Last updated on August 9, 2019
One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Regulation, or GDPR. As of May 25, 2018, the GDPR is a legal and enforceable act of the European Union.
In this post, we will detail the key findings as a security professional how to work to satisfy the requirements of GDPR.
General Data Protection RegulationGDPR
| Chapter 1 | – | 1 2 3 4 |
| Chapter 2 | – | 5 6 7 8 9 10 11 |
| Chapter 3 | – | 12 13 14 15 16 17 18 19 20 21 22 23 |
| Chapter 4 | – | 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 |
| Chapter 5 | – | 44 45 46 47 48 49 50 |
| Chapter 6 | – | 51 52 53 54 55 56 57 58 59 |
| Chapter 7 | – | 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 |
| Chapter 8 | – | 77 78 79 80 81 82 83 84 |
| Chapter 9 | – | 85 86 87 88 89 90 91 |
| Chapter 10 | – | 92 93 |
| Chapter 11 | – | 94 95 96 97 98 99 |
First two things not included in GDPR:
- GDPR Does not include privacy or personally identifiable data
- GDPR is an extraterritorial regulation. Any organization which coleects / stores / processes / tramsits / changes personal data of EU citizens, have to follow the requirements of GDPR, even it is not based in EU.
(ISC)2 developed a framework for success:
Phase 1: Develop
- Identify senior stakeholders and engage each business unit affected.
- Allocate adequate resources to support implementation.
- Inventory and analyze the personal data held across the organization. Verify procedures to ensure they cover all rights EU individuals have under GDPR.
- Review how consent is sought, obtained and recorded to determine if changes are needed.
- Designate a data protection officer (DPO) when processing involves specific data categories, personal data processing is large scale, and if processing these special types of personal data is core to your business.
Phase 2: Implement
- Identify gaps and developjroject plan to meet the data protection requirements set forth by GDPR. Two areas identified as particularly adding to the heavy workload are data protection impact assessments (DPIA) and subject access requests (SAR). Companies need to scope out how they plan to do these, and they too are subject to a risk assessment/maturity roadmap process.
- Refine the solutions necessary for improving data protection and ensuring adherence to requirements and regulations.
- Implement procedures to detect, report and investigate personal data breaches.
- Test, deploy, and OA all controls and solutions developed to achieve compliance.
- Develop an internal GDPR audit plan.
- Operationalize the efforts of monitoring all data protection controls created.
Phase 3: Improve
- Move into a state of continuous improvement.
- Put GDPR efforts into maintenance/review/update mode.
- Enhance controls and customer service to remain GDPR-compliant and build trust and vkle with customers.
1. Setting the GDPR Strategy
Phase 1: Develop
- Identify senior stakeholders and engage each business unit affected.
- Allocate adequate resources to support implementation.
Objectives:
- Become familiar with sepcific articles
- Identify articles that apply to your company
- Identify stakeholders who will make decisions
GDPR合规三步走
本文详细阐述了欧盟通用数据保护条例(GDPR)对全球安全行业的影响,以及组织如何通过三个阶段:开发、实施和改进,来满足GDPR的要求。关键步骤包括识别利益相关者、资源分配、个人数据盘点、权利覆盖程序验证、同意获取方式审查、指定数据保护官(DPO),以及进行数据保护影响评估和主题访问请求处理。
7579

被折叠的 条评论
为什么被折叠?



