Automating the Monitoring & Management of GDPR Compliance

Slides:



Advertisements
Similar presentations
Confidential & Proprietary to Cooper Compliance Corporation Revised September 8, 2014 AUDiT-READY TM.
Advertisements

Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Central Piedmont Community College Internal Audit _____________________________ What to Expect When You Are Audited November 2014.
Internal Auditing and Outsourcing
1 6c: IA/PF - The Compliance Program and Modern Technology (Part 1 - Workshop) October 22, 2014 Mitch Kraskin - CEO, Compliance Science, Inc. Peter Mafteiu.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Service Provider Examinations What You Need to Know
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Our Changing Future Unit Linked Fund Governance George McCutcheon FIA MSc– Director, Financial Risk Solutions 18 Sep 2013.
CCAB Training Providers Event 17 November 2008 Reviews Required by QAC Heather Briers Director Chartered Accountants Regulatory Board.
© Securities Commission, Malaysia 1 What the Audit Oversight Board will do ICAA-MICPA Audit Forum 3 August 2010.
Advanced Program in Auditing and Accounting Regulation Module 12 Enhancing Statutory Audit Quality from a Financial Regulator’s Perspective Presenter:
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
November 29, The Implementation of the 8th Directive Public Oversight in Hungary Katalin Fekete Vice President Hungarian Chamber of Auditors.
The Petroleum Oil and Gas Corporation of South Africa (SOC) Ltd Reg. No. 1970/008130/07 Board Audit and Risk Committee presentation to the Parliament Portfolio.
V.Jawahar B.Com(Hons); FCA; Grad.CWA; ISA CISA; CISSP; CISM.
Pro-active Security Measures
CHO Code of Practice Alternative Dispute Resolution.
On Demand Travel Spend Management Solutions ATRIIS Travel & Expense Management Solutions June 2011.
Audit Committee Presentation Annual Audit Plan
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Continuous Quality Improvement Basics Created by Michigan’s Campaign to End Homelessness Statewide Training Workgroup 2010.
E&O Considerations for Coastal Agencies Exposures & Risk Management Corporate Solutions.
Copyright © 2011 Pearson Canada Inc. Auditing: The Art and Science of Assurance Engagements Chapter 2: The Public Accounting Profession.
Bank Policies and Procedures Consultant Bank Audit San Francisco.
WHY MONITOR? Compliance with applicable Federal requirements & performance goals are being achieved. Prevention of fraud & waste Early detection of inefficiencies.
Safety Committee Formation
PROGRESS IN IMPLEMENTING e-GOVERNANCE
Continuing Competence is coming
Managing a Data Breach Prevention-Detection-Mitigation
Office of the Inspector General Follow-up Process & Status of OIG Recommendations Presented by Garry LaGuerre, Acting Inspector General 1/31/2016.
PEMPAL IACOP PUBLIC INTERNAL CONTROL: MANAGEMENT AND CONTROL OF THE PUBLIC ENTITIES Presenter: Malapateng Teka; National Treasury| March 2016.
Microsoft 365 Get help with regulatory compliance
Hot Topics:Mobility in the Cloud
CORPORATE GOVERNANCE IN STATE OWNED COMPANIES
Leading transport safety
Originating the role of Information Governance Officer
Managing a Data Breach Prevention-Detection-Mitigation
OFAC.
INTRODUCTION TO Compliance audit METHODOLGY and CAM
Safety Training for Managers & Supervisors
OHS Staff Introduction Training
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
Sue Cawthray, CEO/ Gill Thrush, Catering Manager
به نام خداوند بخشنده و مهربان.
GDPR – Practical Implementation Managing contracts, procurement and relationships with suppliers Terry Brewer Chief Executive.
IS4550 Security Policies and Implementation
Structure of the Internal Audit Service
Compliance….GlobalSearch……WHAT?!?!
Contents subject to change.
Trading Supervision Obligations
General Data Protection Regulations (GDPR) Training
Small Lodge Administration
EFFECTIVE POLITICAL OVERSIGHT ROLE ON FINANCIAL MANAGEMENT
IFAD’s Progress in the transparency agenda: steps ahead
 GDPR Readiness Quiz Quick Insight: Quick Insight: Quick Insight:
ISO management systems
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
Vendor Management The Risks to Your Business
Overview of Individual Student Systems
Department of Basic Education
Adults, Health and Housing DPEG – ‘Policy Co-Production’
Scouting Ireland Corporate Governance
What is an anonymous reporting hotline?
Sam elkholy Director, systems engineering
Strategic Management and
Strategic Management and
Presentation transcript:

Automating the Monitoring & Management of GDPR Compliance By Paul O’Brien 6th March 2019

Introduction Experienced Risk & Compliance Professionals Members of IRM, IOB, ACOI, ACCA, ISI... Involved in the Development of Standards We supply a Governance, Risk & Compliance Software Solution called CalQRisk CalQRisk is used by 170+ regulated firms Including Brokers, Financial Advisors, Fund Management Companies, Fund Administrators, Credit Unions, Solicitors, Hotels, Charities and Local Authorities

Agenda Introduction What to monitor Case Study Automating the Management of GDPR Effective and Meaningful Monitoring Using the inputs to improve the outcomes

What to monitor and how often? Compliance with internal policies and procedures Use of personal data Imparting of information Data retention and deletion Response to Data Subject requests Facilitating DS exercise of rights Does every Process have an owner?

Why Monitor?

Case Study A Large Hotel Chain 75 entities world wide Different National Cultures Standardisation of Processes Confirmation of Application of Corporate Standard Processes Daily / Weekly / Monthly / Quarterly / Annually Supported by appropriate Audit

Automate the Risk Assessment Process

Typical Monitoring Question Set

Automate the Input Gathering Risk assessments Incident and near-miss reports Complaints Data subject requests Audit findings Breach reports Etc.

Data Subject Requests

Use the Inputs to Improve the Outcomes Monitoring makes the vulnerabilities apparent Prioritise issues and concentrate resources where they are most needed Find common control weaknesses and redesign process to get better results Modify the monitoring frequency in response to the input

Make Monitoring Easy and Meaningful Leadership needs confirmation that the procedures are being followed by all those responsible all the time Those responsible, need to be able to attest to the effectiveness of the processes Only ask monitoring questions that are meaningful If the monitoring tells you the process is not working – Change the Process

Monitor Compliance

Thank You pobrien@calqrisk.com