Presentation is loading. Please wait.

Presentation is loading. Please wait.

Castlebridge associates |www.castlebridge.ie | www.dataprotectionofficer.ie Castlebridge changing how people think about information How to Implement the.

Similar presentations


Presentation on theme: "Castlebridge associates |www.castlebridge.ie | www.dataprotectionofficer.ie Castlebridge changing how people think about information How to Implement the."— Presentation transcript:

1 castlebridge associates |www.castlebridge.ie | www.dataprotectionofficer.ie Castlebridge changing how people think about information How to Implement the GDPR Some Pragmatic Insights for Aligning Business / Information / Technology

2 One Slide Summary of GDPR and Information Governance Organisations need to ensure effective Information Governance and Controls over Business, Information, and Technology to ensure customer expectations of data privacy are met, or exceeded ©2016 Castlebridge Associates Oversee & Govern Plan & Build Do & Manage Engage & Respond Info Governance Info Quality

3 The GDPR Summarised One Stop Shop Core Principles Increased Penalties Risk based approach to Data Protection Explicit Focus on Governance Principles Driven Stricter Consent (where consent only basis) Enhanced Rights: Data Portability; RTBF; Risk & Penalty Mitigation Documentation Data Protection Officer Evidence of Effectiveness Risk & Penalty Mitigation Enforcement against Data Processors Extra territoriality Fines as % of Global Turnover Mitigating Factors 1.Lawfulness, fairness, transparency 2.Purpose Limitation 3.Data Minimisation 4.Accuracy 5.Storage Limitation 6.Integrity & Confidentiality 7.Accountability + Article 1, 7, and 8 ECHR

4 Privacy by Design What is it? Privacy by Design is an approach to systems engineering which takes privacy into account throughout the whole engineering process. Why is it Important? Privacy by Design places PRIVACY as a “Key Resulting Outcome” of the engineering process to design and implement data processing capabilities. It’s a key concept in the EU GDPR What is it? It is just QUALITY MANAGEMENT applied to Information, with PRIVACY as a “critical to quality” characteristic

5 Privacy by Design 'You cannot inspect quality into a product.' The quality is there or it isn't by the time it's inspected.” PBD is a Quality Management Philosophy

6 The Privacy by Design Philosophy PBD Proactive Not Reactive Privacy by Default Privacy Embedded Not Zero Sum E2E Security Transparency User Centric

7 Privacy Engineering What is it? Privacy Engineering is a discipline that uses engineering principles and processes to build controls and measures in to processes, systems, components, and products to enable the authorised processing of personal information. It is the discipline that ensures the gathering and application of privacy requirements has the same primacy as other ‘functional’ requirements in processes and systems and incorporates them into the project, product, system, or information life cycle. Why is it Important? It is the glue that makes PBD operative in an organisation What is it? It is just QUALITY ENGINEERING applied to Information, with PRIVACY as a “critical to quality” characteristic

8 Elements of Privacy Engineering Enterprise Goals User Goals Privacy Policy Requirements Policies and Procedures Privacy Mechanisms Privacy Awareness Training Quality Assurance QA Feedback

9 Castlebridge Associates © 2015 | Castlebridge Associates | Confidential

10 Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory SetsProcess flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto

11 Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory SetsProcess flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions What triggers need for data? Timing Identification Motivation Identification Why? Balancing priorities/goals Purpose spec Specified data, specified purpose Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto

12 Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory SetsProcess flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions Logical Schema Process Maps / Data Flow RACI Matrix Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto

13 Getting IT Involved… Explicit Focus on Data Governance Documentation Data Protection Officer Evidence of Effectiveness Expectation Process Outcome Information Outcome Customer Operational Tactical Strategic Business Information Technology Business Architecture & Planning Information Architecture & Planning Technology Architecture & Planning Business Strategy & Governance Information Strategy & Governance Technology Strategy & Governance Management & Execution of Business Processes Management & Application of Information Management & Exploitation of IT Services

14 Data Protection in the DMBOK Wheel  Data Protection roles, tasks, duties exist in all domains  Data Governance key to linking them all effectively © DAMA International, used with permission DMBO wheel ©2009 DAMA International

15 The TOGAF 9.1 Perspective  Techies love TOGAF (but it is just basic architectural principles)  Figure out how to apply tools and techniques to support Privacy Engineering

16 Castlebridge Associates © 2015 | Castlebridge Associates | Confidential 10 STEPS FOR DATA QUALITY APPROACH TO PIA & RISK 1 Define Business Need & Approach 2 Analyse Information Environment 3 Assess Quality of Information (Privacy) 4 Assess Business Impact Cannot be done legally/ethically 5 Identify Root Causes (Why is there a DP/Privacy issue) 6 Develop Improvement Plans (Identify what needs to be fixed) 7 Prevent Future Data Errors (Fix processes etc. for “to be”) 8 Fix current problems (Fix processes etc. for “as is”) Cost/Benefit not in favour of changes 9 Implement Controls 10 Communicate Actions and Results

17 Castlebridge changing how people think about information One Stop Shop… what it means.. GDPR and Relevant cases

18 One Stop Shop  Intent:  EU residents and organisations in the EU will only have to deal with one lead Data Protection agency  Simplify the execution of /vindication of rights (Data Subjects)  Reduce the complexity for organisations working across more than one EU Jurisdiction

19 The Reality… Its complicated… Article 51 & 51a GDPR Schrems Weltimmo


Download ppt "Castlebridge associates |www.castlebridge.ie | www.dataprotectionofficer.ie Castlebridge changing how people think about information How to Implement the."

Similar presentations


Ads by Google