GDPR: How Prepared Are You for EU’s New Privacy Laws?
GDPR: How Prepared Are You for EU’s New Privacy ...
GDPR: How Prepared Are You for EU’s New Privacy Laws?
The competing timetables between Brexit and the General Data Protection Regulation (GDPR), and current intent by the UK Government to repatriate the EU’s Laws en-bloc mean that the EU’s GDPR will become law in the UK irrespective of the route that Brexit takes. In addition, it will become law in the European Union and has extra-territorial reach, and so across the world, those companies that want to trade with citizens of the EU, or locate in the EU, will need to plan their compliance. What changes in practice will be required?
First, the need to only process personal information with the consent of the individual concerned, for the purposes consented, for the duration of the purposes consented remain in place; they were a requirement of the laws mandated by the previous EU directive. It is also a duty of data controllers and data processors to ensure that personal data is accurate. These principles are the building blocks on which the new duties are built. I believe that many of the more excitingly named new duties, such as the right to erasure are restatements and clarifications of the need to obtain consent before using personal data. Personally, I am unclear if the right to complain about the use of algorithms is new or a restatement of the need for consent but I have been arguing for a while that public judicial or quasi-judicial information systems must be capable of the technology equivalent of cross-examination. Now the law says that in the case of private sector processing, people have a right to be judged by people, even if only through a complaints or appeal process.
Private by Design
Applications and Business systems now need to have their privacy protection and functionality built in by design. This may require a review of the requirements management process to ensure that compliance with the GDPR is considered and planned for. Personal identifying information needs to be documented in the data models. Data models would now seem to be mandatory because the capture of the jurisdiction controlling the data captured is needed to prove compliance. Data subject consents need to be captured and stored. Functionality delivering access to basic personal rights -some of which are old, some of which are new – need to be available, so building functions fulfilling subject matter access requests, amending & deleting data, creating audit trails for complaint handling and permitting people to take their data away in machine readable, convenient form will all need to be engineered. Since 1995, Europe’s Data Protection Authorities, including the UK’s Information Commissioner’s Office have been working on “Privacy Impact Analyses”, a tool for assessing Privacy Risk, and ensuring that information systems deliver personal privacy for customers and staff. Now that companies need to show that they meet the “private by design” requirements of the GDPR, the private sector is going to have to engage with these tools.
The most difficult part of compliance is likely to be proving that one’s data protection and privacy controls are comprehensive, e.g. all fields containing ‘personal data’ are known, all uses are documented and consents exist. Proving what you’ve done will be relatively easy, proving that it’s been done everywhere required will be harder. The law proposes national certification systems (Article 42) which may make things easier for some medium-sized firms. Certification will be seen as a statement that the firm’s systems are appropriate, but obtaining these certificates will be an additional regulatory burden. Larger companies may find their certification and control systems are good enough, but small firms will find even 3rd party certification schemes expensive; they will have to rely on their Data Protection Officer.
Adequate Technical Protection
The new law repeats the requirement to implement appropriate technical and organisational measures to protect personal data. It is my view that it is likely that various international standards such as ISO 27001 will also be used to define good or best practice in designing and implementing technical systems and COBIT for designing organisational responses. Some of this is well understood in the IT Security world; policies and protection against cyber security, information integrity, physical access and user access management risks need to continue to be built and deployed. These solutions are currently generally seen as belonging to Chief Information Security Officer (CISO) organisations. The principles of “least privilege” and “need to know” must be the principal non-functional design rule. This requires the definition of roles and privilege, the elimination of toxic combinations of duties and the implementation of comprehensive information entitlements definitions. These should ensure that access to personal data is appropriate, necessary and approved. Standard technology tools such as encryption should be used to implement protection against confidentiality and integrity threats. Some of this will need to be part of the applications procurement or engineering process and it should create the opportunity for increased product functionality in the CRM and HR software packages market. Financial services solutions architectures have been refactoring towards customer file orientated systems as opposed to the previous generation of product orientated systems for many years, although the work is far from complete in the largest of organisations. A consolidation of customer and employee systems functionality would make building and maintaining the privacy management systems easier and cheaper.
There are a new duty and deadline for reporting confidentiality breaches. The detection and breach response processes and management/legal involvement must be reviewed to ensure that the processes meet the new law’s requirements.
Enforcement will be delegated to the member states data protection authorities, the ICO in the UK, and the maximum fines for non-compliance are going to be high, up to 4% of global turnover or €20m.
The way in which many firms manage their Data Protection compliance will need to change. Firms subject to the law will need a Data Protection Officer, who will be accountable to the company at the highest level, and need to be professionally accountable in a similar way that accountants and CFOs are. The DPO will have a duty to the public as well as the company.
Getting all this right is important; as stated above, the fines for non-compliance are high.
We may even protect people’s private data more effectively.
 The UK Government plans to give notice to quit the European Union in March 2017, this sets a two year deadline for negotiations about the terms of departure, ending in March 2019. The GDPR became law in May 2016 and there is a two year delay to allow businesses and national regulators to prepare for compliance. Compliance processes and enforcement procedures must be in place by May 2018.
 A Data Model is an abstract model that organizes elements of data and standardizes how they relate to one another and to properties of the real world entities. Source: https://en.wikipedia.org/wiki/Data_model
Essential Capabilities for building Defense in Depth for Public and Hybrid Cloud
The explosive increase in Cloud Services consumed across the industry, coupled with a dramatic incre...
FT Names Citihub Digital as one of 2021’s Leading Management Consultants
“We’re thankful to be recognized for the 4th successive year for our leadership in financial ser...
Cyber Resilience is more than Detect and Prevent, it’s also about Respond and Recover
Joining forces with Synechron, our Risk & Cyber Security SMEs Graham Fletcher and Gavin Wilson share...
Digital Transformations in the age of COVID-19
Joining forces with Synechron, our Enterprise Transformation SMEs offer their perspectives on why a ...
Meeting your Data Obligations in the Cloud After Brexit
Joining forces with Synechron, our RegTech SMEs – Bob Mudhar & Anand Chandra - talk about the the ...
How to set up a Test Coverage threshold in Go and Github
Senior Consultant Luis Carrazana enumerates the steps needed to implement a Test Coverage Threshold...
Cyber security and the growth of untrusted infrastructure and hybrid workforces
Joining forces with Synechron, our Dev & Sec SMEs talk about the increasingly important role of clou...
Increasing test coverage without slowing down development
Are you confident about refactoring your legacy project? What are you doing to ensure stability with...
15 Minutes with: Utsav Ratti on Smashing the silos between IT and business teams
Has the pandemic made the divide between IT and business teams worse or has it presented an opportun...