Running a Privacy Impact Assessment (PIA)

Slides:



Advertisements
Similar presentations
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Advertisements

Information Systems Controls for System Reliability -Information Security-
The most precious commodity in your organisation?
Assurance Report on Controls at Service Organizations SAE 3402
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
INTRODUCTION TO DATA PROTECTION An overview of the Irish Data Protection legislation.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
The EU General Data Protection Regulation Frank Rankin.
Data protection—training materials [Name and details of speaker]
The Data Protection Audit How to prepare What to expect The end results Dublin Chamber of Commerce, March 24 th.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Risk Assessment Beginning an Analysis Date by Jim Bowman.
Data Protection Regulation
GDPR 12 POINTS 679/2016 DATA LEX 2016.
Data Protection Officer’s Overview of the GDPR
Running a Privacy Impact Assessment (PIA)
Responding to a Data Breach 360° of IT Compliance
Presentation to GTMC on GDPR
COMP3357 Managing Cyber Risk
General Data Protection Regulation
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
Museums + Heritage webinar, 30 November 2017
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Risk Criteria and Guidance_
GDPR Security: How to do IT? IT reediness for competitive advantage
Key Value Indicators (KVIs) ‘Accepted’ Version 1.0
Data Privacy: Essentials for Payroll
Introducing GDPR: How the General Data Protection Regulation transforms the world Laura Mudd November 2016.
Radar Watchkeeping: Have you monitored your Communication department’s radar to avoid collisions with the new Regulation? 43rd EDPS-DPO meeting, 31 May.
Bob Siegel President Privacy Ref, Inc.
GENERAL DATA PROTECTION REGULATION (GDPR)
Cyberforum 2018 March 8, 2018 Los Angeles GDPR & SECURITY
GDPR - New Data Protection Regulation
GDPR and paper records Why it’s not all cyber and fines Gary Shipsey
Incident Reporting Webinar Begins at 12.30
Red Flags Rule An Introduction County College of Morris
Security measures Introducing Risk Assessment in GDPR
EU Data Protection Legislation Managing The Security of Medical Data
Data protection reform – update from the ICO
State of the privacy union
G.D.P.R General Data Protection Regulations
The new data protection rules
The GDPR & Schools - An Introduction -
Ethical questions on the use of big data in official statistics
General Data Protection Regulation
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Data Mapping On the Journey to Accountability
Data Protection and Audit
Management of a Data Breach under the GDPR
Detecting, reporting & investigating data breaches under GDPR
GDPR Quiz Today’s trainer: Click here to use Kahoot! 1
The General Data Protection Regulation Six months on – What’s changed
Governing the risk of GDPR compliance
Key Value Indicators (KVIs) Version 1.1 (amendments from V1.0 in red)
Mandatory Breach Reporting (isn’t *that* bad)
Key Value Indicators (KVIs) Version 2.2 For Approval at CoMC
For Implementation 1st April 2019
Key Value Indicators (KVIs)
General Data Protection regulation (GDPR)
Third-party risk management (TPRM)
CoMC 14th March 2018 Michele Downes
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Key Value Indicators (KVIs) Version 3.0
Risk parameters (consequence)
GDPR: Understanding your obligations and the ongoing challenges
General Data Protection Regulation “11 months in”
Getting Ready For GDPR Simon Marks Director
Presentation transcript:

Running a Privacy Impact Assessment (PIA) Presenter: John Ghent

Data is the new oil

1956

2005 2013

What’s next?

GDPR

Acquire Purpose Minimise Quality Retention

Acquire Purpose Minimise Quality Retention Secure

Acquire Purpose Minimise Quality Retention Secure Accountable

“YUGE” “YUGE” Accountable (huge part of GDPR)

Who should be involved in a PIA - DP Champions Operations IT DPO Compliance Engagement can vary depending on the customer and the complexity of processing

PIA - a six step process Stakeholders, Entities & Systems Identify Processes Work flow analysis Data Protection Assessment Risk Analysis Implementation

Step 1 Stakeholders, Systems and Entities A complete list of stakeholders, entities and systems. Anyone or anything that comes into contact with data should be considered in this category. This could be A job role, A person, A third party A computer system, etc…

Step 2 Identify Processes A complete list of data management processes. A process is any event that is required to complete a business function. Focus on processes that involve personal and sensitive personal data

Step 3 Workflow Analysis For processes identified in Step 2, we workflow each relevant process into appropriate swim lanes. These swim lanes identify What data is processed What systems have visibility of this data Where this data sent

Step 3 Workflow Analysis (Deliberately Blurred)

Step 4 Data Protection Assessment For each process identified in Step 3, we categorise the processing according to current and upcoming Data Protection legislation, areas of consideration and evaluation of potential risk. The numbers in the sub process above indicate Rules 1, 2 and 6 are relevant for consideration by the DPO when assessing this particular process.

Step 5 Risk Analysis A Risk Register is created in parallel with Step 4 to measure risk against likelihood and severity. Each risk is categorised into Ref Number Risk Date Raised Likelihood Impact Score Action Status

Step 5 Score Likelihood Impact 1 Never happened and unlikely to ever happen Low to no DP related impact (brand, operational, commercial) 2 Has happened but very rarely Minor Impact, easily resolved 3 Happens from time to time Significant impact to company brand and could trigger a user complaint or ODPC investigation. 4 Happens frequently but not continuously May trigger a breach notification process and damaging to company brand, could result in penalties and likely an investigation 5 Happening continuously Should trigger a breach notification process and severely damaging to company brand. Will trigger an investigation from the ODPC and likely fines.

Step 5 – Point in time score card

Step 6 Implementation - PrivacyEngine An agreed implementation plan is formalised into the following categories Ref Number Problem Resolution Agreed Action Complete Old Score New Likelihood New Impact New Score

Semi-automated through PrivacyEngine

DPO & DP Champion Reports

Overview & recap Stakeholders, Entities & Systems Identify Processes Work flow analysis Data Protection Assessment Risk Analysis Implementation