Time
1 hour 7 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Compliance - Changes from the existing legislation - Demonstrating compliance

Video Transcription

00:04
Hello and welcome back to this introduction to GDP are
00:08
in this video. We'll show where changes have been made with existing legislation
00:12
and highlight the key points for compliance.
00:17
We'll start off by looking at the changes from the data protection directive.
00:22
The key changes that Judy PR brings to personal data protection are
00:26
standardization of regulations and enforcement.
00:29
This is to help develop the internal market by easing that transfer of data within the U
00:35
and reducing compliance costs to pan. You're being companies
00:39
member States can still create additional rules in some areas, so there will still be some wrinkles in this
00:47
personal data belongs with the individual, not the organization,
00:51
and the data subjects have enhanced rights.
00:56
These include the right to be for gotten on to move the date between companies.
01:02
Data privacy is a fundamental right,
01:03
as was discussed in one of the earlier videos.
01:08
GPR applies to any organization processing personal data of you based individuals.
01:15
This expands the scope of the regulations quite considerably to include foreign companies targeting you based individuals.
01:27
The GPR makes more demands on controllers with requirements to clearly and transparently explain to data subjects what their data will be used for
01:37
and explicitly recording that consent There. Also stricter rules around processing Children's data on the need for clear and child friendly notices to explain to Children what the data we collected for
01:49
also parental consent is likely for service. Is online. Service is aimed at Children.
01:55
Finally, processing itself must be carried out in a lawful, fair and transparent manner.
02:01
GE Pihl defined several patters of data which enjoy increased regulation of protections,
02:07
including racial, political, religious, health and genetic data. On these carry stringent penalties for misuse
02:15
by default, these categories of data cannot be processed,
02:19
so be sure of your legal basis for processing before starting
02:24
the right to AirAsia. Why the right of access to information on the right? Eric Strict processing for data subjects.
02:32
This follows on from the early point that personal data belongs to the individual, not to the lot of the organization.
02:38
So to manage, this organization's might will need to keep meta data so that they know what data they've held and had deleted
02:49
sit down immunization.
02:51
It's an important consideration for being able to achieve safe preaches. It entails splitting the data that can identify an individual from the other data the organization's hold on them.
03:00
Thes sets of data need to be kept separately and preferably encrypted, which is another recommendation of GDP are so that if the data is stolen, it is essentially useless on def is essentially useless. If you have a breach, you don't need to notify the to advise your authority or the data subjects
03:21
security by designer body fault.
03:23
These were important concepts. I mean that security can no longer be treated as an adult security person. Abby at the forefront of processes involving personal data and security decisions and need to be documented for compliance.
03:36
The security concerns all rights of the data subjects need to be adequately addressed before processing could be started.
03:44
Records of processing
03:46
AII the types of personal data being processed
03:49
on the purposes for which they're being processed.
03:53
The Data Protection officer. This is a specified roll with defined responsibilities within the regulations on reporting to the highest level of management. Usually, the board
04:03
the rolls have primarily involved in ensuring compliance with the GDP are within the organization
04:09
On is the main point of contact between the Organization of the Supervisory Authority,
04:15
data protection impact assessments or privacy impact assessments, as they used to be known.
04:18
You must carry out a data protection impact assessment on any higher it's processing. Four is commenced.
04:27
Personal data breach notification. There were new rules around this breaches that involves risk of harm to data. Subjects must be notified without onto delay on within 72 hours.
04:39
That's 72 hours in which to notify the supervisor authority of the initial bridge. Further information can be sent along in the days and weeks that follow, and also the supervisor authority themselves may want you to provide them with additional information.
04:55
Data subjects have a right to complain about unfair processing to their supervisory authority. Will progress the complaint with the controller's supervisor authority,
05:03
administrative fines and now 10 million euros, or 2% of global revenues on up to 20 million euros, off 4% of global revenues, whichever is higher. For more severe breaches involving special characters, data consent or the severity of the break
05:21
accountability, the controller must be able to show compliance at all times.
05:30
So, as I said, the organizations are now required to be able to demonstrate compliance at all times. This involves documenting their actions as well as being compliant in their processes,
05:41
so they need to establish the lawfulness of processing.
05:45
This will be typically through express consent of data subjects, a contract, a legal requirement or a relationship where processing is expected.
05:56
Consent must be recorded on mechanisms for withdrawing. Consent must be in place if needed.
06:01
Specific consent from data subjects for processing special categories of data
06:06
Mechanisms for withdrawing consent must be in place if needed.
06:12
Security bodies on a body fault
06:15
or processes must start with due consideration of protecting data subjects from harm on making adequate mitigation of the risks.
06:23
Remember, information security is primarily a risk management exercise.
06:30
Perform data protection bites, assessments or data privacy in facts Assessments.
06:33
This must be performed any higher is processing before it is commenced. This is the risk on individual rights and freedoms rather than the risks faced by the organization.
06:46
Pseudo normalization, as I mentioned before, means the processing of personal data such that it can no longer be attributed to the data subject without additional information,
06:56
provided that such additional information is kept separately protected with suitable technical organizational measures to prevent attribution to the individual
07:04
encryption problem implemented should allow for a safe breach. Either data is unintelligible
07:12
and a safe breach will mean that you don't have to notify the breach. Do us who provides your authority or to the data subjects
07:19
appropriate security and privacy policies? This may time of the organizations I s a mess.
07:27
Their information security management system, such as I said 27,000 won.
07:32
Allow data subjects to view amend, move on, delete their personal data.
07:38
As I mentioned before, personal data belongs to the individual rather than to the organization.
07:42
So it's likely that organizations will be required to provide some form of data portal so that the data subjects in access their data
07:50
data portability will also be required.
07:54
Data portability will also require that data is held in industry standard formats,
08:00
as is already the case say, with mobile phone data,
08:05
keep records of processing activities. I either types of data being processed in the purposes for which they're being processed,
08:13
appointed data protection officer.
08:15
This could be voluntary or mandatory. If the organization is a public authority or body,
08:20
the controller or process of that process is personal data on a large scale
08:26
or if the organization processes special categories of data on a large scale,
08:33
able to detect and notify personal data breaches without undue delay.
08:37
Where bridges pose of rest a day. Two subjects. This is typically within 72 hours. He must also keep an internal breach, register
08:46
a body by industry standards, best practices and code of conduct.
08:52
Obtaining certification of compliance as they become available.
08:58
Management of processes
09:01
GDP are imposes. A high duty of care or control is and select in their personal data processes.
09:05
Contracts must be carefully drafted to limit processing on the length of time that the personal data will be held on Imposes obligations on the process. Sir, such as assistance with a notification of breaches
09:18
and ensure that these are applied on any sub processes.
09:22
Legitimate transfers, a personal data to third countries or within in the international organizations
09:30
by default. Transfers of personal data to third countries are unlawful, so the onus is on. The controllers have clearly documented the reasons why the transfers a lawful and so have the technical and organisational processes in place
09:41
to protect the rights and freedoms of the data subject.
09:46
Well in this first set of videos I've tried to cover the main areas of GDP are on in particular to look at new things that appeared in the regulations.
09:54
It's important. Remember, this is new legislation on that tested in practice
09:58
only does he have that supervisor. Authorities and courts interpret the law.
10:03
And there's also the work of the Article 29 Working Party, which works the right guidance in clarity on specific aspects of data protection.
10:11
Anyway, thank you very much watching these videos, and I hope they've been informative and helpful to you
10:16
Goodbye.

Introduction to General Data Protections

The General Data Protection Regulations (GDPR) are the new regulations governing the processing of personal data for citizens and residents in the European Union (EU). This course will provide an overview of those regulations

Instructed By

Instructor Profile Image
Angus Alderman
Information Security Officer at Boden
Instructor