4 Steps Toward A GDPR Compliance Audit

Many organisations are starting to feel stressed and perhaps a bit confused by the General Data Protection Regulation that is quickly approaching us and will hit May 25, 2018.

Indeed, the more I talk to companies, the more I hear the same question: “What exactly is it that I am supposed to do?”

The answer is, 'plenty.' But first, it’s essential that we understand what we’re dealing with.

If you’ve worked with regulations such as Sarbanes-Oxley (SoX) or Health Insurance Portability and Accountability Act (HIPAA) before then you have likely heard about GDPR. And like with those other regulations, the ramifications of not being in compliance when it goes into effect are severe.

GDPR views each and every person that an organisation interacts with (either inside or outside the company) as a center cog and every interaction as a digital footprint that requires handling “the GDPR-way.”

Note to US organisations: even if your company is based outside the EU, you may still need to be GDPR compliant. What determines the need for compliance is who you hold data on. If you collect data on any EU citizen, you are subject to the regulations. This includes selling or shipping an item to someone in the EU, or even shipping inside the US but the person doing so is using a credit card from the EU.

GDPR touches upon how we use and store data, for how long and for what purpose. It addresses how we inform individuals about which data we hold, how to anonymise the data and how we delete it.

It also requires control over scenarios such as who responds to the request from the consumer exercising their right to be 'forgotten' and to make sure that it’s dealt with within reasonable time. The fact that some organizations are now required to hire a data protection officer (DPO) suddenly means that GDPR takes on an entirely different level of importance. With that, GDPR guidelines requires that many organisations do a comprehensive business process overhaul.
 
With that in mind, some organisations might consider shutting down a system or platform as “the solution,” because they feel as though they cannot oversee GDPR and don’t want to risk being imposed with a fine. But how many days are you willing to run your business without your HR system or your BI and analytics platform? You built and implemented them for a reason.

Starting Line - The Audit

Suffice to say, you’d rather not shut down systems and would prefer to become GDPR compliant. The next question is what do you do? To begin, a healthy audit is required, so you start by asking yourself these questions:

1. What data does our company hold?

Awe, that’s an easy one you think. You list the different systems that come to mind: ERP, CRM, HR. But then you wonder, “What is the name of the system we use for data analytics?” You then realise that it’s not just the system's name that needs to be documented, but the entire data model inside the system.

2. Where does our company store this data?

Maybe you’re lucky enough to be able to write a complete list of your company’s IT systems. With that list in hand, you ask your IT department where the systems are that store their data. They could very well get back to you with the names of other systems that aren’t even mentioned on your list. Your search would prove that there are more systems to document and account for than you thought.

3. What is our Data used for?

“It’s used for business operations,” your finance person might answer, but will neglect mentioning it’s also used for budgeting, forecasting, BI and analytics. Finance might even add a few more systems to your list, since they will include the data warehouses and analytical tools they use.

If you press them to define what they mean by “business operations,” they’ll likely say something like, “You know, reporting, analysis, and some self-service BI.” Then, they’ll look at you and ask whether you really need a complete list of where every little piece of data is used? With GDPR coming at you, you know the answer to that question.

4. Who has access to our data?

As the list of systems and data usage has grown from your inquiry, your certainty about who has data access has faded. The answer doesn’t just cover access to the main company systems, but also data that’s being pulled into separate systems for data analysis and visualisations, and even data that’s just being fetched into Excel and later emailed “to whom it may concern.”

So who has access to data? Probably a lot more people than you think. Asking “Why?” could very well turn your list into a novel and may even include some department’s dream of eventually using this data for a certain purpose.

Viewing GDPR as a Golden Opportunity

Clearly, the more people you ask within your business, the longer the list will be of systems and the different kinds of data usage. Everyone from the C-Suite to the DBA is looking for resources, man-hours, tools and platforms to help them with compliance.

Maybe, the answer isn’t about adding as many resources as possible to cover the most mileage. Instead, perhaps you should be looking for different approaches that will enable you to reach GDPR compliance. For instance, consider transforming this work item as an opportunity to strengthen your management control of all your data management platforms and to work smarter from this knowledge.

The race is on to become GDPR compliant and there’s lots of ground to cover. With May 25, 2018 headed our way, all organisations need to pick up speed. GDPR compliance requires many tasks but to get to the finish line it all it starts with the comprehensive audit, and the realisation that it is not just about data, but about business processes and the continued wish to stay data-driven as a business.

Information Management

You Might Also Read: 

10 GDPR Myths Debunked:

US Needs To Get Its Data Ready For GDPR:

Please check with info@cybersecurity-intelligence.com for more information.

« Organisations Need A Data Ethics Strategy
Very Few UK Girls Took Computing A-level »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.