GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

GDPR has been a running story in DataIQ since it launched in 2011, through the 3,000-plus amendments and four years it took to become law and now in the final few months running up to enforcement.

With the first GDPR Impact research in 2016, 46.0% of businesses said they were very aware of the new data protection law. One year later, however, this figure was stuck at nearly the same level (50.0%).

Yet the last 12 months seem to have been decisive with a dramatic rise in this number to 84.3%.

Compliance is hard won and Never Certain

If this had not happened so close to the enforcement regime starting, it would have been a cause for concern. Companies need to look deeply into their data-driven processes, data management and data governance policies.

What they find is not always easy to resolve, which may explain that only 25.4% describe themselves as very prepared for GDPR.

Compliance is hard won and never certain, so it is understandable if 61.0% describe themselves as somewhat prepared.

With much guidance still pending and legal opinion either conflicting or so risk averse as to make existing business practices often look impossible to bring into line, it is better to adopt a cautious view.

But that is only if the Regulation is viewed from a purely compliance point of view. It certainly merits a legally-oriented perspective at the outset of any programme. Unless those strictures are closely considered and mapped against the operating model of the business, it will be difficult to spot the gaps in which risk might arise.

Ticking the box of compliance should not be the end-point, however. Whatever the letter of the law, GDPR is also a major opportunity to reset the relationship with customers and get ahead of any concerns they might have about data sharing, security and control.

This is why maturity in the adoption of data and analytics becomes a strong indicator of whether the underlying culture of an organisation has evolved or if it is just trying to stay within the parameters set out by the Regulation. In this perspective, there seems to be a positive correlation between preparing for GDPR and data ratification of the business.

Back in 2016, just 39% described themselves as in the upper two quintiles of maturity (Managed and Optimised). This year, the number has risen to 62.7%, meaning the majority of UK companies are putting data and analytics at the heart of how they operate. That is likely to mean they will realise commercial benefits from their compliance efforts, not just risk mitigation.

“It comes down to knowing how and where to focus training and measurement, rather than system fixes.”

So how can your company find out whether it is heading towards both compliance and value-adding data maturity? One way is to carry out a capability audit, like DQM GRC’s RADAR.

As technical director Peter Galdies explains, “this involves a real inspection of practice and process to understand the business thinking and highlight where business process needs to be re-engineered. Often, this comes down to knowing how and where to focus training and measurement, rather than system fixes.”

While it is tempting to believe that organisations only need to assess their compliance with GDPR once, the reality is very different, he warns.

“The law itself requires that the organisation be capable of continually demonstrating its compliance, and if you are the kind of organisation that needs a Data Protection Officer, then a key part of that role is to audit or assess that compliance.”

In fact, when it comes to implementation, the GDPR river runs very deep indeed. The cultural and system changes expected by the legislators cannot be fixed by technology or training alone and require a process of continual self-inspection. This is inherent in the expected behaviours of “privacy by design” and “data protection by default” which the regulators demand of organisations under the GDPR regime.

“To effectively understand your organisation’s ability to comply both today and, importantly, in the future, a robust assessment process (like our GDPR Radar) has to examine not only if you have the right controls, but also if you have the right management systems in place around those controls to ensure they will still be working for you going forwards,” says Galdies.

“That means measuring the maturity of your compliance processes, not just ticking boxes.”

Evidence gained from a data audit of this type provides a powerful basis on which to explain to the board what more might need to be done, above and beyond any box-ticking for compliance purposes.

It is also a useful demonstration of accountability to prove that you are reaching for compliance, too. And hitting two birds with one stone is always a real sign of advanced abilities.

To contact the GDPR Advisory Board please visit:  www.gdpr-board.co.uk

DataIQ

You Might Also Read:

GDPR - Questions & Answers:

« AI And Blockchain In A Disruptive World
Six Steps to Protect Customer Data »

Directory of Suppliers

WEBINAR: How to prioritize security controls for sensitive AWS assets

WEBINAR: How to prioritize security controls for sensitive AWS assets

Thursday June 18, 2020: Join AWS Marketplace and Sounil Yu to learn best practices for tracking and protecting sensitive data in your Amazon Web Services (AWS) environment.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

zwipe

zwipe

Zwipe provides biometric authentication solutions in three key areas - Payments, Access Control and ID.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

Novetta

Novetta

Novetta has pioneered disruptive technologies in four key areas of advanced analytics: data, cyber, open source/media and multi-int fusion.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.