SlideShare a Scribd company logo
1 of 23
The GDPR.
Are you ready?
What's the
GDPR?
The all new General Data
Protection Regulation
(GDPR) is a compliance
mandate that unifies and
standardizes the
collection and processing
of data belonging to EU
citizens.
The GDPR's
definition of
personal data
Unique identifiers
• Name
• Location
• Email address
• Passwords
Online identifiers
• IP address
• Cookies
• RFIDs
Other data
• Physical, physiological,
genetic, mental,
economic, cultural, or
social identity of natural
persons
Do you need to
comply?
• Is your enterprise in the EU?
• Do you process EU citizens'
personal data?
If you answered YES to either
question, then you need to
comply with the GDPR before
May 25, 2018.
Why is there so much buzz around the GDPR?
The rules are
strict!
The penalties for
violation are huge!
Fines up to 20,000,000€, or
4% of the total worldwide
annual turnover of the
preceding financial year,
whichever is higher.
What should you do to prepare?
Ensure your company
employs proper collection of
personal data.
Ensure your company
securely processes
personal data.
How should you collect it?
• Get proper consent before
collecting and processing
personal data.
• Know your data subjects' rights.
&
how
<
What do you collect?
• Personal data
_______________ THEIR
• Right to restrict data processing: Subjects have
the rights to stop enterprises processing their data if the
data is found to be inaccurate or incomplete, is
processed unlawfully, or the purpose for which the data
was collected is violated.
• Right to data portability: Data subjects can obtain
and transfer their personal data from one environment to
another at any point in time.
• Right to be forgotten: If subjects demand enterprises
to delete or remove their personal data, then enterprises
should do so.
• Right to be informed: Enterprises should
provide fair processing information to the data
subjects through a privacy notice. It emphasizes
the need for transparency over how you use
personal data.
• Right of access by data subjects: Data
subjects can check and validate whether their
information is processed fairly at any point in time.
• Right to rectification: If the data is found
incomplete or inaccurate, subjects can demand
enterprises to rectify any errors.
Articles 12 - 20
Deploy technical and
organizational measures to stop
breach attempts.
• If you're a Windows shop and use Active Directory to grant
permissions to critical resources like personal data in your network,
ADManager Plus can help you manage and report on every user
permission change.
• If you use Exchange servers to facilitate email transactions,
Exchange Reporter Plus can provide information on attachments by:
• file name
• extension
• keywords
• Keep an eye on data transmissions happening over email.
• If you use Office 365 to facilitate data storage and processing,
O365 Manager Plus provides extensive, web-based monitoring
that tracks all activities happening in your Office 365 environment.
"Monitor and audit activities
happening on all technology
and platforms (including
Windows, Linux/Unix,
applications, mail servers, and
cloud deployment) that are
involved in personal data
processing."
Article 24 #1
Security of
data processing
• Article 32 - 1(b) - "Ensure integrity,
confidentiality, and availability of personal
data processing systems and
applications."
• Article 32 - 1(d) - "Regularly evaluate
and assess the effectiveness of the
technical measures that ensures data
safety."
• Article 32 - 2 - "Audit all activities to
detect any accidental or unlawful
destruction, loss, alteration, unauthorized
disclosure of, or access to personal data
transmitted, stored or otherwise
processed."
• If the personal data is stored in databases such as Oracle or MS SQL,
Log360 helps audit all activities, including:
• Access to personal data
• Changes in access permissions
• User activities
• Critical changes to stored personal data
• If you store personal data in Windows file servers, use FileAudit Plus
to audit your servers in real time and track:
• Changes to files and folders
• Permission changes
• Unauthorized access
• Files that are moved to a different location
Oops!
Data breach?!
Detect the
data breach
within 72
hours
Assess the
impact of
the data
breach
Report the
data breach;
include
information on
mitigation
measures
Log360 can detect any data breaches instantly with its real-time alerting
console and correlation engine. This solution,
• Lets you search through the logs to find out how the breach
happened with its powerful log search engine.
• Helps you compile an incident report that has answers to the vital
W's: who did what, when, and where.
Thank you!
Write to us at itsecurity-solutions@manageengine.com
for more information on the GDPR compliance and ManageEngine
solutions that help complying with this requirement at ease.

More Related Content

What's hot

Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManagerGulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
ManageEngine, Zoho Corporation
 

What's hot (20)

Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!
 
Top 5 IT challenges for 2017
Top 5 IT challenges for 2017Top 5 IT challenges for 2017
Top 5 IT challenges for 2017
 
6 reasons to switch to fluidic ui - Network Configuration Manager
6 reasons to switch to fluidic ui - Network Configuration Manager6 reasons to switch to fluidic ui - Network Configuration Manager
6 reasons to switch to fluidic ui - Network Configuration Manager
 
Retail conglomerate in Latin America monitors 8000+ app components with Appli...
Retail conglomerate in Latin America monitors 8000+ app components with Appli...Retail conglomerate in Latin America monitors 8000+ app components with Appli...
Retail conglomerate in Latin America monitors 8000+ app components with Appli...
 
Leading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerLeading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManager
 
Why Configuration Management Matters
Why Configuration Management MattersWhy Configuration Management Matters
Why Configuration Management Matters
 
When Your App Hits The Highway - NetFlow Analyzer V10 Overview
When Your App Hits The Highway  - NetFlow Analyzer V10 OverviewWhen Your App Hits The Highway  - NetFlow Analyzer V10 Overview
When Your App Hits The Highway - NetFlow Analyzer V10 Overview
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManager
 
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
Largest Mobile Operator from Russia uses opmanager to manage 5000 devicesLargest Mobile Operator from Russia uses opmanager to manage 5000 devices
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
 
5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
 
Leading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManagerLeading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManager
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
 
10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness
 
UniCredit Leasing uses Applications Manager to deliver seamless services worl...
UniCredit Leasing uses Applications Manager to deliver seamless services worl...UniCredit Leasing uses Applications Manager to deliver seamless services worl...
UniCredit Leasing uses Applications Manager to deliver seamless services worl...
 
Telecom provider germany ncm casestudy
Telecom provider germany ncm casestudyTelecom provider germany ncm casestudy
Telecom provider germany ncm casestudy
 
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManagerGulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
 
Simplifying IT operations manament with OpManager
Simplifying IT operations manament with OpManagerSimplifying IT operations manament with OpManager
Simplifying IT operations manament with OpManager
 
What's new in NetFlow Analyzer 12.2
What's new in NetFlow Analyzer 12.2What's new in NetFlow Analyzer 12.2
What's new in NetFlow Analyzer 12.2
 
Enterprise network management
Enterprise network managementEnterprise network management
Enterprise network management
 

Similar to Ease out the GDPR adoption with ManageEngine

Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Ragnar Heil
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
GrittyCC
 

Similar to Ease out the GDPR adoption with ManageEngine (20)

Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
 
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best PracticesFuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
 

More from ManageEngine

More from ManageEngine (20)

IT security : Keep calm and monitor PowerShell
IT security : Keep calm and monitor PowerShellIT security : Keep calm and monitor PowerShell
IT security : Keep calm and monitor PowerShell
 
IT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack toolIT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack tool
 
There's more than one way to get admin privileges
There's more than one way to get admin privilegesThere's more than one way to get admin privileges
There's more than one way to get admin privileges
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy
 
ManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine's Patch Manager Plus
ManageEngine's Patch Manager Plus
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk Plus
 
IT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusIT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk Plus
 
IT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusIT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk Plus
 
IT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusIT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk Plus
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Desmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIDesmitificando SNMP Parte-II
Desmitificando SNMP Parte-II
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
 
Desmitificando SNMP
Desmitificando SNMPDesmitificando SNMP
Desmitificando SNMP
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
 
Webinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesWebinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service Catalogues
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
 

Recently uploaded

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Recently uploaded (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 

Ease out the GDPR adoption with ManageEngine

  • 2. What's the GDPR? The all new General Data Protection Regulation (GDPR) is a compliance mandate that unifies and standardizes the collection and processing of data belonging to EU citizens.
  • 3. The GDPR's definition of personal data Unique identifiers • Name • Location • Email address • Passwords Online identifiers • IP address • Cookies • RFIDs Other data • Physical, physiological, genetic, mental, economic, cultural, or social identity of natural persons
  • 4. Do you need to comply? • Is your enterprise in the EU? • Do you process EU citizens' personal data? If you answered YES to either question, then you need to comply with the GDPR before May 25, 2018.
  • 5. Why is there so much buzz around the GDPR?
  • 7. The penalties for violation are huge! Fines up to 20,000,000€, or 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher.
  • 8. What should you do to prepare? Ensure your company employs proper collection of personal data. Ensure your company securely processes personal data.
  • 9. How should you collect it? • Get proper consent before collecting and processing personal data. • Know your data subjects' rights. & how < What do you collect? • Personal data
  • 10. _______________ THEIR • Right to restrict data processing: Subjects have the rights to stop enterprises processing their data if the data is found to be inaccurate or incomplete, is processed unlawfully, or the purpose for which the data was collected is violated. • Right to data portability: Data subjects can obtain and transfer their personal data from one environment to another at any point in time. • Right to be forgotten: If subjects demand enterprises to delete or remove their personal data, then enterprises should do so. • Right to be informed: Enterprises should provide fair processing information to the data subjects through a privacy notice. It emphasizes the need for transparency over how you use personal data. • Right of access by data subjects: Data subjects can check and validate whether their information is processed fairly at any point in time. • Right to rectification: If the data is found incomplete or inaccurate, subjects can demand enterprises to rectify any errors. Articles 12 - 20
  • 11. Deploy technical and organizational measures to stop breach attempts.
  • 12. • If you're a Windows shop and use Active Directory to grant permissions to critical resources like personal data in your network, ADManager Plus can help you manage and report on every user permission change.
  • 13. • If you use Exchange servers to facilitate email transactions, Exchange Reporter Plus can provide information on attachments by: • file name • extension • keywords • Keep an eye on data transmissions happening over email.
  • 14. • If you use Office 365 to facilitate data storage and processing, O365 Manager Plus provides extensive, web-based monitoring that tracks all activities happening in your Office 365 environment.
  • 15. "Monitor and audit activities happening on all technology and platforms (including Windows, Linux/Unix, applications, mail servers, and cloud deployment) that are involved in personal data processing." Article 24 #1
  • 17. • Article 32 - 1(b) - "Ensure integrity, confidentiality, and availability of personal data processing systems and applications." • Article 32 - 1(d) - "Regularly evaluate and assess the effectiveness of the technical measures that ensures data safety." • Article 32 - 2 - "Audit all activities to detect any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data transmitted, stored or otherwise processed."
  • 18. • If the personal data is stored in databases such as Oracle or MS SQL, Log360 helps audit all activities, including: • Access to personal data • Changes in access permissions • User activities • Critical changes to stored personal data
  • 19. • If you store personal data in Windows file servers, use FileAudit Plus to audit your servers in real time and track: • Changes to files and folders • Permission changes • Unauthorized access • Files that are moved to a different location
  • 21. Detect the data breach within 72 hours Assess the impact of the data breach Report the data breach; include information on mitigation measures
  • 22. Log360 can detect any data breaches instantly with its real-time alerting console and correlation engine. This solution, • Lets you search through the logs to find out how the breach happened with its powerful log search engine. • Helps you compile an incident report that has answers to the vital W's: who did what, when, and where.
  • 23. Thank you! Write to us at itsecurity-solutions@manageengine.com for more information on the GDPR compliance and ManageEngine solutions that help complying with this requirement at ease.