Data Flow Mapping And The GDPR - IT Governance

Transcription

Data Flow Mapping and theEU GDPRAdrian Ross LLB (Hons), MBAGRC ConsultantIT Governance Ltd29 September 2016www.itgovernance.co.uk

TMIntroduction IT Governance Ltd 2016 Adrian Ross GRC Consultant––––––––Infrastructure servicesBusiness process re-engineeringBusiness intelligenceBusiness architectureIntellectual propertyLegal complianceData protection and information securityEnterprise risk managementCopyright IT Governance Ltd 2016 – v1.02

TMIT Governance Ltd: GRC one-stop shop IT Governance Ltd 2016All verticals, all sectors, all organisational sizesCopyright IT Governance Ltd 2016 – v1.0

TMAgenda IT Governance Ltd 2016 An overview of the regulatory landscapeTerritorial scopeRemedies, liabilities and penaltiesRisk management and the GDPRLegal requirements for a DPIAWhy and how to conduct a data flow mapping exerciseWhat are the challengesWhat is an information flowThe questions to askData flow mapping techniquesCopyright IT Governance Ltd 2016 – v1.04

TMThe nature of European law IT Governance Ltd 2016 Two main types of legislation:– Directivesº Require individual implementation in each member stateº Implemented by the creation of national laws approved by the parliaments ofeach member stateº European Directive 95/46/EC is a directiveº UK Data Protection Act 1998– Regulationsº Immediately applicable in each member stateº Require no local implementing legislationº The EU GDPR is a regulationCopyright IT Governance Ltd 2016 – v1.0

TMArticle 99: Entry into force andapplication IT Governance Ltd 2016This Regulation shall be binding in its entirety and directlyapplicable in all member states.KEY DATES On 8 April 2016 the Council adopted the Regulation.On 14 April 2016 the Regulation was adopted by the European Parliament.On 4 May 2016 the official text of the Regulation was published in the EU OfficialJournal in all the official languages.The Regulation entered into force on 24 May 2016 and will apply from 25 n/reform/index en.htmFinal text of the Regulation: 9-2016-REV-1/en/pdfCopyright IT Governance Ltd 2016 – v1.0

TMGDPR IT Governance Ltd 2016The GDPR has eleven chapters:1 Chapter I – General Provisions: Articles 1 - 42 Chapter II – Principles: Articles 5 - 113 Chapter III – Rights of the Data Subject: Articles 12 - 234 Chapter IV – Controller and Processor: Articles 24 - 435 Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 506 Chapter VI – Independent Supervisory Authorities: Articles 51 - 597 Chapter VII – Cooperation and Consistency: Articles 60 - 768 Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 849 Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91Copyright IT Governance Ltd 2016 – v1.0

Data protection modelunder the GDPREuropean Data Protection BoardInformation Commissioner’s Office (ICO)(supervising ty?Data controller(organisations)DutiesRightsData s?Disclosure?Thirdparties

TMArticles 1 – 3: Who and where? IT Governance Ltd 2016 Natural person a living individual Natural persons have rights associated with:–The protection of personal data.– The protection of the processing personal data.– The unrestricted movement of personal data within the EU. In material scope:–Personal data that is processed wholly or partly by automated means.– Personal data that is part of a filing system, or intended to be. The Regulation applies to controllers and processors in the EUirrespective of where processing takes place. The Regulation also applies to controllers not in the EU.Copyright IT Governance Ltd 2016 – v1.0

TMRemedies, liabilities and penalties IT Governance Ltd 2016 Article 79: Right to an effective judicial remedy against acontroller or processor–Judicial remedy where their rights have been infringed as a result of theprocessing of personal data.ººIn the courts of the member state where the controller or processor has an establishment.In the courts of the member state where the data subject habitually resides. Article 82: Right to compensation and liability–Any person who has suffered material or non-material damage shall have theright to receive compensation from the controller or processor.– A controller involved in processing shall be liable for damage caused byprocessing. Article 83: General conditions for imposing administrative fines–Imposition of administrative fines will in each case be effective, proportionate,and dissuasive.ºFines shall take into account technical and organisational measures implemented.– 20,000,000 or, in case of an undertaking, 4% of total worldwide annualturnover in the preceding financial year (whichever is higher).Module ICopyright IT Governance Ltd 2016 – v1.0

TMRemedies, liability and penalties (cont.) IT Governance Ltd 2016Article 83: General conditions for imposing administrative fines 10,000,000 or, in case of an undertaking, 2% of total worldwide annualturnover in the preceding financial year (whichever is greater). �––8: Child’s consent11: Processing not requiring identification25: Data protection by design and by default26: Joint controllers27: Representatives of controllers not established in EU26 - 29 & 30: Processing31: Cooperation with the supervisory authority32: Data security33: Notification of breaches to supervisory authority34: Communication of breaches to data subjects35: Data protection impact assessment36: Prior consultation37 - 39: DPOs41(4): Monitoring approved codes of conduct42: Certification43: Certification bodiesCopyright IT Governance Ltd 2016 – v1.0

TMRemedies, liability and penalties (cont.) IT Governance Ltd 2016Article 83: General conditions for imposing administrative fines 20,000,000 or, in case of an undertaking, 4% total worldwideannual turnover in the preceding financial year (whichever is higher). Articles––––––––5: Principles relating to the processing of personal data6: Lawfulness of processing7: Conditions for consent9: Processing special categories of personal data (i.e. sensitive personal data)12 - 22: Data subject rights to information, access, rectification, erasure,restriction of processing, data portability, object, profiling44 - 49: Transfers to third countries58(1): Requirement to provide access to supervisory authority58(2): Orders/limitations on processing or the suspension of data flowsCopyright IT Governance Ltd 2016 – v1.0

TMRisk management and the GDPR IT Governance Ltd 2016RISK is mentioned over60times in the Regulation.It is important to understand privacy risk and integrate it into your risk framework.Copyright IT Governance Ltd 2016 – v1.0

TMWhat is risk? IT Governance Ltd 2016 The effect of uncertainty on objectives (ISO 31000 etc.)Risk is the combination of the probability of an event (IRM)A situation involving exposure to danger (OED)Uncertainty of outcome, within a range of exposure, arising from acombination of the impact and the probability of events (OrangeBook HM Treasury) The uncertainty of an event occurring that could have an impact onthe achievement of objectives (Institute of Internal Auditors)Copyright IT Governance Ltd 2016 – v1.0

TMStandards and codes IT Governance Ltd 2016 ISO 31000, Risk management – Principles and guidelines– AS/NZS 4360:2004 now replaced by ISO 31000ISO 31010, Risk management – Risk assessment techniquesIRM/ALARM/AIRMIC – A risk management standardUK Combined code on UK Corporate Governance codeOECD, Principles of corporate governanceCOSO, Enterprise risk management – Integrated frameworkSector specific, e.g. clinical, foodDiscipline specific, e.g. ISO 27005ISO 22301, Business continuity managementCopyright IT Governance Ltd 2016 – v1.0

TMISO 31000: Risk management IT Governance Ltd 2016 Management framework approachPDCA model modified in ISO 27005Generic (all risks)Very similar to a management systemCopyright IT Governance Ltd 2016 – v1.0

TMRisk management process IT Governance Ltd 2016Establishing the contextRisk assessmentCommunicationandconsultationRisk identificationRisk analysisRisk evaluationRisk treatmentCopyright IT Governance Ltd 2016 – v1.0Monitoringandreview

TMEnterprise risk management IT Governance Ltd 2016 Capabilities:––––––Aligning risk appetite and strategyEnhancing risk response decisionsReducing operational surprises and lossesIdentifying and managing multiple and cross-enterprise risksSeizing opportunitiesImproving deployment of capitalCopyright IT Governance Ltd 2016 – v1.0

TMRisk management IT Governance Ltd 2016 Organisational risk "landscape" Strategic–Business performance– Financial performance– Reputation– Employment law– Health & safety– Company law Regulatory Operational– StatutoryOutput capacity– Demand response– Interruption and disruption– Industry/sector specificcompliance requirements– Licence to operate Contractual– SLA targets/levels– Product/service availability– Quality/warrantyCopyright IT Governance Ltd 2016 – v1.0

TMInformation security IT Governance Ltd 2016 Preservation of confidentiality, integrity and availability of informationand the assets and processes that support and enable itsacquisition, storage, use, protection and disposal. Wide variety of assets:–information– ICT– infrastrucure Prevent compromise (loss, disclosure, corruption, etc.). Includes IT security and other forms of security:–physical– HR– supplyCopyright IT Governance Ltd 2016 – v1.0

TMLegal requirements for a DPIA IT Governance Ltd 2016Article 35: Data protection impact assessment Controller must seek the advice of the Data Protection Officer. This is particularly required in situations that involve:–––––––Automated processingProfilingCreation of legal effectsSignificantly affecting the natural personProcessing of large scale categories of sensitive dataData that relates to criminal offences or convictionsMonitoring on a large scale Conduct a post-implementation review when risk profile changes.Copyright IT Governance Ltd 2016 – v1.0

TMLegal requirements for a DPIAArticle 35: Data protection impact assessment DPIA must be performed where:–New technologies are deployed– Nature, scope & context of the project demand it– Processes are likely to result in a high risk to the rights and freedom– It can be used to address sets of processing & risksCopyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd 2016

TMLegal requirements for a DPIA IT Governance Ltd 2016 The DPIA will set out as a minimum:–––––––––––a description of the processing and purposes;legitimate interests pursued by the controller;an assessment of the necessity and proportionality of the processing;an assessment of the risks to the rights and freedoms of data subjects;the measures envisaged to address the risks;all safeguards & security measures to demonstrate compliance;indications of timeframes if processing relates to erasure;an indication of any data protection by design and default measures;list of recipients of personal data;compliance with approved codes of conduct;whether data subjects have been consulted.Copyright IT Governance Ltd 2016 – v1.0

TMLinking the DPIA to the privacy principles IT Governance Ltd 201623456 Processed lawfully, fairly and in a transparent manner Collected for specified, explicit and legitimate purposes Adequate, relevant and limited to what is necessary Accurate and, where necessary, kept up to date Retained only for as long as necessary Processed in an appropriate manner to maintain securityCopyright IT Governance Ltd 2016 – v1.0Accountability1

TMHow to conduct a data mapping exercise IT Governance Ltd 2016 The ICO staged approach to an effective DPIA:1.2.3.4.5.6.7.8.Required when there is a change in processing of personally identifiableinformation (PII).Determine the information flows throughout the organisation in order tomake a proper assessment of the privacy risks.Identify the risks related to privacy and processing, including the necessity andproportionality of the change in processing.Identify possible privacy solutions to address the risks that have been identified.Assess how the data protection principles have been applied throughout theorganisation.Sign-off and record the DPIA, including details of which privacy solutions are toobe implemented.Integrate the result of the DPIA back into the project plan.Conduct a post-implementation review where risk profile of PII data haschanged.Copyright IT Governance Ltd 2016 – v1.0

TMWhy and how to conduct a datamapping exerciseCopyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd 2016

TMData mapping – what are atetechnical andorganisationalsafeguardsUnderstandlegal ®ulatoryobligationsCopyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd 2016Trust andconfidence

TMWhat is an information flow? IT Governance Ltd 2016A transfer of information from one location to another. For example:–Inside and outside the European Union.– From suppliers and sub-suppliers through to customers.When mapping information flow, you should identify the interactionpoints between the parties involved.NB: Cloud providers present their own challenges.Copyright IT Governance Ltd 2016 – v1.0

TMDescribing information flows IT Governance Ltd 2016Walk through the informationlifecycle toidentify unforeseen or unintendeduses of the data.people who will be usingthe information are consulted on theEnsure thepractical implications.Consider the potential future usesof the information collected, even if it is notimmediately necessary.Copyright IT Governance Ltd 2016 – v1.0

TMInformation flow – identify the keyelements IT Governance Ltd 2016Data itemsName, email, addressHealth data, criminalrecordsBiometrics, location dataFormatsHardcopy (paper records)Digital (USB)DatabaseTransfer methodsPost, telephone, socialmediaInternal (within group)External (data sharing)LocationsOfficesCloudCopyright IT Governance Ltd 2016 – v1.0Third parties

TMData flow mapping – questions to ask IT Governance Ltd 2016 Workflow inputs and outputs:––––––How is personal data collected (e.g. form, online, call centre, other)?Who is accountable for personal data?What is the location of the systems/filing systems containing the data?Who has access to the information?Is the information disclosed/shared with anyone (e.g suppliers, third parties)?Does the system interface with, or transfer information to, other systems?Copyright IT Governance Ltd 2016 – v1.0

TMData flow mapping – techniques IT Governance Ltd 2016 Inspect existing documentsFacilitation workshopsQuestionnairesObservationWhiteboard – freeform diagramsTemplate drawings (Visio, mind map tools)Post-it notesCopyright IT Governance Ltd 2016 – v1.0

TMExample information flow IT Governance Ltd 2016Third party usersHR ent servicesRecruitment servicesOutplacementdataOutsourced Copyright IT Governance Ltd 2016 – v1.0

TMData Flow Mapping Tool IT Governance Ltd 2016 Gain full visibility over the flow of datathrough your organisation Simplify the process of creating data flowmaps Create consistent visual representations ofthe flow of personal data through all yourbusiness processesFind out more Copyright IT Governance Ltd 2016 – v1.0

TMIT Governance: GDPR one-stop shop IT Governance Ltd 2016 Accredited training, one-day foundation course:–London OR Cambridge: gdpr-training-course.aspx– ONLINE: gdpr-online-training-course.aspx Practitioner course, classroom or ractitioner-gdpr-training-course.aspx Pocket guide: a-pocketguide.aspx Documentation toolkit: olkit.aspx Consultancy support :–Data audit– Transition/implementation consultancy– ltancy.aspxCopyright IT Governance Ltd 2016 – v1.0

TM IT Governance Ltd 2016Questions?aross@itgovernance.co.uk0845 070 1750www.itgovernance.co.ukCopyright IT Governance Ltd 2016 – v1.0

Assess how the data protection principles have been applied throughout the organisation. 6. Sign-off and record the DPIA, including details of which privacy solutions are too be implemented. 7. Integrate the result of the DPIA back into the project plan. 8. Conduct a post-implementation review where risk profile of PII data has changed.