GDPR Compliance & Personal Data Protection

The General Data Protection Regulation is set to be a fact of life in less than six months, and arguably the biggest challenge facing enterprises across the globe is locating personal data sources and classifying them correctly.

Most organisations will have some degree of legacy data, whether paper or digital, and before taking any technical steps at all it is essential to ensure that this personal data locked in ERP and CRM systems is classified according to risk.

Although the general thrust of GDPR has been widely debated in the media and among security industry peers, much of the coverage to date has focused on the huge penalties for non-compliance, rather than looking at the opportunities of data discovery and process improvements for enterprises of all shapes and sizes. Indeed, a recent study found that 60 percent of EU organisations say they will face serious challenges in being GDPR-compliant, and in fact 40 percent of respondents report that their organisations do not view compliance with GDPR by the deadline as a priority.

Geographical Complications
This is all a matter of fact, rather than conjecture, but business responses to GDPR and its implications have varied considerably in my experience. Anecdotally, not many European and UK organisations have been giving the regulation enforcement date as a high priority as perhaps they could have done. Some will only be kicking off in December 2017, leaving them a mere six months to comply.

US companies are generally speaking not particularly prepared, and the complexity of the legal landscape is going to make it difficult for those who have not thought ahead. 

For example, companies with significant operations such as head offices outside the EU face the issue of adequacy, so will potentially need to construct a lawful mechanism to transfer data. The model contract clause is one such mechanism, another is binding corporate rules, but this mechanism does require prior planning, and approval from the ICO.

Geography and legalities aside, the most important element of a robust GDPR strategy is to evaluate people and processes first, technology is a facilitator to the processes that need to be put in place. 

This initiative is not a tick box compliance approach, and there is no plugin or tool that will simply make it all go away. On the positive side, there is plenty of opportunity to take this watershed moment in personal data management and look at harmonising company data policies, which have often grown up over time with significant overlap.

Data Discovery
Finding the precise location of data defined as ‘personal’ under GDPR from among the thousands of tables and columns (or fields) in complex and customised packaged systems, represents a significant challenge. 
Traditional tools and methods, such as searching for documentation, using templates and reference models or employing external consultants, do not address the challenge in an effective and timely fashion.

Safyr offers an interesting approach, it interfaces with all the most popular ERP and CRM solutions in order to speed up that discovery process. 

Speed and accuracy here are vital for several reasons, obviously ‘bad’ data discovery initially means that risk assessments will be skewed, and even worse it may cause a loss of focus, so that less critical issues are fixed first, rather than the real high risk issues. These issues are the major benefit of using a discovery tool, rather than attempting hand cranked scripted procedures.

Data Protection Impact Assessment
Unstructured data will be a major challenge for many organizations because of the nebulous nature of it and obtaining full information about it. For example, Salesforce, which historically slurps up huge amounts of information that might not be essential for everyday business, but will be highly relevant in a GDPR context.

The result is hidden risk, where in the event of a data breach business could be exposed to far greater penalties than they think if information is not correctly categorised. 

All new systems or updates to data systems should have a complete data protection impact assessment (DPIA), as mandated under article 35, that assess the risk profile, as well as facilitating the scoping of a new system. A DPIA is an excellent programme management technique, and should from now be a matter of course - if it was not before!

Information Asset Register
Another vital element of preparation for and compliance with GDPR is the setting up of an Information Asset register, which is specifically detailed under article 30. The aim is to inventory all the systems, electronic and paper based, that hold personal information. 

Data glossaries and/or data dictionaries support this register, and there are plenty of tools that can help with this, including many content management systems.

Overall, the imminent arrival of GDPR should be seen as a fantastic opportunity to get in-house policies, systems and technologies into shape, as well as demonstrating compliance in time for the deadline. While many enterprises are only just beginning to get started, those with the longest run-up will be those with the fewest unforeseen problems come mid-2018.

Information-Management

For Further GDPR Information please also contact The GDPR Advisory Board

You Might Aslo Read: 

The GDPR Advisory Board Offers Expert Advice:

 

« US Cyber Soldiers Go To The Battlefield
Canada’s Electronic Spies Unleashed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.