud Privacy and Security Standard? CBPR? Demonstrating Accountability under GDPR
  • 10. 10 vPrivacy Insight Series - truste.com/insightseries Game Changer or Business as Usual? DP Program – Corporate Digital Responsibility DPO led, documented, risk-based, verified, demonstrated Data transfers strategy Big Data enablement DPIA Process Privacy Engineers Vendor management Breach management Relationship with DPAs Legal uncertainty and disputes management
  • 11. 11 vPrivacy Insight Series - truste.com/insightseries Systematic Changes Ahead for Organisations Greater need for managing external engagement and relationships (DPAs, EDPB, individuals, media, privacy advocates) DP Officer (DPO) becomes a more strategic, senior and multi-skilled role Holistic and joined-up approach between CIO, CISO, CDO, CMO, CPO, Legal and communications / media relations DP becomes high-profile and board-level issue – higher enterprise risk; larger business, legal and compliance impact; security breach notification and management DP becomes a business issue - wide impact on company’s globalisation, digital transformation and data strategy GDPR Implementation - company-wide change management program required
  • 12. 12 vPrivacy Insight Series - truste.com/insightseries WP29 Project Work Plan 2016 WP 29 Guidance Risk DPO Data Portability Certifications Main Establishment, Consistency Procedure, Governance and working of EDPB
  • 13. 13 vPrivacy Insight Series - truste.com/insightseries Some examples of further rules and implementation Member States • Age of children (13- 16) • Rules for health, genetic, criminal convictions • Rules to authorise profiling / automated decision taking • Restrictions to rights / breach notifications • Responsibility of joint controllers • DPO appointment • Employee data • Statistical, scientific, historical purposes • National ID numbers Commission • Icons and standardised privacy policies • Technical standards for certifications / seals EDPB /DPAs • Standard processing contracts • List of high risk processing • Conditions for profiling • High risk re data breaches
  • 14. 14 vPrivacy Insight Series - truste.com/insightseries Key Themes and Takeaways from CIPL GDPR Project Workshop I Report (1) Open engagement between industry, regulators, Member States and the Commission is essential for consistent implementation and interpretation of the GDPR. The successful GDPR implementation will require (1) taking into account the aims of the European Digital Single Market, (2) “future-proof” and technologically neutral interpretation and implementation guidance, (3) EU-wide harmonisation, and (4) consideration of other overlapping EU laws. “Accountability” is central to the GDPR (for both controllers and processors) and must be coherently understood and actively incentivised by the regulators. “Smart regulation” may enable European DPAs to discharge their GDPR roles more effectively and tackle the significant changes in their role, powers and national and pan-European operations. DPO is a cornerstone of organisational accountability and it is essential to clarify the functional and organisational aspects of the role of the DPO, to ensure effectiveness of the role.
  • 15. 15 vPrivacy Insight Series - truste.com/insightseries Key Themes and Takeaways from CIPL GDPR Project Workshop I Report (2) The understanding of “risk” and “high risk” must be harmonized, and effective risk assessment methodologies that consider both the risks and the benefits of processing must be developed and agreed, without determining the definitive list of high risk processing. Codes of conduct, certifications, seals and BCR can be effective compliance and accountability tools; they must work at the “programmatic” level rather than at the product-level only and be incentivised by the relevant authorities. Implementing the right to data portability raises various problems, such as the interactions between data portability and other legal areas. Transparency to individuals is the other side to organisational accountability – the implementation of transparency requirements should minimise any tension between effective transparency and detailed legal notice requirements; industry queried whether icons are suitable and should be imposed top-down by the Commission The GDPR will raise specific challenges for start-ups and SMEs that need to be addressed, for example, by involving these organisations in the stakeholder engagement process and leveraging tool and processes of larger organisations.
  • 16. 16 vPrivacy Insight Series - truste.com/insightseries v Beth Sipula Senior Privacy Consultant, TRUSTe GDPR: Your Path to Compliance
  • 17. 17 vPrivacy Insight Series - truste.com/insightseries Your Path to GDPR Compliance TRUSTe has developed a four-step process designed to provide you with a path to achieving GDPR compliance. This multi-step program provides both guidance on what to do, along with options for how TRUSTe can help. Are you impacted? Where do you stand? What do I need to do to secure stakeholder commitment and resources for execution? How do I build a plan that’s prioritized based on risks? How do I efficiently implement all of the modules required in the GDPR program?
  • 18. 18 vPrivacy Insight Series - truste.com/insightseries Step 1: Assess Readiness Are you impacted? • Do you “offer goods or services to EU residents”? • Do you “monitor the behavior of EU residents”? • Are you a “Data Processor” of EU resident personal data” (any information relating to an identified or identifiable natural person)? Where do you stand? • Use a controls checklist, build one yourself, or leverage the TRUSTe GDPR Readiness Assessment that guides you through core GDPR requirements: ✓ Transparency (i.e., Privacy Policy) ✓ Collection & Purpose Limitation ✓ Consent ✓ Data Quality ✓ Privacy Program Management ✓ Security in the Context of Privacy ✓ Data Breach Readiness & Response ✓ Individual Rights & Remedies
  • 19. 19 vPrivacy Insight Series - truste.com/insightseries Step 2: Build Consensus What do I need to do to secure stakeholder commitment and resources for execution? Gather relevant info to present to others • Overview of the GDPR and its impact • Best practice frameworks / industry benchmarks • Scoreboard of where the company currently stands • Review of the company’s current gaps and risks • Summary of what it would take to close the gaps • Rough time and cost analysis of the work required Facilitate internal kickoff and on-going planning sessions with relevant stakeholders across the organization. Goals: • Formalize GDPR response team structure / roles / responsibilities • Agree on short, medium and long-term goals • Set measurable objectives with success criteria, key milestones • Secure commitment to, and budget for, the GDPR program
  • 20. 20 vPrivacy Insight Series - truste.com/insightseries Step 3: Develop Plan How do I build a plan that’s prioritized based on risks? Data Collection Storage Processing Resources Involved Retention / Deletion • Map personal data flows across the business at each stage • Take into account broader definition of “personal data” (“any information concerning an identified or identifiable natural person”, e.g., geo, IP addresses) • Resources include all internal systems, 3rd party service providers, and cloud providers • For new products – review requirements, database schemas, third party integration agreements • For M&A situations - include data flow analysis for all new entities Conduct a data flow analysis to add to the initial gap analysis
  • 21. 21 vPrivacy Insight Series - truste.com/insightseries Step 3: Develop Plan Build project timeline with commitment dates based on: • Privacy team’s goals – short, mid, long-term • Key milestones, e.g., 2018 GDPR enforcement start • Budget and people resources available • Remediation activities required from gap analysis • Prioritized areas for “high risk” and longer implementation times • Consider using the Privacy Shield to cover a large percentage quickly
  • 22. 22 vPrivacy Insight Series - truste.com/insightseries Step 4: Implement Programs… Triage … conduct PIAs & remediate “high risk” areas • GDPR requires you to conduct PIAs for “high risk” activities and implement operational changes • Most common “high risk” areas tend to center around new products that change the way the business uses / collects / stores personal data • Put processes in place to conduct ongoing PIAs – templates, technology, training • Maintain record to demonstrate compliance Prioritize … implement components with “long timelines” • Search for qualified DPOs • New processes and tech capabilities to manage obligations around “Right to be Forgotten” and “Data Portability Rights” • Security – revise information security policies & deploy training • Data breach response plans – new 72 hour notification, “without undue delay” for breaches with potential for serious harm
  • 23. 23 vPrivacy Insight Series - truste.com/insightseries • Conduct Final GDPR Assessment to ensure all gaps are closed • Leverage an assessment repository to house all past, present and future PIAs • Keep detailed records of any processing performed on personal data • Leverage template library for ongoing PIAs against the GDPR requirements along with any local or evolving requirements • Have a Findings Report ready that shows that all GDPR requirements have been met Step 4: Implement Programs continued … Demonstrate … build compliance audit trail and on-going PIA process
  • 24. 24 vPrivacy Insight Series - truste.com/insightseries v How TRUSTe Can Help
  • 25. 25 vPrivacy Insight Series - truste.com/insightseries GDPR Readiness Assessment • A comprehensive online tool to help assess readiness to meet GDPR requirements • Control questions mapped to GDPR requirements • Real-time gap analysis and recommendations • Remediation management • Centralized, on-demand reporting • Easy implementation (no software to install) Get visibility on where you stand with the IAPP GDPR Assessment Powered by TRUSTe
  • 26. 26 vPrivacy Insight Series - truste.com/insightseries GDPR Priorities Assessment Gap Assessment and Findings Report provides a “heat map” and prioritized GDPR remediation plan followed by an onsite review with Key Stakeholders to build consensus • Summary of company’s current posture assessed against the GDPR and the desired position • “Heat map” identifying areas of high, mid, low risk • Level of effort assessment for all operational changes • Plan organized in immediate, mid-term and long-term priorities to get GDPR program completed • Onsite Review with Key Stakeholders to help build awareness, secure buy-in, and agreement on an initial program • The half day on-site interactive sessions led by a TRUSTe Privacy Consultant and custom- tailored to your organization
  • 27. 27 vPrivacy Insight Series - truste.com/insightseries Implementation Programs Privacy Shield Assessment / Certification against Privacy Shield requirements Data Discovery & Classification Building data flow visualizations to understand associated privacy risks PIAs / Privacy Risk Assessments + PIA Program Development Assess specifically identified “high risk” activities against the GDPR requirements, remediate and develop a sustainable PIA program going forward. Consent Manager Technology implementation on your digital properties to meet explicit and implied consent requirements, whether in the context of Cookie Consent or Data Processing Ads Compliance Manager Technology implementation on your digital properties to meet consent and choice requirements for Interest Based Advertising (IBA) and Profiling TRUSTe has a suite of services that can help with all GDPR program implementation steps
  • 28. 28 vPrivacy Insight Series - truste.com/insightseries Implementation Programs Assessment Manager & AM Managed Service TRUSTe has a suite of services that can help with all GDPR program implementation steps For companies that have robust in-house privacy assessment operations and want to further optimize, implement our SaaS-based Assessment Manager platform • Quickly streamline your privacy assessment process • Get a dashboard view of progress at the tactical level • Get an enterprise view of risk and mitigation at the Board-level
  • 29. 29 vPrivacy Insight Series - truste.com/insightseries v Questions?
  • 30. 30 vPrivacy Insight Series - truste.com/insightseries v Bojana Bellamy bbellamy@hunton.com Beth Sipula bsipula@truste.com Eleanor Treharne-Jones eleanor@truste.com Contacts
  • 31. 31 vPrivacy Insight Series - truste.com/insightseries v Our 2016 Summer/Fall Webinar Series will be launched today. Look out for details and register for our next webinar on July 21 “Validating Vendor Assessments – Preparing for Privacy Shield” See http://www.truste.com/insightseries for the 2016 Privacy Insight Series and past webinar recordings. Thank You!