4 Steps To Get Ready For GDPR

For any organisation that does business in the European Union (EU) in any capacity, it’s no secret that the General Data Protection Regulation is a crucial piece of legislation.

Every company that has offices, customers or partners based in the European Union will be affected, and come May 25, 2018, the way we are working with their data will be under strict new guidelines, impacting the way we do business.

It won't take long after the deadline before the gloves come off and the EU cracks down on audits of big tech companies. We're talking about Uber, Google, Apple and so forth. This will be EU's effort to reinforce the severity of meeting GDPR regulations and to show that no business, not even the household names, will be immune to complying with GDPR stands.

After the EU cracks down on the big tech companies, financial institutions and travel companies will be next, as these types of organisations are the most globalised industries, where data flows freely across geographical borders.

And regardless of the EU’s efforts, the reality is that many companies won’t meet the May deadline, whether due to lack of resources, laziness or apathy. You better believe that those businesses that don’t get on board, and get caught, will be crushed, as business will come to a grinding halt.

If you are behind, or aren’t taking action to prepare for GDPR right now, you may be straggling, but you’re not too late. The process may be a beast, but it’s absolutely manageable if you’re organised. Here are four tips to begin your GDPR journey:

  1. Establish a privacy program. This is the first place you should start. If you do this upfront, then when new regulations come out, you have a set baseline of where you are at and can more efficiently fill in the gaps. There will always be new regulations your organization must embrace, so get ahead of the curve while you can. The privacy program must address data flow, data classification, critical systems and encryption.
  2. Hire a Data Privacy Officer. Designating a person to lead the charge on providing the company with best practices on how to approach data privacy is critical. This role helps employees understand where the organization’s data resides and how best to protect it with methods like encryption. Additionally, make sure this person actually has proper certifications by May 2018, and is truly qualified for the position. This role will only continue to increase in importance for companies working in the global market that must remain compliant across borders. Also, make sure you have a privacy attorney either on staff or retainer.
  3. Seek third-party validation for your organization. Any streetwise potential customer or partner will request this while you’re working out the fine print of any contract, so you may as well beat them to the punch. This will also allow for you to protect your business in the event of a breach, so that you are not held liable because of accusations you aren’t GDPR compliant. You have a couple options for obtaining such validation. You can either conduct a rigorous self-assessment, or seek an external audit firm. Most audit firms are still not trained and properly qualified to run a data protection impact assessment.
  4. Hold your partners and vendors to the same standards. While you continue on your journey to GDPR compliance, make sure you also monitor for progress with any partners or vendors your business works closely with. Tell-tale signs include the aforementioned tips — i.e. do they have a privacy program, a Data Privacy Officer and third-party validation?

Another clue they are well equipped to handle GDPR regulations is they are a cardholder data environment (CDE), defined by the PCI Security Standards Council as “the people, processes and technology that store, process or transmit cardholder data or sensitive authentication data.”

Most vendors today do not have their entire data flow or infrastructure as a CDE. However, those that do have a distinct advantage as everything is already encrypted and treated as mission critical.

In order to confirm this status with a partner or vendor, all you need to do is ask for a Attestation of Compliance for proof, and confirm that they are leveraging data loss prevention software in order to protect their data.

Avoid the Pitfalls

While the process of achieving GDPR compliance is a lengthy one, you still have time. In fact, it may be a bold statement for any organisation to come forward at this point and claim it is GDPR compliant. Why?

Because most third-party auditors are still wrapping their own heads around the process, and haven’t quite gotten to the point where they can provide validation for their clients.

If you do come across a business making this claim, don’t take the marketing language at face value. Instead, ask one simple question: “Where is their third-party validation?”

Most companies will not be able to answer that simple question. In the meantime, you can get a quick evaluation of a cloud-based company’s GDPR readiness from Cloud Access Security Brokers vendors like NetSkope.

Additionally, write off any company that says it is already GDPR compliant because they have another type of certification, such as SOC 2 or HIPAA. While there may be numerous common controls, there are core differences between each that cannot be ignored.

In the coming months, diligence will be key when it comes to not only preparing your own organisation for GDPR compliance, but also placing the same standards on vendors, partners and others you do business with. Just remember: breathe, take it one step at a time, and whatever you do, don’t fall for scare tactics.

The GDPR is new data protection legislation that comes into force from 25 May 2018. Non-compliance will mean hefty fines, up to 4% of annual global turnover or up to €20 million, whichever is higher, so getting in line is essential.

All organisations operating in the EU must become GDPR compliant, and in doing so, face many questions as to what they should be doing with any personal data they hold and when. The newly launched GDPR Advisory Board is there to help with this important process that will be seen as a priority for many businesses across 2018.

For Further GDPR Information please also contact The GDPR Advisory Board:

Information Management: 

You Might Also Read: 

You Need to Know About The General Data Protection Regulation:

GDPR Requirements, Deadlines And Facts:

 

« FBI's Ability To Disrupt Cybercrime Has Deteriorated
Russian Troops Use Missiles & Cyber To Counter 'swarm of drones' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

CITRA - Information Security and Emergency Response

CITRA - Information Security and Emergency Response

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.