GDPR Compliance & Personal Data Protection

The General Data Protection Regulation is set to be a fact of life in less than six months, and arguably the biggest challenge facing enterprises across the globe is locating personal data sources and classifying them correctly.

Most organisations will have some degree of legacy data, whether paper or digital, and before taking any technical steps at all it is essential to ensure that this personal data locked in ERP and CRM systems is classified according to risk.

Although the general thrust of GDPR has been widely debated in the media and among security industry peers, much of the coverage to date has focused on the huge penalties for non-compliance, rather than looking at the opportunities of data discovery and process improvements for enterprises of all shapes and sizes. Indeed, a recent study found that 60 percent of EU organisations say they will face serious challenges in being GDPR-compliant, and in fact 40 percent of respondents report that their organisations do not view compliance with GDPR by the deadline as a priority.

Geographical Complications
This is all a matter of fact, rather than conjecture, but business responses to GDPR and its implications have varied considerably in my experience. Anecdotally, not many European and UK organisations have been giving the regulation enforcement date as a high priority as perhaps they could have done. Some will only be kicking off in December 2017, leaving them a mere six months to comply.

US companies are generally speaking not particularly prepared, and the complexity of the legal landscape is going to make it difficult for those who have not thought ahead. 

For example, companies with significant operations such as head offices outside the EU face the issue of adequacy, so will potentially need to construct a lawful mechanism to transfer data. The model contract clause is one such mechanism, another is binding corporate rules, but this mechanism does require prior planning, and approval from the ICO.

Geography and legalities aside, the most important element of a robust GDPR strategy is to evaluate people and processes first, technology is a facilitator to the processes that need to be put in place. 

This initiative is not a tick box compliance approach, and there is no plugin or tool that will simply make it all go away. On the positive side, there is plenty of opportunity to take this watershed moment in personal data management and look at harmonising company data policies, which have often grown up over time with significant overlap.

Data Discovery
Finding the precise location of data defined as ‘personal’ under GDPR from among the thousands of tables and columns (or fields) in complex and customised packaged systems, represents a significant challenge. 
Traditional tools and methods, such as searching for documentation, using templates and reference models or employing external consultants, do not address the challenge in an effective and timely fashion.

Safyr offers an interesting approach, it interfaces with all the most popular ERP and CRM solutions in order to speed up that discovery process. 

Speed and accuracy here are vital for several reasons, obviously ‘bad’ data discovery initially means that risk assessments will be skewed, and even worse it may cause a loss of focus, so that less critical issues are fixed first, rather than the real high risk issues. These issues are the major benefit of using a discovery tool, rather than attempting hand cranked scripted procedures.

Data Protection Impact Assessment
Unstructured data will be a major challenge for many organizations because of the nebulous nature of it and obtaining full information about it. For example, Salesforce, which historically slurps up huge amounts of information that might not be essential for everyday business, but will be highly relevant in a GDPR context.

The result is hidden risk, where in the event of a data breach business could be exposed to far greater penalties than they think if information is not correctly categorised. 

All new systems or updates to data systems should have a complete data protection impact assessment (DPIA), as mandated under article 35, that assess the risk profile, as well as facilitating the scoping of a new system. A DPIA is an excellent programme management technique, and should from now be a matter of course - if it was not before!

Information Asset Register
Another vital element of preparation for and compliance with GDPR is the setting up of an Information Asset register, which is specifically detailed under article 30. The aim is to inventory all the systems, electronic and paper based, that hold personal information. 

Data glossaries and/or data dictionaries support this register, and there are plenty of tools that can help with this, including many content management systems.

Overall, the imminent arrival of GDPR should be seen as a fantastic opportunity to get in-house policies, systems and technologies into shape, as well as demonstrating compliance in time for the deadline. While many enterprises are only just beginning to get started, those with the longest run-up will be those with the fewest unforeseen problems come mid-2018.

Information-Management

For Further GDPR Information please also contact The GDPR Advisory Board

You Might Aslo Read: 

The GDPR Advisory Board Offers Expert Advice:

 

« US Cyber Soldiers Go To The Battlefield
Canada’s Electronic Spies Unleashed »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.

ArmourZero

ArmourZero

ArmourZero help organisations redefine their cybersecurity strategy - increase visibility, minimise complexity, manage risk, and enhance protection, all under a unified security operations platform.