EU GDPR: Recommendations for Data Protection Compliance

Brussels

In a previous post I highlighted and analyzed various aspects of the European Union General Data Protection Regulation (EU GDPR) and provided a summary of my recommendations. This post will more fully explore some of them specifically. My recommendations are listed in sequential order, because it’s crucial that those responsible for the protection of EU citizens’ data take-the-lead in the development and execution of their firm’s protocols. This is true whether an entity is required to hire/assign a Data Protection Officer (DPO) or gives the responsibility to the Data Controller. It is also important to note that recent court rulings have shown an increasing willingness to hold individuals responsible, not merely the firms for which they work.

STEP 1: Hire/Assign a Data Protection Officer (DPO)
– DPOs are required if a Data Controller’s core activities consist of data processing, especially when it requires regular and systematic monitoring of Data Subjects’ personal data. However, entities should consider hiring/assigning a DPO, even if not required, due to the significant workload involved. The duties and responsibilities entailed in complying with the Reg are substantial. And while they may fluctuate, they will unlikely diminish in a linear and predictable fashion.
– The entity must inform the relevant Supervisory Authorities (SA) regarding the new DPO or, in the alternative, that the Data Controller or Processor will be acting in this capacity. The development of a good working relationship between the SA and the entity’s representative will be critical in complying with the Reg. I strongly encourage all entities to establish this relationship sooner rather than later. The SA is not merely someone an entity must inform of a data breach, but can be an invaluable resource in developing a firm’s data protection protocols from the start.
– It is important to remember that even if an entity hires a DPO, the DPO cannot be directed by the Data Controller/Processor. Instead, the DPO works independently and autonomously in order to ensure the security of Data Subjects’ personal data and to avoid the potential for conflicts of interest. This will likely prove to be a delicate balancing act. Although the DPO will be hired by an entity, the DPO’s client-master is actually the Data Subjects of that entity (not the entity itself). This distinction must be maintained in order to avoid even the appearance of undue influence. I will post another blog specifically outlining the role and responsibilities of the DPO. So, stay tuned.

STEP 2: DPO to Conduct an Information Audit and Data Protection Impact Assessment
– In order to plan a future course of action, an entity must first know where it stands today. Therefore, the first order of business once a DPO is identified is to conduct an Information Audit so as to understand: the path that data travels internally and externally (data-in-transit), where the data is stored (data-at-rest), and all of the elements that make up the collection, storage, and processing of data. As part of the Information Audit, a Data Protection Impact Assessment should be conducted in order to understand, quantify, and mitigate the risks and costs associated with data processing. This step should include an evaluation of existing IT systems and the data protections they offer. This may result in the need for additional/different IT systems purchases. Therefore, the entity should plan for this possibility in its budget.

STEP 3: DPO to Establish a Data Protection Code of Conduct to be Shared Internally with All Data Stakeholders (Establish Breach Detection and Notification Procedures)
– One of the results of an Information Audit should be the establishment of a Code of Conduct, which outlines the processes and procedures to be followed regarding the treatment of the personal data of Data Subjects
– The document should also establish the procedures to identify breaches, as well as the notification requirements thereof

STEP 4: DPO to Update Explicit Consent Opt-Ins
– Transparency is paramount. The Data Subject must be informed of:
o The purpose of the data collection, storage, and use
o The length of time that the data will be stored and/or used; if the entity cannot provide a specific length of time, then the entity must provide the Data Subject with the criteria used to determine that period
o The recipients of the data
o The logic involved in automated processing of the data
o The consequences of data processing, if based on profiling (such as with application approval/denial for credit)
– Be sure to separately call-out any data collection, storage, and use for direct marketing purposes

STEP 5: Provide Data Subjects with the Contact Information of the DPO (in the alternative, the Data Controller/Processor)
– The entity must provide Data Subjects with the contact information of the DPO or, if one does not exist, then the Data Controller/Processor for inquiries, concerns, or requests for data erasure, etc.

STEP 6: Use this Reg as your Competitive Advantage
While complying with any Reg that seeks to proscribe certain behaviors is often considered oneous (and rightfully so), it can also offer an entity a competitive advantage, especially when a Reg is first enacted. Just as there is a “window-of-opportunity” for market traction when there is a new product release, so too does one exist whenever legislation impacts the business environment. Therefore, it would be wise to prepare well in advance for compliance and thus, take advantage of being “first-to-market,” so-to-speak, in gaining the trust and confidence of your current and prospective customers.

*Records maintenance is critical throughout, especially in the cases of Steps 2 & 3 above. All entities impacted by this Reg must maintain records of their data processing activities, regardless of whether a DPO is hired/assigned. Information contained therein must include: the purpose of the data collection, storage, and use, the process by which the entity developed the data categories, recipients and their location, time limits for erasure, documentation of suitable safeguards, and a description of security measures.

Author: Donna Taylor

Donna Taylor has 20 years’ experience in the IT industry, including 12 years as an analyst & advisor. She has worked at such high-profile companies as IBM, Gartner, IDC, and Ford Motor Company. She has a diverse skill set with extensive global experience in corporate development & strategy, M&A, venture capital, consulting, market research, competitive analysis, marketing, finance, and international tax & transfer pricing. Taylor is expert at developing & implementing strategic initiatives that drive growth and establish significant market presence and brand awareness, as well as identifying trends, disruptive technologies, and emerging business opportunities. She excels at research, writing, presenting, and advising both the vendor community and end-users. Her areas of expertise include: computer storage, data security, privacy, and protection, EU GDPR, GRC, cloud, Big Data & Analytics, archiving, backup, & recovery, business continuity, and data centres. She has a successful track record of managing and leading global teams and projects. Her business development acumen has led to revenue growth, cost containment, and operational improvements for companies with whom she has worked. Taylor has developed ideas which have led to the identification and segmentation of new areas of research and product development with a global focus and a particular affinity for Europe. She provides insightful perspectives on GTM strategies by addressing the unique characteristics of local markets, while maintaining the cohesive initiatives of a company. She has presented her thought-provoking research at worldwide industry events, which has enabled organizations to take advantage of rapidly-changing market conditions in a timely manner. Taylor holds three university degrees…an MBA in International Management, a JD with a concentration in International Corporate Law, and a BS in both Finance and Multinational Business Operations. These degrees, as well as her extensive experience in the international corporate world, have provided her with a unique perspective on the global marketplace. She has lived in Europe for many years (Munich, Paris, & London), traveled to over 20 countries, and has studied seven foreign languages. As a result, she has a deep understanding of the nuances of global markets, particularly in the EMEA region. *If your organization could benefit from insightful consulting and analysis, please contact Donna Taylor. - consultant/advisor - white papers & reports - guest blogging - speaking engagements

Leave a Reply

Your email address will not be published. Required fields are marked *