4 Steps Toward A GDPR Compliance Audit

Many organisations are starting to feel stressed and perhaps a bit confused by the General Data Protection Regulation that is quickly approaching us and will hit May 25, 2018.

Indeed, the more I talk to companies, the more I hear the same question: “What exactly is it that I am supposed to do?”

The answer is, 'plenty.' But first, it’s essential that we understand what we’re dealing with.

If you’ve worked with regulations such as Sarbanes-Oxley (SoX) or Health Insurance Portability and Accountability Act (HIPAA) before then you have likely heard about GDPR. And like with those other regulations, the ramifications of not being in compliance when it goes into effect are severe.

GDPR views each and every person that an organisation interacts with (either inside or outside the company) as a center cog and every interaction as a digital footprint that requires handling “the GDPR-way.”

Note to US organisations: even if your company is based outside the EU, you may still need to be GDPR compliant. What determines the need for compliance is who you hold data on. If you collect data on any EU citizen, you are subject to the regulations. This includes selling or shipping an item to someone in the EU, or even shipping inside the US but the person doing so is using a credit card from the EU.

GDPR touches upon how we use and store data, for how long and for what purpose. It addresses how we inform individuals about which data we hold, how to anonymise the data and how we delete it.

It also requires control over scenarios such as who responds to the request from the consumer exercising their right to be 'forgotten' and to make sure that it’s dealt with within reasonable time. The fact that some organizations are now required to hire a data protection officer (DPO) suddenly means that GDPR takes on an entirely different level of importance. With that, GDPR guidelines requires that many organisations do a comprehensive business process overhaul.
 
With that in mind, some organisations might consider shutting down a system or platform as “the solution,” because they feel as though they cannot oversee GDPR and don’t want to risk being imposed with a fine. But how many days are you willing to run your business without your HR system or your BI and analytics platform? You built and implemented them for a reason.

Starting Line - The Audit

Suffice to say, you’d rather not shut down systems and would prefer to become GDPR compliant. The next question is what do you do? To begin, a healthy audit is required, so you start by asking yourself these questions:

1. What data does our company hold?

Awe, that’s an easy one you think. You list the different systems that come to mind: ERP, CRM, HR. But then you wonder, “What is the name of the system we use for data analytics?” You then realise that it’s not just the system's name that needs to be documented, but the entire data model inside the system.

2. Where does our company store this data?

Maybe you’re lucky enough to be able to write a complete list of your company’s IT systems. With that list in hand, you ask your IT department where the systems are that store their data. They could very well get back to you with the names of other systems that aren’t even mentioned on your list. Your search would prove that there are more systems to document and account for than you thought.

3. What is our Data used for?

“It’s used for business operations,” your finance person might answer, but will neglect mentioning it’s also used for budgeting, forecasting, BI and analytics. Finance might even add a few more systems to your list, since they will include the data warehouses and analytical tools they use.

If you press them to define what they mean by “business operations,” they’ll likely say something like, “You know, reporting, analysis, and some self-service BI.” Then, they’ll look at you and ask whether you really need a complete list of where every little piece of data is used? With GDPR coming at you, you know the answer to that question.

4. Who has access to our data?

As the list of systems and data usage has grown from your inquiry, your certainty about who has data access has faded. The answer doesn’t just cover access to the main company systems, but also data that’s being pulled into separate systems for data analysis and visualisations, and even data that’s just being fetched into Excel and later emailed “to whom it may concern.”

So who has access to data? Probably a lot more people than you think. Asking “Why?” could very well turn your list into a novel and may even include some department’s dream of eventually using this data for a certain purpose.

Viewing GDPR as a Golden Opportunity

Clearly, the more people you ask within your business, the longer the list will be of systems and the different kinds of data usage. Everyone from the C-Suite to the DBA is looking for resources, man-hours, tools and platforms to help them with compliance.

Maybe, the answer isn’t about adding as many resources as possible to cover the most mileage. Instead, perhaps you should be looking for different approaches that will enable you to reach GDPR compliance. For instance, consider transforming this work item as an opportunity to strengthen your management control of all your data management platforms and to work smarter from this knowledge.

The race is on to become GDPR compliant and there’s lots of ground to cover. With May 25, 2018 headed our way, all organisations need to pick up speed. GDPR compliance requires many tasks but to get to the finish line it all it starts with the comprehensive audit, and the realisation that it is not just about data, but about business processes and the continued wish to stay data-driven as a business.

Information Management

You Might Also Read: 

10 GDPR Myths Debunked:

US Needs To Get Its Data Ready For GDPR:

Please check with info@cybersecurity-intelligence.com for more information.

« Organisations Need A Data Ethics Strategy
Very Few UK Girls Took Computing A-level »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

SafeCipher

SafeCipher

SafeCypher are crypto specialists with a very specialized knowledge of Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Quantum Resistant Cryptography and Crypto-Agility.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.