Time
1 hour 7 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

For Information Security students - Some of the security principles underlying GDPR

Video Transcription

00:04
this video is really end of students of information security.
00:08
I thought it might be interesting to draw out some of the security concepts that underlying GDP are on, highlight them so that you can see how they used in drawing up the regulations and the thinking behind them.
00:20
GDP are explicitly trolls on a number of security concepts,
00:24
security by design, meaning that we build security considerations into data protection from the start, rather than adding them on as an afterthought.
00:34
As we'll see later, there are data protection impact assessments that will now need to be carried out at the start of any new project that involved personal data to ensure appropriate protections are in place and that the supervisory authority is notified if required.
00:49
Security Body fault
00:51
meaning that i software networks, databases, websites, et cetera, are set to secure settings by default before they come into production, and that user privacy settings are compliant with the lower rather than requiring user intervention to make their data secure.
01:07
Confidentiality, integrity and availability.
01:10
We see confidentiality is requirement through the use of encryption and pseudo normalization,
01:15
pseudo normalization being the processing of personal data, such that it cannot be attributed to a specific individual without the use of additional information.
01:26
The importance of this is that if we do have a data breach on a day to restore it such that the details we hold about individuals is separate from their identity in the data was encrypted.
01:37
We should have a secure bridge.
01:41
We have integrity requirements around. Keeping data is accurate and up to date and data subjects having the right to review, amend and have their personal data arrays known as the right to be forgotten.
01:53
And we have availability requirements
01:56
when are required to stop the unauthorized access off changing of our deletion of personal data or it's miss categorization or miss labeling.
02:04
It is particularly important that special categories of highly sensitive personal data are recognized as such as they receive special protection and increased penalties for misuse and the GDP are
02:16
data minimization, which means limiting the amount of data processed and stored to that required by the purpose of the processing
02:25
security over technology,
02:28
GDP, ours technology neutral. It is concerned with the end
02:31
that being processing character in a secure, legitimate, fair and transparent manner rather than the means, the technology and processes it down to each company or organization to decide.
02:44
It is expected that organizations will follow best practice within their industry. That's the industry certifications. Thes things evolve,
02:53
finally, accountability.
02:54
It is a requirement that the data control I shall be able to show compliance with GDP are
03:00
at all times.
03:02
In the next video, we'll be looking at the security of processing.
03:06
In the meantime, thanks for watching.

Up Next

Introduction to General Data Protections

The General Data Protection Regulations (GDPR) are the new regulations governing the processing of personal data for citizens and residents in the European Union (EU). This course will provide an overview of those regulations

Instructed By

Instructor Profile Image
Angus Alderman
Information Security Officer at Boden
Instructor