You are on page 1of 44

GDPR Edition 2020

GDPR: 2020
AND BEYOND
The things which are

GDPR IS STILL AN
at the forefront in 2020
and Beyond

FROM ‘PRIVACY UNTAMED ANIMAL


IS DEAD’ TO At first glance, this sounds
like the GDPR has become the

‘PRIVACY IS toothless animal some of


us had hoped for all along.

PARAMOUNT’
It is now abundantly
clear that privacy is
paramount.

RISMA SYSTEMS:
A Comprehensive Approach to
Governance, Risk & Compliance
Lars Nybro Munksgaard
CEO & Founder
Cutting-edge device management solutions

We offer end-to-end device management solutions, consolidating all devices, processes and
stakeholders into one easy-to-use platform.

Our solutions enable users to increase instructional and administrative effectiveness, reduce
operational complexity, and save time and money, making device management smarter and
more focused.

Use cases:

MDM for Classroom Interactive


Education Management Touchscreen
Management

VR Command Single-Purpose MDM/EMM


Center & MDM Device
Management

June2020 2
Feb 2020 2
Radix Technologies Ltd. I 8 Haharoshet St., Or Yehuda, Israel 6037576
VISO benefits:

Modular and Supports many Serves all


flexible devices and OS stakeholders

Cloud-based Features Integrated by Tailored for


or on-premise designed for leading device single-purpose
solution education manufacturers devices

Our platform empowers:

IT Administrators Teachers Principals VR Coordinators Project Managers


Centrally manage, Easily manage the Analyze and Control and guide Make fact-based
monitor and secure learning on school optimize device immersive VR decisions based on
your entire fleet or BYOD devices usage experiences reports

Our solutions are trusted by leading global device manufacturers and vendors, and are implemented
in millions of devices worldwide, helping to increase performance and stability while minimizing
downtime, serving a wide range of clients: SMBs, enterprises, governmental organizations, security
services, financial institutions, universities, and training and education centers.

June
Feb 2020 3
+1-833-9606350 (US Toll Free) info@radix-int.com www.radix-int.com
TABLE
OF CONTENTS

RISMA SYSTEMS:
A Comprehensive
Approach to
Governance, Risk
and Compliance

08

LARS NYBRO MUNKSGAARD


CEO & Founder
RISMA Systems
June 2020 4
Cover Story
Alert Logic
12

Boldon James

16

Gemserv

Happiest Minds 22

Eccenca
26 FROM EDITOR’S DESK

Sytorus Ltd What are the Rights related to GDPR? 14

A Bottom-up Viewpoint to Privacy in GDPR 20

The Remarkable Effects of GDPR on the Cloud 24


34
The Do's and Don'ts to Endure GDPR Compliant 28

Resolving Data Governance with respect to GDPR 32

38 How Privacy and Compliance is Salient in the GDPR Era? 36

GDPR: What does it mean for Businesses and Consumers? 40

June 2020 5
Editor’s N o t e

As the world is turning into a technology land, a huge number of high-profile data breaches had
been witnessed in the last few years. This has made consumers more aware of their data privacy
and is seeking to invest in businesses that not only meet higher standards of data privacy, but also
emphasizes on data privacy training for employees. Organizations have realized that a single role
is not enough to manage, supervise and implement data protection laws and policies.

Thus the GDPR, an 88-page law containing 11 chapters and 99 articles, was implemented by the
European government in 2018 to improve and unify data privacy practices of EU residents, marking
the beginning of the new era of data privacy. It has extended the existing duties of contractual
protections with data processors and sub-processors, advanced data protection, and evidence of
compliance. Moreover, with the application of GDPR, companies are required to be much more
transparent about what data they share with third-parties and how third parties use the data by
propagating data retention and data removal policies.

Enacted by more than 60 jurisdictions around the world, focusing on postmodern privacy and data
protection laws, GDPR has been a revolutionary act. It has enabled governments to have a better
control over regulations and laws regarding data privacy and create a cohesive national law on
governing privacy and security. GDPR also creates a framework where organizations can keep a
tab on how they process personal data.

In the coming years, companies will increase awareness about how to process, manage, store, and
secure their data, and modify more heavily regulated legislative procedures to build better data
quality and data governance industry standards. GDPR will disrupt the business landscape of not
only the European Union but also globally, helping organizations gain long term public trust.

Happy Reading!
Ben Johnson
Editor
June 2020 6
CEO and Publisher
The CEO Views
GDPR Special June 2020

Editor Ben Johnson

Web Development & Maintenance Kevin Parker

Client Service Manager Shawn Johns

Project Manager Tracy Watson

Graphic Designer George Miller

Business Consultant Crystal Thomas


contact@theceoviews.com

Corporate Office
The CEO Views
39304, GENEVA DR
FARMINGTON HILLS
MI 48331

Follow us on: https://www.facebook.com/ceoviews/


https://twitter.com/TheCEOViews

June 2020 7
Cover Story

RISMA Systems:
A Comprehensive Approach to
Governance, Risk and Compliance

“ RISMA Systems develops


groundbreaking solutions Lars Nybro Munksgaard
ensuring optimal resource CEO & Founder

use in organizations.
June 2020 8
RISMA Systems:
RISMA Systems was founded in 2014 by Lars partner is one of the largest law firms in the
Nybro Munksgaard, who initially developed a Nordics. They flipped the regulation into simple
system that helped accountants and lawyers with questions, so when ordinary users help the DPO
the repetitive tasks of Risk Management. with crucial information for the GAP-analysis, they
Although RISMA Systems started as a Risk update RISMA with the critical knowledge known to
Management solutions provider, now it is them about their area of the business. Then RISMA
dedicated to become a complete one-stop GRC converts it into insights suitable for building a
platform. RISMA Systems develops complete GDPR compliant framework, both
groundbreaking solutions ensuring optimal initiating actions plan to close gaps, and an “off the
resource use in organizations. Through its shelf” controls catalog to stay compliant in the
user-friendly online tools, RISMA helps to ensure future.
that all levels of an organization always have
access to updated and relevant information. RISMA recognizes the many GDPR-only solutions
out there, but as the legal tech and regtech market
RISMA software has two guiding stars, and the
organization aims to become a full GRC-platform
so that the customers can rely on just one solution “ RISMA Systems develops
for all the GRC-related tasks. “The organization is
heavily focused on usability and user-friendliness
groundbreaking solutions
to make the platform accessible for all, not just ensuring optimal resource
the experts but also for every employee involved use in organizations.”
in processes around governance, risk, and
compliance. The organization has a flexible
solution, where it is easy to add new compliance mature, it believes in the suite approach for GRC. For
areas as they emerge,” states Lars Nybro RISMA, GDPR is just another compliance area, which
Munksgaard, Founder and CEO of RISMA. Just needs intelligent software support. Combining the
like the case when GDPR & CCPA was in the RISMA engine with a strong knowledge partner, the
brewing. RISMA added the new regulatory organization had a market-leading solution, and
framework to the solution, and then activate with continuous updates as GDPR evolves, RISMA
widgets to support, i.e., mapping out business makes sure to stay ahead.
processes, collecting information from the
business, GAP-analysis, risk assessment, When approaching businesses and organizations,
initiatives, and controls. RISMA see many challenges within governance, risk,
and compliance. The biggest one is acknowledging
RISMA Systems is a fast-growing software the importance of having a professional approach to
company that supplies compliance tools to GRC or not understanding the consequences of
organizations and authorities, and not a slacking. It is simply not on the top management radar
consultancy. So, when the legislation demands at the same level as growth, revenue, and profits even
specific legal or regulatory insights, RISMA though GRC, in many cases, represent a license to
partners with leading industry experts. This was operate and could pose either significant risks or
also the case with GDPR, where the knowledge competitive advantages depending on the approach.

June 2020 9
GRC will only become increasingly important with the of manual labor. It does work for some, but in the
continued demands for data security/integrity, long run, an organization can end up with static
increasing legislation, and potential penalties. information, undocumented processes, and little
or no ability to report to top management or
The lack of top management involvement and authorities, the long wasted hour being the most
support usually means that GRC is underfunded; worrisome disadvantage.

Risma Management Team

Nicolai Ascanius, Lars Nybro Munksgaard, Gitte Barsøe Pedersen, Mikael Johannesen,
Chief Information Officer CEO & Founder Customer Success Director Chief Commercial Officer

governance and compliance teams operate as a The biggest benefit of using RISMA and a GRC
small independent silo, and the platform is all the process and knowledge support
GRC-professionals are perceived as someone provided by the platform. It covers all the needs in
bothering the real business. In most companies, handling, controlling, and documenting the GRC
the approach to GRC and GDPR is a manual, across the entire business, and an organization can
handheld process with little or no platform have all the functionality automatically
support. RISMA's biggest competitors are still the out-of-the-box- policy and process library,
word, excel, and share point combined with a lot information mapping tools, GAP-analysis, actions

June 2020 10
and controls, dashboards and reporting. A company can have the most advanced tech
stack in their GRC-solution, but if it does not help
Once the clients have system support of their GRC, the GRC-professionals to engage the workforce
it can be seen that there is a speedy maturity curve with key knowledge from HR, Sales, Marketing,
within the organizations. Now the GRC-teams etc., then it is of no use. So thirdly, RISMA is also
spend more time on actual value-adding spending a fair portion of the development of
GRC-matters rather than wasting it on copying continuously having the most user engaging front
information from emails to excel. Now top end for both experts and novelty users.
management and boards get better and frequent
reporting, which eventually educates executives to In one instance, a global production company with
know the importance of GRC, and suddenly they different takes on compliance and governance
even know which questions to ask, which task to was facing a challenge as they did not have a
give, and which targets to set and expect. At that structured framework to support all their
point, the GRC-platform becomes an enabler of sustainability initiatives. Over the last years, they
supporting strategic business goals and eliminates have become increasingly devoted to
a lot of risks itself, especially by much better sustainability and are very committed to the UN
utilization of the GRC-professionals. sustainability goal as a UN Global Compact. So,
RISMA has started a co-creation process, and it
does make sense to look at sustainability from a
compliance and governance perspective. RISMA
“ The biggest benefit of using
is geared to help them structure all their initiatives,
RISMA and a GRC platform is all collect valuable information from all departments
the process and knowledge involved, and document that they follow the track,
support provided by the platform.” mentioned by the organization. So, now the CEO
and top management can communicate
confidently both internally and externally based
In terms of technological advancements, RISMA on actual progress in processes, initiatives, and
System has 3 focus areas. Experimenting and controls.
applying artificial intelligence and machine learning
when adding even more automation and predictive RISMA is a Nordic-based company with offices in
modeling to the GRC work. A second focus is Denmark, Norway, and Sweden, and the
continued flexibility, not only within RISMA and GRC organization is planning for a European expansion,
but opening the solution with smooth integrations to expecting people on the ground in key countries
other relevant systems, i.e., ERP, KYC-solutions, within the next 2-3 years. However, RISMA is a
project management. Just like GRC should not be a SaaS-company, and it serves globally from its
silo for professionals, it should not be as a platform. current locations. RISMA also sees increasing
So, RISMA should be a part of a business software interest from both North and South America, mainly
ecosystem, and through integrations and APIs, the due to the combination of being complete GRC and
organization leverage the natural synergies to and the user-centric approach, which also means a
from other systems with data, insights, triggers, US-expansion perhaps, but it has not been decided
alerts, tasks, etc. if it will be direct or through partners.

June 2020 11
CXO Thoughts

Quick, Accurate
Threat Detection
is Best Defense Onkar Birk,
Against GDPR Chief Product
Officer,
Non-Compliance Alert Logic

he General Data Protection Regulation (GDPR)


went into effect two years ago. The European Union
established strong, common standards for data
protection, and ensured that individuals retain control of
their personal information. They also introduced serious
consequences to enforce those standards, and companies
that have failed to comply with GDPR have been hit with
significant fines and penalties. This far along, it may seem
like there wouldn’t be much to talk about when it comes to GDPR—and the need to protect data and privacy in
GDPR, but maintaining compliance is an ongoing challenge general—will be a central focus of cybersecurity efforts over
as technology evolves and the issues of data protection and the next few years, and a primary driver for security teams
personal privacy continue to be a primary concern. seeking out more robust cybersecurity solutions.
Maintaining compliance with GDPR and taking every
precaution to protect sensitive data builds customer
confidence and loyalty.

Challenges of GDPR

There are a number of cybersecurity tools and controls that


play pivotal roles in achieving and maintaining compliance
with GDPR. Encryption protects data from access or
compromise by unauthorized individuals. Identity and
GDPR
access management (IDAM) limits access to personal data.
Data loss prevention (DLP) tools and policies prevent the
exposure or theft of data. These cybersecurity tools
contribute to limiting access and avoiding exposure or
June 2020 12
compromise of data, but the real holy grail for organizations organization and then respond to eliminate, investigate, or
is the ability to quickly detect when an attacker is able to get contain them. Today, this can mean monitoring on-premises
past these defenses. and cloud deployments, endpoints, containers, mobile
devices, and other IOT (Internet of Things) and edge devices.
GDPR requires that organizations have an incident response
MDR has increased in visibility and importance as
plan (IRP). According to GDPR requirements, “In the event of
organizations realize that the scale and complexity of the
a potential data breach that involves personal information,
security challenge becomes intractable for individual
an organization must notify the Data Protection Authority
organizations, regardless of size.
without undue delay, within 72 hours if feasible, after
becoming aware of the breach; and Communicate high-risk According to Gartner, “By 2024, 40% of midsize enterprises will
breaches to affected data subjects without undue delay.” use MDR as their only managed security service.” 1 The MDR
provider provides the security tools, the threat intelligence, and
Constant Vigilance is Key
the security experts, enabling you to not only protect your data
The ability to quickly detect attacks that slip through is one and maintain GDPR compliance, but giving you more effective
of the most important elements of effective cybersecurity. cybersecurity and peace of mind in general.
There is no amount of investment in cybersecurity that will
Rapid Response Equals Minimal Impact
prevent 100% of attacks, so you need complete and
continuous visibility across your IT estate to catch the Much of the damage that organizations suffer from a data


attacks that preventive measures miss. breach is not a function of the initial attack. The average
dwell time—the amount of time between the initial attack
By 2024, 40% of midsize and discovering it—is often measured in months or weeks.
enterprises will use MDR as their That delay in detection provides attackers with virtually
only managed security service unlimited time to conduct further reconnaissance of the
network, infect other vulnerable systems, and identify
That means around-the-clock monitoring, though, because
valuable or sensitive systems and data.
cyber attackers don’t maintain business hours. Most attacks
are conducted using automated scanning and exploits A good MDR provider will alert you to suspicious activity or
anyway, and when it’s 3am in your area, it’s still 2pm a potential breach within 15 minutes of detecting the activity.
somewhere else. The problem is that very few organizations A quick response enables you to investigate and mitigate
are capable of monitoring their network environment 24/7. the incident to minimize—or possibly avoid—damage. It also
The world is facing a shortage of skilled cybersecurity gives you plenty of time to determine exactly what
talent, and it is cost-prohibitive for most businesses to hire happened, and what—if any—data was affected or
and retain the expert talent necessary to provide effective compromised within the 72-hour reporting window for GDPR.
monitoring and incident response.
GDPR has been around a while, and every organization
Security is hard and complicated. Organizations typically subject to it should have already achieved compliance.
rely on other sources and providers to know when they are Technology evolves quickly, though, and organizations
being attacked and how they can respond. This ability—or have increasingly complex networks. The key to protecting
lack thereof—to respond is a natural compromise in the data and effectively maintaining compliance with GDPR over
presence of what they see as the impossible task of making the next few years is a focus on constant vigilance and
themselves 100% secure. working with a trusted MDR provider.

This is where MDR comes in. Managed detection and 1


Gartner, “Market Guide for Managed Detection and
response solutions identify active threats across an Response Services,” Toby Bussa, et al., 15 July 2019.

June 2020 13
From Editor’s Desk

What are the


Rights related
to

GDPR?
June 2020 14
The General Data Protection Regulations (GDPR) came many would have heard of. This ensures that they may
into force in 2018, following a grace period of two years. It request that a controller or processor delete all their data
is a complex piece of legislation many employees would without any delay if a data subject wishes to. However,
have undergone comprehensive training for. Even if they one of several conditions needs to be met for this request
are specifically affected by the rules, very few people to be legitimate. For example, the data was no longer
would learn anything about GDPR and what it means to required to complete the original task or to satisfy some
them. This article aims to provide a brief overview of the legal obligations, and the data must be erased. If the data
significant rights granted to people ("data subjects"). is made public somewhere, the controller or processor
will express the request to all the data recipients. If this is
The rights under GDPR are right to be informed, right to in the public interest, data cannot be deleted.
rectification, right of access, right to erasure/to be
forgotten, right to data portability, right to restrict There are two other rights related to this, the right to
processing, and right to object and rights concerning object to data processing, and the right to limit data use.
automated decision making and profiling.
If the processing of data relates to public interests or the
legitimate interests of others, you may object to the use of
The first right here is the right to be informed. This ensures
that whenever someone collects your personal data, you your data for those purposes. More commonly, if the data
have the right to know how to access the organizations is used for targeted marketing, you have the right to
that collect and process your data (the controller and object to data processing. In the same way, you are
processor respectively), the organizations' access details entitled to limit how your data is processed. Both of those
of the Data Protection Officer (DPO), the basis for data rights are circumstantially limited.
collection, data protection period and notification of
certain GDPR privileges (such as the ability to access the Of course, there are a variety of other privileges listed in
data and the ability to lodge a lawsuit if you feel that the GDPR. For example, the right of access means you can
data is misused). The right to be informed is a request access to any of your data that the controller
fundamental right of the data user, as it guarantees that holds. The right to portability of data means you can
they know how to use their data and what to do if they request that this data be made available to you in a
want to alter it. convenient way. The right to rectification means that if
the data is found to be incorrect, all data subjects may
The right to be forgotten is another significant right that request that improvements be made to their files.

June 2020 15
CXO Thoughts

HOW ENTERPRISES CAN MITIGATE


THE GROWING THREATS OF DATA


DATA
LOSS
OCCURS WHEN
DATA IS ACCIDENTALLY
DELETED, SHARED OR
SOMETHING CAUSES DATA
TO BECOME
CORRUPTED
MARTIN SUGDEN,
CEO,
Boldon James

s we fast approach the second protection and rights to individuals. The impact of these
anniversary of the implementation of GDPR, laws has dramatically altered how businesses and
the impact it has had on businesses and driving other organisations can handle the information of all
change has been substantial. Initially, many were those that interact with them.
sceptical of the EU’s adoption of data protection
Global Impact
change. But, driven by the need to replace previous
data protection rules across Europe that were almost Last year, the ICO’s combined fines for British Airways
two decades old – with some of them first being drafted and Marriott International was an eyewatering
in the 1990s – the new regime has sparked a data £275,787,290 (€314,990,200) grabbing many headlines
management revolution that was long overdue. In the and highlighting to organisations changing their business
last twenty years we have led data-heavy lifestyles, processes would be of the utmost importance. In 2020,
with people routinely sharing their personal information the impact of GDPR is not only being seen in Europe
freely online. GDPR has helped to harmonise data where countries such as Germany, Bulgaria and Spain
privacy laws across the EU, as well as providing greater have imposed more fines than the UK. Global impact has

June 2020 16
seen the US follow suit with the California Consumer compliance by involving users to identify, manage and
Privacy Act (CCPA) kicking into action in January, as well control the regulated data they work with, while
as countries such as Bahrain introducing its Personal automating parts of the protection process to enforce
Data Protection Law last year and Singapore publishing a rules and policies consistently.
factsheet to help businesses better understand the GDPR
Data Classification
when applied to the Singaporean context.
The key with this approach is that data is classified at
Importance of Data and its Role within your Organisation
source so the organisation’s rules can be applied at the
With the increasing amount of data from new and outset. As mentioned before, it is important to understand
emerging technologies, ensuring that it is being what data you have, who is using it, how it is being stored,
controlled and shared effectively becomes even more used and shared, and whether it is company-sensitive;
paramount. Data loss is a serious problem for businesses this is key to any data protection strategy. Once you have
of all sizes— losing files means losing time and money to defined what data you have, you will be able to classify
restore or recover information that is essential to your and protect it.
business, plus being exposed to the risk of legal
Data classification is the categorisation of data according
repercussions if the data loss infringes customers’ privacy
to its level of sensitivity or value, using labels. These are
rights. Data loss occurs when data is accidentally
attached as visual markings and metadata within the file.
deleted, shared or something causes data to become
When classification is applied to the metadata, it ensures
corrupted. From an enterprise point of view, we are still
that the data can only be accessed or used in
seeing human error as a leading cause of data loss for
accordance with the rules that correspond with its label.
businesses, with 50% being attributed to inadequate or
Clearly you need to define your classification policy first
poorly observed business processes.
and decide who should have access to each type of data.
Before any best practice solution or loss prevention Once this has been done, it is simply the case of selecting
strategy can be rolled out, it is important for an an appropriate classification tool.
organisation to understand exactly what data they hold
Best Practice in the Future
and the potential risks to its security. This means
establishing the types of data that is being held, As cumulative fines across EU reach £ 410,772,087 (€
collected, stored and where it is located. Alongside this, it 467,476,268), organisations need to ensure that by using
is important to understand why the business has it, how approaches such as Privacy by Design they can mitigate the
sensitive it is, and who is accessing, using, or sharing it. threat that unsecured data poses to the business. As we live
in an evolving world, businesses cannot take a ‘tick box’,
Privacy by Design
point-in-time approach. Legislation, threats, and the
One of the best methodologies that an organisation can business itself will constantly evolve, while demands from
use to fulfil its compliance obligations is a Privacy by regulators and the board for better governance will continue
Design approach. The framework achieved international to intensify. Ongoing measurement of the effectiveness of
acceptance when the International Assembly of Privacy security policy is the only way to check that the controls the
Commissioners and Data Protection Authorities business has put in place remain fit for purpose. The
unanimously passed a resolution in 2010. This approach monitoring of classification activities is a powerful way of
takes privacy into account throughout the whole process, doing this and improves the chances that a breach will be
ensuring that it is incorporated into an organisation’s quickly detected – helping the business to comply with
systems, policies and processes and technologies. notification periods required by regulators, as well as to
Privacy by Design needs to start with data classification. minimise damage. If there is a breach, the detailed audit
The sheer volume of unstructured data within information that robust classification provides will allow a
organisations, combined with the ever-increasing business to demonstrate that the appropriate steps to
technical abilities of hackers and the fallibility of protect data were taken. This is a critical aspect of
employees, makes it impossible to rely on people and complying with increasingly weighty privacy regulation and
processes alone to ensure that sensitive data is handled ensuring that data continues to be an asset that powers the
appropriately. Data classification embeds a culture of business, rather than a threat to its bottom line.
June 2020 17
June 2020 18
Align your
Cyber Security
with Threat Reality
Today’s sophisticated cyber
threats call for a more proactive
approach to cyber security.
EclecticIQ’s Threat Intelligence
Platform enables organizations to
align their security efforts with the
threats most relevant to them.

Take control of your threat


landscape today to build
tomorrow’s cyber defense.

For more information visit www.eclecticiq.com


or scan the QR-code

June 2020 19
From Editor’s Desk

A
Bottom-up
Viewpoint
to Privacy
in GDPR

ata security has become an still don't understand that compliance shouldn't be their
intensified focus area for many only priority-they should also tackle their underlying
organizations with the protection and data issues.
implementation of major, new
regulatory rules and requirements Approaching privacy through a top-down, checklist
of GDPR. The focus has always mentality simply to comply with regulations provides a
been on activities related to restricted, perfunctory privacy approach that offers little
enforcement, one rule at a time. But real protection. Adapting to a bottom-up approach, i.e.,
when it comes to privacy, companies changing emphasis to meet the underlying security

June 2020 20
needs and use best practices in data protection — set up Data Security
organizations to achieve regulatory enforcement and a
clear privacy stance. Safeguarding customer data from the bottom up requires a
robust data management system as a base. This offers an
A Bottom-up Approach to Data Security overarching framework and strategy for data protection,
which involves policies, protocols, and procedures that
A data-focused, security-driven approach is a safer way comply with the tenets of privacy by design. To apply these
to meet privacy criteria, such as GDPR. A bottom-up strategies, you need to consider all the locations and data
strategy is tailored to the unique needs of an types, and you can't defend what you don't know is there. The
organization. It secures and handles data based on use of technology should be one component of data
particular specific needs and a regulatory body's protection; if possible, it is better to use technology as part of a
requirements: it should implement compliance while multi-faceted system rather than buying products and expect
prioritizing consumers and their data over checkboxes. them to provide single-handed compliance and security.

Part of the bottom-up approach to customizing a privacy Automated Procedures


program is to consider thoroughly the threats and risks
associated with the protection and management of the Effective privacy systems require repeatable, auditable,
relevant consumer information. This allows the and automated operationalized processes. As privacy
detection of main cases of privacy misuse, necessary demands grow from both internal and external clients, the
changes to system design, and attempts to prioritize. introduction of additional staff resources only provides
There are several elements to create an effective limited scalability; increasingly important are automated
privacy system, but when pursuing compliance, the processes. Access requests for data subjects, in particular,
following aspects are often overlooked: privacy by are a standard method for automating, but others benefit
design, which encourages bottom-up data security and from operationalization, such as classification and
process automation. mapping of data, data privacy impact assessment, data
management by third parties, and data response.
Privacy According to Design
Even when processes related to privacy are automated,
Data security by design and its core concepts includes they should be treated as operational: they should be
incorporating privacy by default into fundamental monitored and managed continuously, regularly, and not
procedures, goals, operations, and technologies. In an regarded as a static, one-off collection of procedures.
attempt to make privacy by design more feasible when Organizations will accept operationalized privacy as part
developing and implementing GDPR-compliant solutions, of their culture and perspective.
a group of European privacy experts explored
privacy-by-design principles by events, techniques, and Privacy regulations like GDPR will continue to be
implementation methods for privacy use. Their research implemented in an attempt to pressure companies to
offers a structure that is easier to apply to data and protect and manage consumer data appropriately. But
procedures and is more relevant from the software and regulatory enforcement alone does not guarantee that an
engineering perspective. organization's privacy policy is successful. Regulations
include top-down requirements for the meeting but limited
Efficient privacy by design should accurately represent guidance on how to achieve an effective privacy program
clients and their protection needs. It guides both data that addresses a specific organization's unique needs.
protection efforts (such as software engineering, Organizations need to dig deep into the root causes of
including pseudonymization) and process automation their individual privacy challenges and implement
efforts (such as data topic access requests, including approaches with a bottom-up mentality to really advance
"delete my data"). privacy as well as compliance.

June 2020 21
CXO Thoughts

GDPR:

In our opinion, the following are likely to be at the forefront


s a professional services business operating in a world driven in 2020 and beyond:
by data and technology, Gemserv like many businesses,
finds itself changing its business operations dramatically due to Health Initiatives Related Privacy Issues
the impact of Covid-19 and adapting our business model to the Right to privacy and data protection are again at the centre
new normal. In this we are both custodians of datasets in the of debates, with governments and businesses doing their
industries we serve and adviser to others in how to protect and best to reboot the economy by investing in innovative and
secure data across business operations. ‘out of ordinary’ ways to deal with the unprecedented
Like other major shocks, such as other epidemics or a major situation. We expect the focus to be on the transparency of
war, we see existing trends speeding up once the crisis has the processing of health-related information and protection
passed, and new societal norms coming into play. Beyond from unauthorised access, disproportionate data sharing
basic data protection and privacy compliance, we have and the legal need for large-scale data collections.
identified many trends that have a direct impact on privacy and We will see focus on health care information of employees,
data protection – topics in which Gemserv is actively engaged. especially where employers are rushing to adopt various
The digital services environment and the impact they have on technologies (facial recognition camera devices, contact
individual rights have become more complex as 2020 and tracing apps at work, health and distance tracking
years beyond prove to be challenging with the ‘new normal’. technologies) to keep sick workers at home to ensure the
Forward looking technologies may also raise societal safety of those present in the office. Intensified workplace
concerns as they play an increasing role in the digital world in surveillance could become the new normal.
which people will live in going forward. Privacy risks will We will also see challenges around the processing of
therefore become more prominent due to risks posed. non-health data, such as location tracking data for health
The Data Protection Authorities in Europe and UK have monitoring purposes which are likely to increase the risks to
revisited their strategies to address these complexities and privacy and security of individuals.
will focus on high impact areas which involve vulnerable Artificial Intelligence and Data Ethics
persons such as children, the elderly, patients, complex
processing of personal data and complex operations. Big data, automated decision-making, profiling, online

June 2020 22
behavioural tracking, surveillance and facial recognition – all GDPR applies in the context of children using digital services.
are extremely debated topic, even more so at the age of
The main concern today is whether we would see an
Covid-19. All those technologies are already largely available
increased concentration in the AdTech industry, by
and in use. While the ICO and other data protection authorities
destroying the real-time advertising ecosystem to the
across the world are shaping their codes of conduct for the use
benefit of Google and Facebook with more pervasive
of AI with the aim to develop monitoring systems focused on
tracking technologies, or if the whole online advertising
how AI systems use personal data and automated decision
industry will take a different direction for contextual-based
making without human intervention, we feel that many
advertising rather than interest-based. What is sure at the
organisations will need support for assessing their AI solutions
moment is that the ePrivacy Directive (transposed into PECR
and documenting a framework of obligations on how their AI
in the UK) does not reflect current situation of the internet –
models are constructed and used. Algorithmic Impact
and the new legal framework, the ePrivacy Regulation, is
Assessment (the data ethics counterpart of a Data Protection
stalling. The evolution in this area are going to be a highly
Impact Assessment) can also be used as an effective way to
debated topic in the years to come.
measure and mitigate risks of bias and making sure that
meaningful human intervention is implemented. Internet of Things

With the roll-out of 5G many new real-time connected


solutions will push connected devices further into the
market. Healthcare, wearables, autonomous vehicles… The
Beyond basic data possibilities and their promises are fascinating. An ongoing
protection and privacy concern about connected devices the previous years has
compliance, we have been security and privacy of the data – and this is only going
identified many trends to increase. What categories of data these devices are
that have a direct impact actually collecting? What categories of data the
on privacy and data manufacturer or other third parties are able to access? Is the
protection – topics in device truly secured?
which Gemserv is actively Security by design and Privacy by design are going to be
engaged. scrutinised by data protection authorities and we can expect
a strong enforcement in the years to come, proportionate to
the sensitivity of the data involved in some connected
Also, advertising and direct marketing in the online environment
devices.
have become increasingly complex with the use of tracking
technologies where large ecosystems are involved in the resale The Future Relationship between the UK and the EU
of personal data. Many Data Protection Authorities are focused
The UK leaving the EU raises many uncertainties – and data
on educating the public about their privacy rights by developing
protection is not exempted. Will data flow freely between
guidance materials, holding workshops and self-help tools. We
the UK and the EU? Quid of the UK and the U.S.? Are we
raise public awareness on online privacy concerns and privacy
going to assist to more fragmentation in Europe of the
by design through our webinars and blogs. We find that more
interpretation of the GDPR, with an “EU GDPR” and a “UK
and more people are reluctant to accept generalised online
GDPR”?
tracking to deliver targeted ads, when such tracking can also be
used as a weapon of political influence. Algorithms are now All responses to those questions are pending, and like in
able to infer a large volume of characteristics with a very little other industries, there is a risk of loss of momentum with the
amount of personal data. current climate. Organisations could delay their privacy
programs while waiting for more clarity on the future position
Continuous scrutiny by data protection authorities,
of the UK in the global exchange of personal data.
especially on large tech companies is on the agenda and
increased suspicion by the public is leading large tech In conclusion we see the impact of Covid-19 as speeding up
companies to slowly abandon cookies. Children’s online existing trends and creating new ones. Whilst there is
privacy is also a common theme among Data Protection uncertainty what is certain is that GDPR is pivotal in
Authorities in relation to online advertising. For instance, the unlocking the huge societal benefits from data and
ICO in the UK has recently published guidance on how the technology, whilst protecting the individual’s rights.
June 2020 23
From Editor’s Desk

The Remarkable Effects


of GDPR on the Cloud
he General Data Protection Regulation
(GDPR) of the European Union was eventually
implemented, in 2018, after devoting four long years
in the making and two years in transformation. It will
replace astutely the national laws and regulations
focused on the revered 1995 EU Data Protection
Guideline and distributed through organizations focusing
on EU customers from outside the EU.

While the GDPR primarily carries forward the 1995


directive's ethics and locution, it also incorporates
several additional dictums with ambiguous after effects.
These could include a strict consent rule, a data
portability clause, and a 'right to be forgotten.' It also
promises optimism for large-scale conformity in Europe,
which international organizations should accept, as well
as relief from registration issues that have existed in
many countries.

While this is a significant move taken by the European


Council, after Brexit, of course, the regulatory terms are
already proving to be a huge challenge, inclusive of
twists and turns. Data Localization is one of the most
popular aspects of the law. Data Localization refers to a
regulation requiring a particular consumer data to
remain limited to a nation or region's borders. Though

June 2020 24
GDPR focuses heavily on data localization, this law isn't
Data Localization refers to a


entirely new for the world. Before 2018 a similar
declaration was passed by countries such as The regulation requiring a particular
Netherlands, Germany, Switzerland, China, Russia, consumer data to remain limited
Turkey, Uganda, Indonesia, Tanzania, Kenya, and many to a nation or region's borders.
others. But the imminent GDPR once again deprived them
of the limelight. While the public cloud provides numerous assets to
business users, it also impairs the pellucidity or the ability
Explicitly, GDPR implies that only when a satisfactory to see and distinguish where data is stored, and
degree of security is guaranteed can personal data be workloads are handled. From a GDPR viewpoint, this is
transmitted to nations outside the European Union. If an incredibly difficult. This is because organizations present
organization has only a slight doubt about a particular in various parts of the world would need to use the cloud
destination, the data does not travel there. With dissent to ensure that the data remains in the assigned space
costs too high, many companies will opt not to take a without moving to another location. If customer data
chance and will play it safe by ensuring that their data transfers to a non-vetted area outside the approved
stays contained within the EU, or even within the country perimeter, the company, as well as the service provider,
or area of origin. For example, Germany censors the will be guilty of the breach.
distribution of data across the national border, including
EU countries, without guaranteed walls of security. Although consumers of enterprise cloud are aware of the
conformity risks, this does not prevent them from adopting
Data localization will have a significant effect on the cloud. Furthermore, for their advantage, they need to
multinationals, including U.S. based businesses that use ensure greater consistency and accountability in the data
the cloud and operate in European markets as well as storage and workload delivery framework of their service
cloud service providers. This is because the providers, as well as a multi-cloud game plan that enables
organizations fell into two big GDPR groups – ‘Data them to migrate between various service providers when
Controllers’ and ‘Data Processors.’ required to guarantee compliance. Trust is vital, and
animosity towards single vendor lock-in will increase, as
Data Controllers are agencies, companies, or companies seek greater flexibility to meet country-specific
corporations that operate individually or in partnership consent requirements, as well as the opportunity to move
and function on the purposes and means of personal providers seamlessly if the trust is ever defied.
processing data. This group covers up to 80 percent of
establishments worldwide. Data processors are However, one thing is for sure that trustworthy data
agencies, companies, or organizations that process localization capacities are another challenging
personal data on a controller’s behalf. This section precedent in assessing and selecting providers for
covers Cloud service providers. The news does not come enterprise users of the cloud. The data localization
as a surprise, though, that recently, significant providers hypothesis and the cloud are examples of GDPR
are expanding their networks across Europe to meet the specifications requiring urgent and detailed
new requirements. consideration.

June 2020 25
CXO Thoughts

A “Privacy by Design”
approach is key to
creating GDPR compliant
businesses

GD
PR
Joseph Anantharaju,
President & CEO
Happiest Minds

We are currently living in like Facebook and Apple – Mark Zuckerberg has underlined
two different worlds – the the importance of Facebook moving focus away from what
digital world and the they would like to know about people to what people would
physical one. One day the like to share about themselves.
twain shall meet but for Engineering GDPR compliant businesses
now the common thread
between these worlds is GDPR regulates how companies collect, handle, and protect
they are both driven by data. Everything you share online, personal data and grant consumers more control over
whether you are making an online purchase or simply personal information collected about them. However, most
posting a picture on social media, is processed, and stored businesses are still in the process of engineering their
for a very long time, if not eternity. systems to be able to meet the necessary GDPR guidelines
and have primarily relied on “User Consent” to achieve
As Pete Cashmore, the Founder of Mashable once famously compliance.
said “Privacy is dead, and social media holds the smoking
gun”. While it is easy to buy into this dystopian view, it is A more comprehensive approach to complying with GDPR
heartening to note that there have been landmark regulations in both the letter of the law as well as its spirit,
international privacy laws like GDPR and CCPA that have would require addressing these concerns –
been passed to protect the information of consumers. • Data Lifecycle Management - Consumers have the
General Data Protection Regulation (GDPR) was passed by the right to know what is being done with their information
European Union (EU) and It went into effect on May 25, 2018. and who receives it apart from demanding that their
data not be shared or stored. Businesses must have
Although, it was created to protect the personal data of EU mechanisms in place to provide consumers with visibility
citizens, it affects businesses worldwide. If you have of their data as well as the required interfaces to request
customers in or collect data from users in the EU – GDPR actions like erasure.
applies to you.
• Breach Notification - In the event of a breach, a
Companies that handle consumer data are entrusted with business must be able to understand the details and
the responsibility of keeping it safe and not exploiting nature of the data breach and promptly notify it users
information they may be privy to unintentionally. This is about when the data was stolen, lost, destroyed, or
reflected in the view taken by leaders of major companies changed.
• Increased Record Keeping - Businesses need to action in the likelihood of a potential security incident that
create processes around handling personal information could lead to a data breach.
and maintaining audit trails of processing requests for all
• Leverage Technology
data subjects.
As the world becomes increasingly digital, there are various
• Third Party Risk Management - While a business
should start with cleaning its own house, it would emerging technologies that can play a crucial role in
also be imperative to renegotiate third-party enabling greater security. Apart from modernizing their
contracts to enable compliance and management of existing systems to enable greater data security, businesses
contract inventory. can focus on –

The importance of using a “Privacy by Design” approach a) Automating security controls for new products and
applications to ensure the process of data collection and
Given these regulations and the need to protect user data,
storage confirms to the right standards.
privacy should now be a critical design component while
creating a platform or a backend process flow. As a result, b) Adopting Blockchain for secure transactions.
all businesses should adopt the “Privacy by Design”
approach when creating products or building websites to c) Using intelligent Bots to monitor platforms and
keep data collection to a minimum while baking in security networks and detect breach attempts and
measures into all stages of a product’s design. The cardinal vulnerabilities.
principles of “Privacy by Design” are as follows:
• User-centric approach
A user centric approach demands that you place the needs
of your users foremost while designing a system. This
necessitates clear consent in collecting data, specifying General Data Protection
what the data is being collected for, minimizing the amount Regulation (GDPR) was
of data collected and using it only for the purposes
specified.
passed by the European
Union (EU) and It went into
The second aspect of a user centric approach must facilitate
transparency with users in the event of a data breach, so
effect on May 25, 2018.
that the potential damage emanating from it can be
mitigated.
Lastly, users should always be provided with complete
visibility and control over their data, so they have a view of Regulatory conformance requires expertise
what information is stored about them and requesting for
edits or deletion as required. As consumer privacy takes center stage and conforming to
regulations becomes increasingly important, businesses do not
• Incorporate privacy in the requirements and design have the luxury of hitting the pause button as they overhaul
phase their existing systems and processes. It would involve a steep
As businesses launch new products and services, they need learning curve in addition to an exorbitant opportunity cost that
to ensure that privacy has been addressed right from the would adversely impact most companies.
beginning instead of treating it as an after-thought. This
A much better approach would be to work with a partner that
includes clear definitions of validating the need for data,
has deep technology expertise and a comprehensive
defining data workflows, parties accountable for the data,
and planning for data integrity and access controls. understanding of privacy regulations. As companies continue
to capture increasingly more data about their customers, it
• Proactive Safety Measures squarely becomes their prerogative to safeguard this
The importance of having the right safety mechanisms information and utilize it appropriately. Like they say, with
cannot be overstated. Businesses constantly need to be on great power comes great responsibility – allow experts like us
their toes by using algorithms to monitor and take corrective to shoulder some of it, so you can focus on what you do best!
From Editor’s Desk

The DO'S AND DON'TS


to Endure GDPR Compliant
t's been nearly two years since the Global Data make sure that you have a process to deactivate
Protection Regulations (GDPR) came into effect on May accounts when you no longer need to. HRs and those
25, 2018. As much as it has been in the news, dealing with contractors should have a method to notify
companies might be wondering: what can they do as a the appropriate team when access is to be revoked to
system administrator to help it comply with GDPR? Before individuals or groups. Additionally, some kind of regular
going deep into that, let's do a quick review of what analysis should be conducted to make sure that no one
exactly is GDPR. has slipped between the cracks.

Security First Separation of Powers

The GDPR says the data subject gets to determine The more power a system or database administrator has,
whether companies can store their personal data. And the higher the 'blast radius' if something goes wrong with
before making such a decision, the person should know them. This is why the use of role-based administration to
why the organization needs it, what they will do with it, distinguish different powers is an excellent idea. For
and should be sure it's stored correctly. Among other instance, one administrator may have the ability to
things, storing personal data 'properly' means that you configure and run new backups, but not the ability to
can ensure that only those that need to see it will see it uninstall existing backup configurations or existing
and that they will only be able to access it when it is backups. Perhaps restoration capability is restricted to
required. Many assume that the GDPR merely codified just a few people. The more resources you can isolate,
what others would find best practices in the sector, and the more protected your data will be overall, and the
many of the regulations do also fall within the field of more protected your personal data will be.
program and database management.
Strongly Supported Encryption
There are five distinct ways administrators can help their
companies comply with GDPR. Besides having a robust intrusion detection and
prevention system, in case the operation is ever
Adequate Access circumvented, one should consider using encryption for
data at rest. If a bad person ever gains access to the data
The access should be provided only to those who need they are not supposed to get, it is a non-issue through
access to a specified data set. For instance, a doctor encryption. It should be taken into account for all the
should have access to the medical records of his patient, personal data.
but this does not mean that all doctors should have
access to the medical records of all patients. Of course, Backups should not be Optional
someone without a legitimate justification should not
have the right to a patient's medical record. Backups must not be optional anywhere in the data
center but, where personal data and GDPR are
System and database administrators can enable their concerned, part of the regulation states that such data
businesses to be more compliant by monitoring who is should be covered against erasure. The only way to do
accessing various types of data and making sure that this properly is to ensure that you have a reliable program
only those who need access have it. for backup and recovery.

Account Control

When you ensure that only the right people have access,
olution P
S ro
P R

vid
Top 10 GD

ers 2020
GDPR
GDPR involves the implementation of appropriate technical and organizational
measures, ensuring a level of security appropriate for high value data. But
organizations need to take the responsibility of deciding what measures need to be
taken to reduce data risk. Companies who have not yet incorporated GDPR into
their system, are using temporary controls and manually processing their systems
to ensure compliance. But in case of non-compliance with general data
processing principles, companies can be fined with penalties up to 10
million euros or two percent of global annual revenue from the
previous year.

Moreover, the entire process of implementing the GDPR principles is


quite challenging, for the companies and the users. Following the guidelines
and adopting certain practices to ensure the elimination of any kind of a violation,
system audit and assessment, adapting to new implementations, team compliance
and training, and maintain transparency are the most difficult issues.

Thus the current edition of CEO Views brings to you "Top 10 GDPR Solution Providers
2020”. The list highlights some of the GDPR solution providers who offer the best in class
in the technology landscape. The proposed list aspires to assist individuals and organi-
zations to find the best companies that will help them accomplish their projects.

June 2020 30
Company Management Description

Data Reporter Ing.Michael Data Reporter supports organizations in the process-oriented implementation of
datareporter.eu Traunau, the data protection management system with robust software solutions Privacy &
AUT CEO WebCare. The platform unites data protection officers and organizations.

dFakto is a consulting company that helps organizations make better use of the data
dFakto Thibaut de through innovative technological solutions. dFakto believes that ‘more data’ alone
dfakto.com Vylder, will not lead to better decisions. dFakto has developed a proven methodology that
Brussels, BE CEO facilitates data-driven processes on a state-of-the-art platform managed by a team of
experts.

MetaCompliance is a cybersecurity and compliance organization that helps transform


MetaCompliance Robert O’Brien, company culture and safeguard the data and values. MetaCompliance creates state-
metacompliance.com CEO of-the-art eLearning, GDPR, policy management, incident management and phishing
Piccadilly, LDN solutions that clients trust to help them create a better relationship with employees and
regulators.

MyData-Trust supports the Life Sciences Industry in leveraging compliance related to


MyData-Trust Data Protection. MyData-Trust is composed of a multi-disciplinary team including data
Xavier Gobert,
mydata-trust.com privacy lawyers, IT security specialists and life sciences experts. The organization merges
CEO
BE these skills and creates a unique combination of skills and knowledge to address the
client needs efficiently.

OMNINET Software Solutions has designed OMNIPRIVACY, a 360°AVG/GDPR


OMNIPRIVACY management tool to insure 100% control and oversight of AVG/GDPR Readiness by
Stany Hellin,
omniprivacy.be continuously monitoring 7 processes: the processing register, contract management,
CEO
Antwerp, DE data leaks, privacy requests, document management, risk management and
dashboards.

Papaya Global is reinventing global payroll, payments, and workforce management. The
Papaya Global
Eynat Guez, automated platform of the organization helps other companies hire, onboard, manage, and
papayaglobal.com
CEO pay people in more than 100 countries. The cloud-based solution is easy to use, and scale
NY
ensures full compliance and provides industry-leading BI and analytics.

RISMA Systems is a fast-growing software company that supplies compliance tools to


RISMA Systems Lars Nybro
organizations and authorities and develop groundbreaking solutions ensuring optimal
rismasystems.com Munksgaard,
resource use in organizations. The purpose of RISMA has always been to build a
Herlev, DK Founder & CEO
platform that helps customers to track, monitor and manage all GRC activities easily.

Sureway is a comprehensive digital privacy platform that safeguards all of the


Sureway Kjetil Odin company’s obligations and the rights of data subjects following privacy laws. The
sureway.no Johnsen, solution automates what must be done manually in other solutions and is self-service
AS CEO for the data subjects. Sureway acts as an ecosystem of privacy that ensures that
everything is connected together as a whole.

The Privacy Factory is the trade name of the PrivacyO group of companies. Together it
The Privacy Factory Karen-Marlies represents over 30 years of privacy expertise, information technology expertise and
theprivacyfactory.com Schenck, corporate experience. Based on the expertise and experience gained, they know that
Amsterdam, NL CEO implementing the General Data Protection Regulation (GDPR) is first and foremost a
knowledge and management challenge.

VigiTrust is an IRM (Integrated Risk Management) SaaS service provider - PCI, GDPR,
CCPA, HIPAA, and VRM. VigiOne encompasses VigiTrust’s fifteen years of experience
Vigitrust
Mathieu Gorge, in the Information Security Services Industry into one single SaaS solution enabling
vigitrust.com
CEO complex and disparate organizations to make the implementation and management
Dublin, Ireland
of adherence to Security and Privacy regulations more accessible and more
straightforward.

June 2020 31
From Editor’s Desk

Resolving Data
Governance with
respect to GDPR

he General Data Protection Regulation security processes. This means that one specific
(GDPR) was implemented on 25 May 2018 as product cannot overcome the challenges. To be fully
a new regulation. The law seeks to unify and GDPR compliant, a company needs to ensure that all
strengthen data security for citizens living within of its solutions work correctly together.
the EU. Regardless of where a company is situated in
the world, if it is doing business with members of the To ensure that a company is compliant with GDPR, it
European Union, the GDPR applies. Globally, should follow the four steps listed below.
companies are working hard to comply with GDPR, as
the fines for non-compliance can be very high. Discovery

GDPR may have impacts such as the increased need It is essential that the company can track, implement,
to review and improve organizational procedures, and report compliance with GDPR. The company
applications, and systems; more stringent privacy and needs to know how data enters, what is done with it,
protection requirements; possible fines of up to 4% of and how it exits the company to do so. To achieve this,
annual turnover; addressing GDPR, to address GDPR data governance is required, which provides
enforcement within an organization, various aspects capabilities, including data lineage, asset inventory,
need to be addressed, including HR, legal, IT, and data discovery. The more data is reused without
marketing, etc., adequate security measures need to proper data governance, the higher the chance of data
be enforced with the right technology to reduce risk, processing malfunctions. Therefore, resources for
address legal requirements, allow digital assisting data governance should be wisely selected.
transformation, improve competitive advantages;
GDPR contains critical criteria that directly influence Enrichment
how a company implements IT protection; to
safeguard and protect personal data, it is essential to: Application may need to be updated to protect the
be aware of risks, know where data is stored, integrate rights of data subjects (people whose data is handled).
IT network security, review and modify existing Because personal information can reach the company
applications where appropriate. in many types of formats and can be stored at different
locations and held in various forms such as images,
It's not possible to just buy a GDPR compliant product text, and voice recordings, this can be a significant
and leave it at that. GDPR is for risk control and challenge. Individuals can also request information on

June 2020 32
their own. It must be possible to automate and manage associated with the data handled and to implement
a potentially enormous number of requests efficiently. adequate security checks.
Furthermore, data must be removed according to the
'right to be forgotten' of GDPR. Opportunities for Organization

To do all of this, a company may need to merge its While there is plenty to do to become GDPR compliant,
customer data and provide a clear view of all data it should be regarded as a once-in-a-lifetime
subjects around the company. If an organization can't opportunity for companies to look at and improve data
distinguish the personal information of individuals from management according to best practices. The
its data sets, this may mean that there is no sufficient quantities of data have exploded, and big data have
control over personal information, which could raise become popular. This could be an opportunity to
red flags for regulators. incorporate the right resources and procedures, and
with GDPR a new fact of life, it could be easier to
Foundation receive executive support.

Another criterion is IT protection that focuses on the With big data systems like Hadoop, it is not always
efficiency and availability of services. The reason for possible to use current data governance frameworks,
causing severe problems. Sustainability requires
proper design and structure. Hadoop and other big
GDPR is for risk control and


data platforms have an incredible amount of
security processes. This means knowledge about consumers and their behavior, which
can be leveraged to drive customer experience
that one specific product cannot improvements. However, this makes it challenging to
understand which data is stored, where it originates,
overcome the challenges. and who is using it for what. This poses significant
challenges as some of the details, such as names,
addresses, and account numbers, can be sensitive.
this is because it is difficult to predict when, and how This information needs to be secured, especially with
much at the same time, systems are expected to pull the introduction of GDPR.
data. When a technological or physical incident has
occurred, restoring access to personal data and Data objects and information reside in various
availability promptly would also be necessary. locations of Big-data environments. However,
Encryption is going to be stronger than ever. The conventional data governance tools only look at data
detailed application-to-storage mapping must ensure after it has been organized, and this is not good
that applications are connected to the physical enough for GDPR, as big data systems enable users to
storage on which they reside. participate in experimentation before raw data is
modeled.
Enforcement
However, while still applying good data governance, it
There will also be a need for technologies that can is possible to maintain the exploration benefits of a big
secure systems, software, and people. This includes data environment. To do this, an ecosystem-born
services and products that include security controls method explicitly designed to solve this problem
that can predict, avoid, detect, and react through needs to be used. For example, this restricts genuinely
management, identity, and protection systems for native Hadoop governance options for respective
database access. People erroneously believe GDPR distributions to the Cloudera Navigator and Apache
lists different technologies to be used. Instead, GDPR Atlas. There are other alternatives to look at in the
keeps the data processor and controller responsible market.
and obliges them to take into account the risks

June 2020 33
CXO Thoughts

GDPR nn ,C
EO

a
ckm
Chris Bro
IS STILL AN
UNTAMED

ca
en
c
ec

ANIMAL

nterprises often restrict their public has not flocked to your inquiry
privacy management strategy to website. And you may not have heard much
customer data only. Though it is the personal data from the call center you had deployed to handle
of employees, spread across the entire company that may subject access requests. In fact, you already may have
be causing the real challenge. Chris Brockmann, CEO of re-purposed staff previously dedicated to managing GDPR
eccenca, explains how enterprises can master this compliance.
complexity problem.
At first glance, this sounds like the GDPR has become the
When the General Data Protection Regulation (GDPR) came toothless animal some of us had hoped for all along. But not
into effect, adhering to its rules was probably one of the so fast! During the past few months, the GDPR has surfaced
most dreaded tasks for every company. Today, many initial at a point, where most of us had not expected: Negotiations
fears seem to have proven unnecessary. Initiatives that had about severance payments. Of course, many organizations
started with ambitious goals have lost steam. The general have employee agreements in place intended to take the

June 2020 34
sting out of data usage regulations. But laid off employees • a central catalog of all systems,
come to court with their homework done and done well.
• a central catalog of all processes and its processing
How about your Employee’s Data? purposes,

There is one aspect of employee data your agreements • a central catalog of the legal basis, legitimation and
could not fix and will never fix. It is the right to request your retention policy,
erasure of data after termination of employment. • an integrated index that allows you to identify
personally identifiable data on subject level as per each
As we can all imagine, terminated employees are not your
of the above,
happy campers that are asking for their data out of curiosity.
Former employees might carry vengeance and frustration. • automation of documentation and reporting on your
Often, they also have enough insight into your company’s actions taken,
internal workings with data to make your GDPR fire squad
go ballistic. And the complexity to it does not stop here.

Personally identifiable data from customers and suppliers Enterprises often Restrict their Privacy
might be spread over a handful of disparate applications. Management Strategy to Customer Data only.
But at least it can be clearly attributed to a specific subset of Though it is the Personal Data of Employees,
processes. With employee data it is an altogether different Spread Across the Entire Company that may be
story. Personally identifiable employee information is Causing the Real Challenge
literally everywhere. Just remind yourself that a software
generally logs the names of the creator and the several
editors of a data set, process or document in its metadata. • an active governance and observation system that
There really is no escape. reports data once its legal retention period expires
(scarcity requirement)
Do you have scalable plans and processes in place to
deliver GDPR compliant deletion and documentation that is What sounds like squaring the circle is far from being
sustainable in court? Or is it your plan to sit it out and pay impossible. As a software vendor that helps its customers
the price that might add up to 4 percent of revenue? Sure, so master complexity in a fully digitalized world, eccenca is
far nobody has ever been fined that amount. But erasure specializing in projects where data sources are abundant,
management could well turn out to be the “death by a black boxed and heavily siloed. We found that using
thousand needles” for any organization. After all, managing knowledge graph technology provides the transparency
deletion of data is a complex problem that is by no means needed to evaluate, manage, visualize and link data across
limited to employee data. a company’s disparate IT landscape. Our graph-based
approach also provides the web-scale versatility and
A Graph-based Solution can help cut through the
scalability to expand documentations as your challenges
Complexity!
grow and change.
Let us assume you already attach broad and well-designed
In terms of the GDPR, the knowledge graph approach gives
legal stipulations to your employment contracts. But this
your organization the means to establish sound
does not ease the pressure on being able to report on
documentation of personally identifiable data and puts it
where personally identifiable data is stored and processed
into context with applicable governance rules. Thus, the
throughout your company. Apart from the legal strategy you
eccenca solution enables you to fully document,
need a systematic, technology powered approach to data
automatically validate and systematically trigger GDPR
governance that provides a solid footing when push comes
compliance processes. After all, litigations will always cost
to shove.
you more than the effort to employ an automated
In a nutshell your approach should at least include: compliance management solution.

June 2020 35
n the era of GDPR and CCPA, there seems to be more
speculation about compliance and personal privacy
than there is about the environment. It's
From Editor’s Desk understandable because forecasting the weather
outside seems a lot simpler than devising and executing
an effective data security policy.

How Privacy and Despite news about data breaches being all too
frequent and significant fines for non-compliance

Compliance is becoming a growing fact, claiming naivety to the issues


and impacts for organizations of any size or form is
neither sympathetic nor necessary. The good news is
Salient in the that there are a variety of tools and solutions available,
which can automatically identify risks and secure

GDPR Era? personal data while mitigating exposure to legal and


financial risk.

Start With People, Not Technology

But before moving into any technology solutions, it's


crucial, to begin with, an understanding of how it will
affect all stakeholders in the organization. Begin by
circling the wagons and enlisting the business leaders'
support and expertise, as well as legal and enforcement
teams. Too often, the Chief Information Security Officers
(CISOs) face growing challenges of implementation due
to a lack of coordinated efforts across their organizations.
Employee resistance is a tough hurdle to clear,
particularly if they feel that compliance with new security
measures would complicate their work.

A buy-in at the C-level is a requirement for effective


policy implementation. Until these significant influencers
see and feel the risk factor, implementation of any kind of
system will be difficult. Consider a two-phase approach
as a technique to best practices. Begin by finding the
lowest-hanging fruit and execute something that is
relatively easy to exploit and get behind everyone in the
company.

Making improvements where leverage is easiest is a


smart way to gain trust and momentum. Even if this
decreases the risk by just 15 percent, you're on the
road — so remain focused on making steady, gradual
June 2020 36
progress. The method can often be overwhelming at Establish a System for Development Tools
least at first but not sidetracked by stagnation of the
study. Instead, continue to hold discussions and push Once everyone knows and understands the law, a
forward with what will be done next. technology system and tools would be easier to
develop to help identify and reduce risks. Balance is
Putting the Rules in Order ideal, so avoid locking up too much data as the effect
would stifle the ability of both workers and consumers
Rolling out workplace plans and policies requires a to transact business. To reduce risk while enhancing
foundation with clear laws to guide the process as a reward, selecting technologies and resources that
whole. While a mandatory course of compliance is an balance the need to protect information with the
excellent start, it's crucial not to overwhelm employees potential to achieve widespread acceptance is critical.
outside the gate. And it is short-sighted to conclude
that a 20-minute session offers ample training. Favor a crawl-walk-run method, because you don't need
Alternatively, enforcing a policy that includes catching to carry out the whole plan on day one. Instead, define
and educating employees if improper or unsafe the most critical endpoints there and concentrate initial
behavior is detected is highly recommended. efforts. Then don't worry about depending on the test
cases along the way. Tweak the mechanism to comply
It's important that everybody recognizes – and with the workings of the company and its employees.
accepts – the big picture. Compliance rules and Going with solutions that have AI and machine learning
regulations and privacy policies are not meant to capabilities will help train the solution to offer the best
limit personal productivity. Instead, they are and most scalable match while automating other
targeted at protecting staff, the company, and processes to reduce employee burden.
clients. In short, driving home the credo the


Once up and running, the incremental rollout continues:
"Run" with a small group until you "run" with the entire
There are a variety of tools and solutions
available, which can automatically organization. Know that, and this is not a
identify risks and secure personal data set-it-and-forget-it situation; plan to review and change
while mitigating exposure to legal and policies and settings regularly. Think of an engine as
financial risk. your data security solution. Once it is in place, it requires
periodic tuning to sustain exceptional performance. It is
company cares for its staff and clients and doesn't also essential to choose an engine that allows
want to place anybody at unnecessary risk is interoperability with other solutions that may be worth
critical. The easiest and most successful way to adding and leveraging as business and market
involve others is to learn the rules. conditions, as well as regulations, arise and evolve.

Think about this in the context that average office There's No End and No 'Enforcement' Button
employees send about 40 work-related emails and
receive around 90, according to TechJury. A robust and compliant data protection policy is as crucial
Consequently, an organization with 1,000 staff as getting a website for companies today. Regulators
handles 40,000 to 90,000 emails per day, many of should not expect anything to be instantly flawless in
which contain potentially private personal data. Put living up to regulations such as GDPR and CCPA, as well
the 80/20 rule into practice here: if 80% of possible as others, but be assured that they can judge situations
data threats are triggered by 20% of behavior, putting according to demonstrative and conclusive measures
in place policies to protect personal data as it is taken. So get going and continue to move — there is no
generated in emails and files will provide immediate end and no simple button. Privacy and confidentiality are
and substantial reductions in risk. the responsibility of all, and the interest of all.
June 2020 37
CXO Thoughts

From ‘Privacy is
Dead’ to ‘Privacy
is Paramount’

Dr. John Ghent, GDPR


CEO,
Sytorus Ltd

Privacy and data protection have never been more digital adoption to fight COVID-19 and help their employees
important, and it was not too long ago that the general and citizens respectively get back to work in a new normal,
consensus was that privacy was dead. It is now abundantly but the choice should not be between privacy and health, it
clear that privacy is paramount. must be both.

The COVID-19 Crisis has accelerated working from home There is no doubt that the COVID-19 Crisis has accelerated
and digital adoption. This means that any privacy digital adoption for governments and industry. In attempts
programme will need a privacy management platform to to tackle the virus, many governments have deployed very
effectively do their job. As we hopefully emerge from the invasive tools, China for example are monitoring smart
COVID-19 crisis, digital adoption will continue to accelerate phones, utilising facial recognition technology and requiring
and Artificial Intelligence (AI), Internet of Things (IoT) and all citizens to report on their body temperature. China are
Machine Learning (ML) will become more ubiquitous. not alone, and many countries are rolling out their own app
Companies and governments are ramping up their own for tracking citizens, with good reason, however, the risk is
June 2020 38
where does it go from here? Transparency is key to trust, for privacy teams need access to the right tools to run effective
both governments and companies. DPIAs in order to determine the risks.

In the immediate term, most companies are not prepared for We are now in a global regulatory environment, 65% of the
the new norm of working from home, we see this across global population will be under ‘GDPR (General Data
every sector. The risks do increase when staff work Protection Regulation)’ like regulation by 2023, up from only
from home. Most of us at home 10% today* and more privacy laws came into effect
are relatively tech in 2018 than in the previous century. This has
savvy, with smart resulted in a massive increase in privacy
TVs, gaming teams. In 2018 there was an estimated
platforms, and 70k privacy teams in Europe, by 2019
w i r e l e s s that number was estimated to be
routers common 500k, and by the end of 2022, more
place. Some homes than 1 million organisations will
have many Internet have appointed a Data Protection
of Things (IoT) Officer (DPO).
devices installed
These privacy teams need a
which can add
privacy management platform to
complexity to
do their job, now more than ever. In
the challenge and
relation to the market, most analysts do expect a
vulnerabilities to the
deep recession at this point, most predicting an ‘L’
network. Unfortunately, it is not
shaped recovery, however, the demand for tools that
generally the case that enough protections
privacy teams need, i.e. privacy management platforms,
are in place to ensure that we are protected. Data Protection
will continue to increase over the next couple of years.
Officers (DPO’s) / Chief Privacy Officers (CPO’s) / Privacy
Before the COVID-19 crisis, the compound aggregated
Leads need at a minimum to retrain their staff that can work
growth was estimated to be 33% for the next 5 years. It is
from home, update and enforce their policies, and test how
likely that after we come out of this crisis the CAGR will be
susceptible staff are to clicking on the massive increase in
even greater.
phishing attacks.
As we move into a new norm of accelerated digital adoption,
In addition to this privacy teams need to have the ability to
this has two significant impacts for Data Protection Officers
assess vendors remotely and run Data Protection Impact
(DPO’s). The immediate challenge of how to manage privacy
Assessments (DPIA) remotely. It is clear that more and more
programmes when everyone is working from home, and
companies are deploying artificial Intelligence capabilities
secondly, how to manage increased complexity within
into their products and services. DPIAs are almost always
companies due to the deployment of more complex
required, but how should companies do them when it comes
systems. Companies need to ensure that they are building
to AI and remote working, and is the latest drafting of global
technologies that have Privacy-by-Design as a governing
data protection regulations even capable of capturing the
principle, and that also are for the good of individuals and
risks? The spirit of the GDPR is to protect the basic human
not to their detriment. Having access to the right tools to do
rights of living individuals, but do the principles of the GDPR
their jobs is more important than ever.
enforce safe guards that put the power in the hands of the
data subjects, rather than in the hands of the AI? We are Source: Gartner Predicts for Future of Privacy 2020, January
seeing many problems in the market relating to this and 20th, 2020

June 2020 39
From Editor’s Desk

GDPR:
What does it mean for
Businesses and Consumers?

he General Data Protection Regulation (GDPR) organization's capture, evaluate, and, perhaps most
i s a regulation in the European Union (EU) and importantly, store.
European Economic Area (EEA) on data security
What is GDPR Compliance?
and privacy legislation. It also tackles personal
data transfer outside of EU and EEA zones. The primary Inevitably, data breaches occur. Information gets lost,
aim of the GDPR is to give individuals control over their stolen, or otherwise released into the hands of people
personal data and to simplify the regulatory environment who were never supposed to see it-and sometimes those
for international business by unifying the regulation people have malicious intent. Under the terms of the
within the European Union. GDPR, not only do organizations have to ensure that
personal data is obtained lawfully and under strict
The European Commission carried out proposals for
conditions, but those who collect and handle it have a
improving data security in the European Union in January
responsibility to protect it from misuse and abuse and to
2012 to make Europe 'ready for the digital age.' Nearly
respect data owners' rights - or face penalties for failing
four years later, the consensus was reached on what it
to do so.
entailed and how it would be applied. The
implementation of the GDPR is a critical component of the Who is eligible for GDPR?
reforms. This new EU system extends to organizations in
all member states and has implications across Europe GDPR applies to any organization that operates within
and beyond for companies and individuals. the EU and to any organization outside the EU that offers
goods or services to EU customers or businesses. In the
The reforms are designed to represent the environment in end, this means that nearly every major corporation in
which we now live and bring laws and responsibilities the world needs a compliance strategy with GDPR.
across Europe, including those relating to personal data,
privacy, and consent, up to speed for the internet-related The law refers to two separate types of
era. Basically, nearly every aspect of our lives revolves data-handlers: 'processors' and 'controllers.' A
around the data. From social media platforms to banks, controller is an "individual, public authority,
retailers, and governments-almost every service we use agency or other body that decides the
includes our personal data collection and analysis. Your purposes and means of personal
name, address, credit card number, and more all that processing data, alone or in
combination with others." At the same time, the processor analysis of personal data, while at the same time protecting
is a "person, public authority, agency or other body that the privacy of their customers.
processes personal data on behalf of the controller'. In
the end, GDPR imposes legal requirements on a provider What does GDPR mean for consumers/citizens?
to maintain personal data records and how they are Because of the sheer number of data breaches and
handled, offering a much higher degree of legal


attacks that occur, the unfortunate truth for many is that
responsibility in the case that the company is violated. some of their data-whether it's an email address,
Controllers are also required to ensure that all processor password, social security number, or sensitive health
contracts adhere to GDPR.
The primary aim of the GDPR is to give
Under the GDPR, what are personal data?
individuals control over their personal
Under existing legislation, the forms of data considered data and to simplify the regulatory
personal include name, address, and photos. GDPR environment for international business
expands the concept of personal data, such that by unifying the regulation within the
personal data can be anything like an IP address. It also European Union.
involves confidential personal data, such as genetic data, information-has been leaked on the internet.
and biometric data that could be analyzed to identify an
individual in a specific manner. One of the significant improvements that GDPR brings is
allowing users the right to learn when their data was
When did the GDPR come into effect? compromised. Organizations are expected to inform the
relevant national bodies as soon as possible to ensure
After four years of preparation and debate, the European
that EU people can take adequate steps to avoid misuse
Parliament approved the GDPR in April 2016, and the official
of their data. Consumers are often given better access to
texts and regulations of the Directive were published in all
their own personal data in terms of how it is handled, with
of the EU's official languages in May 2016. On 25 May 2018,
organizations expected to explain how they explicitly and
the law came into effect in the European Union.
reasonably use consumer information.
What does GDPR mean for businesses?
Some companies have already worked to ensure that it is
GDPR defines one continent-wide legislation and a the case, even if it is as simple as sending emails to
standard set of rules for companies in the EU Member consumers with information on how their data is used and
States. This means that the law extends beyond the providing them with an opt-out if they do not want to be
boundaries of Europe itself, as foreign organizations part of it. Many companies have asked clients, such as
located outside the country will still need to comply with those in the retail and marketing industries, to ask if
'European soil' activity. One of the hopes is that it will they're going to be part of their database.
offer benefits to companies by slim-lining data
In these cases, the consumer should have a simple way
regulations with GDPR. The European Commission says
to opt-out of being on a mailing list from their details.
that it would make operating within the country easier
Meanwhile, some other sectors have been warned they
and cheaper for companies by providing a single
have much more to do to ensure compliance with
supervisory authority for the whole of the EU.
GDPR-especially when consent is involved. GDPR also
The regulation ensures that data security protections are provides a clarified 'right to be forgotten' process,
developed from the earliest stage of growth into products which offers exclusive rights and freedoms to
and services, offering 'data security by design' in emerging individuals who no longer wish to have their personal
goods and technologies. Organizations are also data processed to have it erased so that there is no
encouraged to adopt techniques such as reason to keep them. Organizations must be mindful of
'pseudonymization' to benefit from the collection and these consumer rights.

June 2020 41
June 2020 42
June 2020 43
preserving data ecosystems

June 2020 44

You might also like