How to Implement GDPR Part 1 :Roadmap for Implementation

Prabh Nair
12 Mar 202439:16

Summary

TLDRIn this informative session, guest speaker Mr. PKA Chavan discusses the implementation of GDPR from scratch, sharing his 8+ years of experience in data privacy across various sectors. He outlines the importance of understanding GDPR as a global regulation and provides practical steps for creating a data privacy program, including policy development, gap analysis, and the use of templates for assessments. Chavan also emphasizes the role of communication and change management in successfully implementing data privacy measures within an organization.

Takeaways

  • πŸ“ The session is focused on practical implementation of GDPR with the help of a special guest, Mr. PKA Chavan, who has extensive experience in data privacy across various sectors.
  • 🌐 Mr. Chavan discusses the global impact of GDPR, emphasizing its significance beyond the European Union and how it has influenced data privacy regulations worldwide.
  • πŸ” The importance of understanding the jurisdiction and customer base of a business is highlighted as the starting point for any data privacy program, including GDPR compliance.
  • πŸ“š The creation of a Global Privacy Handbook is suggested as a comprehensive manual that includes applicable regulations, data privacy frameworks, procedural documents, and policies.
  • πŸ“‹ The script outlines the process of developing a data privacy policy, emphasizing the need to understand the specific requirements of different jurisdictions and tailoring the policy accordingly.
  • πŸ”‘ The concept of 'Privacy by Design' is introduced as a critical aspect of data privacy, which involves assessing and implementing privacy measures from the outset of a project or process.
  • πŸͺ Cookie compliance is presented as an 'easy win' for demonstrating quick progress in data privacy, as it involves obtaining consent from data subjects for the use of cookies.
  • πŸ” The necessity of conducting Privacy Impact Assessments (PIA) is discussed to identify and mitigate risks associated with the processing of personal data.
  • πŸ“ Records of Processing Activity (RPA) are described as a crucial document for maintaining a comprehensive understanding of all business processes, especially those involving personal data.
  • πŸ“‘ The script touches on the importance of reviewing and updating existing policies and contracts to ensure they align with data privacy regulations and protect the organization legally.
  • 🀝 The distinction between data controllers and data processors is clarified, along with the need for data processing agreements or Master Service Agreements (MSA) to ensure contractual protection in data handling.

Q & A

  • What is the main topic of the session in the provided transcript?

    -The main topic of the session is about the practical implementation of GDPR (General Data Protection Regulation) from a professional with extensive experience in data privacy.

  • Who is the special guest in the session?

    -The special guest in the session is Mr. PKA Chavan, who has over 8 years of experience in data privacy across various sectors.

  • What is the significance of GDPR in the context of this session?

    -GDPR is significant as it is an advanced level regulation in data privacy within the European Union, and the session aims to discuss practical case studies on how to implement it from scratch.

  • Why is data privacy considered a buzzword in today's world?

    -Data privacy is a buzzword because of the increasing awareness and importance given to personal data protection, especially after the introduction of regulations like GDPR, CCPA, and others.

  • What does the speaker suggest for someone looking to start a career in data privacy?

    -The speaker suggests that starting with an analyst position and obtaining relevant certifications like CIPM can help stand out. Also, having a background in a related field and demonstrating technical knowledge along with program management skills can be beneficial.

  • What is the role of a data privacy officer or analyst in an organization?

    -The role of a data privacy officer or analyst includes understanding and implementing data privacy regulations, creating privacy policies, conducting gap analysis, and ensuring the organization's compliance with data protection laws.

  • What is the importance of a Global Privacy Handbook in the context of data privacy?

    -A Global Privacy Handbook serves as a comprehensive manual that incorporates applicable regulations, data privacy frameworks, procedural documents, and policies, providing a guide for the organization's data privacy practices.

  • What does the speaker mean by 'easy wins' in the context of data privacy implementation?

    -In the context of data privacy implementation, 'easy wins' refer to quick and relatively simple tasks that can demonstrate progress, such as cookie compliance, which can help build momentum and motivation within the organization.

  • What is the purpose of a Records of Processing Activity (RoPA) document?

    -The purpose of a Records of Processing Activity (RoPA) document is to provide a comprehensive understanding of all business processes within an organization, particularly how personal data is handled, its source, destination, and the legal basis for processing.

  • What is a Privacy Impact Assessment (PIA) and why is it important?

    -A Privacy Impact Assessment (PIA) is a process to identify and evaluate the risks involved in processing personal data. It's important to ensure that appropriate controls are in place to protect the data and to comply with data privacy regulations.

  • Why is it necessary to review and update existing contracts in the context of data privacy?

    -Reviewing and updating existing contracts is necessary to ensure that data privacy clauses are included, which protect the organization legally and contractually, especially in cases where data processing involves third-party vendors or processors.

Outlines

00:00

🀝 Introduction to the GDPR Implementation Session

The session begins with a warm welcome and introduction to a special guest, Mr. PKA Chavan, who is an expert in data privacy with over 8 years of experience. The host expresses his eagerness to discuss GDPR implementation, a topic he has previously consulted with Mr. Chavan on. The conversation aims to benefit a wider audience by sharing practical insights on data privacy, particularly focusing on the General Data Protection Regulation (GDPR). Mr. Chavan's expertise spans various sectors, and the host appreciates his willingness to share his knowledge during a busy weekend. The session is intended for those curious about data privacy and GDPR, with Mr. Chavan promising to share his journey and skill set development in data privacy, starting from scratch.

05:01

πŸ” The Future of Data Privacy and Career Insights

This paragraph delves into the future prospects of a career in data privacy, a field that is booming and predicted to grow for the next 5 to 8 years. The speaker discusses the global landscape changes post-GDPR, with new regulations emerging worldwide. The paragraph emphasizes the importance of data privacy in protecting personal information and differentiates it from information security. The speaker shares his background as a computer engineer with an MBA in marketing before transitioning into data privacy, suggesting that if he can do it, anyone can. The focus then shifts to the importance of certification, such as CIPM, to stand out in the field and the value of combining technical skills with program management abilities for career advancement in data privacy.

10:02

πŸ“š Understanding GDPR and Data Privacy Basics

The speaker provides an overview of the GDPR, explaining its significance as an advanced regulation in data privacy within the European Union. The paragraph outlines the evolution of GDPR from its proposal in 2012 to its enforcement in 2018, emphasizing its global impact due to the internet and globalization. The speaker then discusses the initial steps in implementing a data privacy program, starting with understanding the business location and customer base to determine the applicable regulations. The paragraph highlights the importance of a gap analysis between different regulations and creating a comprehensive plan for data privacy, including the development of a global privacy handbook as a reference for ongoing tasks.

15:02

πŸ› οΈ Building a Data Privacy Framework from Scratch

The paragraph discusses the process of building a data privacy framework from the ground up, especially in organizations without existing controls. It begins with identifying the jurisdiction and regulations that apply to the business, followed by the creation of a data privacy policy. The speaker suggests using industry-specific policies as a starting point and customizing them to fit organizational needs. The paragraph also touches on the importance of granularity in the framework, making it measurable and actionable. The speaker emphasizes the role of a data privacy officer or analyst in translating policy into practical, manageable tasks and the significance of creating templates for processes like privacy impact assessments.

20:05

πŸ“‹ The Importance of Records of Processing Activities

This paragraph underscores the importance of maintaining Records of Processing Activities (RoPA) as a central document in the data privacy program. It serves as a comprehensive repository of all business processes, detailing the purpose, data sources, legal bases for processing, and types of personal information involved. The RoPA is crucial for understanding the flow of personal data within the organization and is a mandatory requirement in jurisdictions like the GDPR. The paragraph explains how the RoPA aids in identifying the source and destination of data, legal bases for processing, and the specific personal data used in various processes, thereby facilitating subsequent privacy modules.

25:06

πŸ”‘ Navigating Data Privacy Agreements and Risk Assessments

The speaker discusses the role of data privacy agreements, particularly in the context of vendors and contracts. The paragraph explains the distinction between data controllers, who make decisions about data, and data processors, who act on behalf of controllers. It highlights the importance of ensuring contracts include data privacy clauses to protect the organization legally. The paragraph also introduces the concept of Privacy Impact Assessments (PIA), which aim to identify the risks associated with processing personal data and to evaluate the controls in place to mitigate those risks. The speaker emphasizes the significance of understanding and managing these aspects as part of a data privacy officer's responsibilities.

Mindmap

Keywords

πŸ’‘GDPR

GDPR stands for General Data Protection Regulation, which is a regulation in data privacy proposed by the European Union. It is considered an advanced level regulation that came into effect in 2018 and has significantly influenced global data privacy practices. In the video, GDPR is a central theme, with the discussion focusing on its implementation and its impact on organizations worldwide.

πŸ’‘Data Privacy

Data privacy is the overarching theme of the video, referring to the policies and practices that protect personal information from unauthorized access, use, or disclosure. It is a buzzword in the current digital landscape, with the video emphasizing its importance and practical implementation, especially in the context of GDPR.

πŸ’‘Data Subject

A data subject is an individual whose personal data is being collected, stored, or processed. In the script, the concept of data subject is important as it highlights the rights and control they have over their data, which is a fundamental aspect of GDPR and data privacy.

πŸ’‘Consent

Consent is a legal basis under GDPR for processing personal data, where an individual must give clear and affirmative agreement for their data to be used. The video script mentions the importance of consent in the context of cookies and online data collection, illustrating the practical application of GDPR requirements.

πŸ’‘Data Controller

A data controller is an entity that determines the purposes and means of processing personal data. In the video, the role of a data controller is discussed in the context of making decisions about data processing and ensuring compliance with data privacy regulations.

πŸ’‘Data Processor

A data processor is an entity that processes personal data on behalf of the data controller. The video script explains the distinction between a data controller and a data processor, emphasizing the contractual obligations and responsibilities in data processing agreements.

πŸ’‘Privacy Policy

A privacy policy is a document that outlines how an organization collects, uses, and protects personal data. The video script discusses the creation and importance of a privacy policy in complying with GDPR and ensuring transparency with data subjects.

πŸ’‘Data Flow Diagram

A data flow diagram is a visual representation of the movement of data within an organization. The script mentions the creation of a data flow diagram to understand the source and destination of data, which is crucial for conducting privacy impact assessments and ensuring data protection.

πŸ’‘Privacy Impact Assessment (PIA)

A Privacy Impact Assessment is a process of evaluating the potential risks of processing personal data to the data subjects. The video script discusses PIAs as a method to identify and mitigate risks associated with data processing activities, aligning with GDPR requirements.

πŸ’‘Records of Processing Activities

Records of Processing Activities is a document required under GDPR that contains comprehensive details about an organization's data processing activities. The video script describes this document as essential for understanding all business processes and ensuring compliance with data privacy regulations.

πŸ’‘Cookie Compliance

Cookie compliance refers to adhering to regulations that govern the use of cookies on websites, such as obtaining user consent before storing cookies. The video script identifies cookie compliance as an 'easy win' in demonstrating quick progress in data privacy initiatives, highlighting its relevance in GDPR compliance.

Highlights

Introduction to a session on data privacy with a focus on GDPR implementation.

Pankaj Chavan's expertise in data privacy with over 8 years of experience across various sectors.

The importance of understanding GDPR as a buzzword and its practical implementation.

Pankaj's approach to sharing insights on data privacy gained through personal experience.

The significance of data privacy in the current global landscape, especially post-GDPR.

Career opportunities in data privacy and its projected growth over the next 5 to 8 years.

The value of obtaining certifications like CIPM for a career in data privacy.

The distinction between data privacy as a subset of information security.

The basics of data privacy focusing on the protection of personal information.

The GDPR's impact as an advanced regulation in data privacy within the European Union.

The process of conducting a gap analysis between different data privacy regulations.

Creating a global privacy handbook as a comprehensive manual for data privacy practices.

The strategy of starting with small wins in data privacy, such as cookie compliance.

The importance of records of processing activities as a central document in a privacy program.

Conducting privacy impact assessments to identify and mitigate risks associated with personal data processing.

Managing data privacy clauses in contracts and the use of data processing agreements.

The concept of data controllers and data processors in the context of data privacy regulations.

Transcripts

play00:01

[Music]

play00:13

[Music]

play00:15

hey guys welcome to the session on

play00:17

coffee with PR and today we have a

play00:19

special guest my friend Mr PKA chavan uh

play00:22

in the past we you know Mr pach has did

play00:25

uh sessions with us and um U you know I

play00:28

was curious about how to Implement gdpr

play00:30

and whenever I used to have a data

play00:32

privacy queries I reach out to some of

play00:34

the few folks and pankaj is one of them

play00:36

so I thought the kind of information I

play00:38

used to get from page in my one to1 call

play00:41

I thought let me bring this on this

play00:43

platform which is basically get benefit

play00:45

by multiple people when it come to pach

play00:47

8 plus year of experience uh in the data

play00:50

privacy where he were involved in

play00:52

Consulting products banking

play00:54

manufacturing sector marketing and all

play00:55

that so as you know data privacy is a

play00:57

buz word and gdpr is is basically the

play01:00

new things there's a lot of Scholars

play01:02

were using CHP chat jpt and AI they

play01:04

generating a Content but what is

play01:07

practical GDP how practically we

play01:09

Implement to be frank pach B I was

play01:11

searching multiple videos on YouTube

play01:13

where I could not find how to implement

play01:15

gdpr apart from using a chat gbt prompt

play01:18

but it is glad that okay in this

play01:20

particular platform we got an

play01:22

opportunity by Mr pachan who going to

play01:24

share the Practical case study how to

play01:26

implement gdpr from zero thanks Pang by

play01:29

taking out the time from a weekend and I

play01:30

know weekend is is something is very

play01:33

very very busy in Dubai and taking out

play01:36

the time for this community it is really

play01:39

appreciating thank you thank you br uh

play01:41

first of all I'm very happy to be in

play01:44

your session and definitely I would like

play01:46

to share some insights about how uh the

play01:49

data privacy you know is implemented

play01:52

internally within the organization so

play01:54

like you rightly said so I have eight

play01:56

plus years of experience and I have

play01:57

worked with multiple industry currently

play01:59

I'm working within Insurance sector MH

play02:03

so probably um I assume you can see my

play02:06

screen now on the screen you can see

play02:08

there are lot of boxes lot of circles

play02:11

and this is how the pathway of data

play02:13

privacy is so the idea today is that um

play02:16

I will tell you how I had started this

play02:19

journey as a consultant and from there

play02:21

how I developed my skill set on

play02:24

implementing the endtoend data privacy

play02:26

segment so uh I have worked with a lot

play02:29

of of multiple jurisdictions gdpr being

play02:32

one of them and I have worked with um

play02:35

Middle Eastern regulations especially

play02:37

from bahin Oman UAE Qatar and then I

play02:41

have worked with Singapore data PR

play02:42

regulation as well I have worked with

play02:45

extensively with gdpr because I was

play02:47

earlier associated with one of the

play02:49

Swedish

play02:50

firm so that is how I have this idea and

play02:54

the logic that I'll be telling you you

play02:56

guys today is more about how I have

play02:59

implemented it when there was nothing in

play03:02

the organization like from scratch I

play03:04

have built certain programs and at the

play03:06

and in few organization there was s

play03:09

certain setups like privacy policy were

play03:11

there and from there how I picked up uh

play03:13

to implement the end to end program so

play03:15

the entire conversation I guess will be

play03:17

on those lines

play03:18

today Pang before we going to discuss

play03:21

about this gdpr okay uh you know there's

play03:24

a one question I always ask my uh

play03:26

panelist and all that you know the the

play03:29

the people who come to the sessions and

play03:30

all that if someone want to make a

play03:33

career in data

play03:34

privacy okay so what is the future of

play03:38

this particular

play03:39

vertical sure okay so uh if somebody

play03:43

let's say is willing to join this um you

play03:46

know good field of data privacy which is

play03:49

a boom in today's world also I see it a

play03:53

boom for at least next 5 to eight years

play03:56

easily because everywhere the glob

play03:59

landscape has been changing especially

play04:02

after gdpr when it was launched back in

play04:04

25th May 2018 after that many regulation

play04:07

picked up CCPA came in then even today

play04:10

we have India's privacy regulation which

play04:11

is uh in the Forefront and which will

play04:14

they have given certain timeline to

play04:16

abide by so if you we can see a lot of

play04:19

Scholars posting about India data

play04:21

privacy dpd yeah a lot of people are

play04:25

posting it and which is a good thing and

play04:27

it's also good thing that uh government

play04:30

has done from a perspective because you

play04:32

you know right how many Tel calls we get

play04:35

each day and our personal just being

play04:37

sold to so from that angle if if you see

play04:40

it's a very important aspect and this is

play04:44

I would say a more technical field okay

play04:47

so you don't have to like worry that

play04:50

what I have studied so far and will that

play04:53

make sense so basically my background is

play04:55

I am a computer engineer and I have done

play04:57

MBA in marketing after I have jumped

play05:00

into Data privacy so it's like if I can

play05:03

do it anybody can do it sort of a thing

play05:06

so basically uh the future I see here is

play05:10

more uh towards you can if you are

play05:12

starting new in your career then analyst

play05:14

position probably the better way to

play05:17

start is get a certification because

play05:20

certification generally will make you

play05:22

stand out of the entire crowd so that

play05:25

like C and cipm all those kind of

play05:28

certificate

play05:30

I and obviously if you are in a let's

play05:33

say mid level mid managerial level and

play05:35

you are looking for a bump in data

play05:37

privacy then in that case probably your

play05:40

work experience along with uh relevant

play05:44

um you know implementation of certain

play05:47

aspect not related to data pracy but

play05:49

let's say you have uh skills of program

play05:52

management you know how to run entire

play05:54

end to end program you know how to uh

play05:56

convince the stakeholders you know how

play05:58

to get things things done so from that

play06:00

perspective if you see even in mid

play06:02

manager position if you get the

play06:04

technical skill set let's say by certain

play06:07

courses by reading certain books if you

play06:09

are able to demonstrate that knowledge

play06:11

that along with my program management

play06:13

skills I can do this then that is also

play06:16

one of the uh thing I can see which will

play06:18

land you in a data privacy Road okay

play06:21

that is the case so so um you know we we

play06:24

say that for the information security

play06:25

I'm sorry I'm I'm going bit know we we

play06:28

just starting a session with something

play06:29

else but uh you know you know because

play06:32

this video is watched by those people

play06:34

who also new to the data privacy and all

play06:36

that see when we say in information

play06:38

security we need to know DNS we need to

play06:40

know information security Concepts and

play06:41

all that to understand data privacy what

play06:43

is the basics what are the basics are

play06:45

required so Basics are you just need to

play06:49

know the regulation so if um data

play06:51

privacy as a concept you should know so

play06:53

information like it's a very big concept

play06:55

but there are a lot of asps but if you

play06:57

see data privacy is more um know focused

play07:01

it's more about protecting personal

play07:03

information okay if somebody if somebody

play07:06

tells you data privacy then you should

play07:08

just think that it is about personal

play07:09

data and then there are seven to eight

play07:12

modules which are associated with it so

play07:14

we will be discussing those seven to

play07:16

eight modules today but that is just a

play07:18

general thought process you should also

play07:20

have when you think about the word data

play07:22

privacy so when you go in the

play07:23

organization so it will be very easy uh

play07:27

as compared to information security so I

play07:29

call it data privacy as a subset of

play07:31

information security because it's a very

play07:34

large we can able to maintain privacy by

play07:36

information security controls

play07:38

only I wouldn't say throughout

play07:41

because requirement I'm saying yeah yes

play07:45

the basic ISO 2701 if you even do that

play07:48

then yes you are I would say more than

play07:51

above average people who are know

play07:53

thinking about privacy so when you think

play07:55

about privacy think like you have to

play07:59

give control of the data to the person

play08:02

who whose data it is in the question so

play08:05

data subject is what we call them and

play08:07

when you think about information

play08:09

security the control is more towards

play08:10

organization that how an organization

play08:12

takes care of the data that what

play08:14

controls put in place they don't have to

play08:17

go they don't ask generally the data

play08:19

subject right that what should we do

play08:21

it's their it's their um you know

play08:24

technological ability and all those

play08:26

aspect whereas in data privacy we have

play08:28

to make sure that in the decision making

play08:31

Pro process even the uh consent of the

play08:34

data subject is taken into consideration

play08:36

and there that is where the data privacy

play08:39

as a domain becomes separate from

play08:41

information security to some extent

play08:44

understood that is the idea so so if if

play08:47

you take a example of today like you

play08:50

know we today talking about know gdpr

play08:53

perspective and all that so will it give

play08:56

a high level view to the people who new

play08:59

to gdpr or will this session will be

play09:01

useful for those also who want to impl

play09:03

gdpr but want to know high level how it

play09:05

works actually so can can can we say

play09:07

that this this this session what we're

play09:08

going to do

play09:09

today give give them a

play09:12

framework and based on that they can

play09:14

able to enhance yeah yep yeah yes so

play09:17

this is someone who let's say doesn't

play09:19

have any knowledge about data privacy so

play09:22

yes we will be having the conversation

play09:26

from those lights and let's say somebody

play09:28

has uh brief knowledge that okay these

play09:31

are some of the things that I know so

play09:33

for them also it will be beneficial

play09:35

because we'll be seeing in-depth

play09:37

analysis of how each phase has to be

play09:39

conducted understood so this is based on

play09:42

my experience my work experience which I

play09:44

have been doing in my Consulting forms

play09:46

and even in standard Lear organization

play09:48

so from that perspective I see it

play09:51

beneficial for both the audience

play09:53

understood no issues so so we can we can

play09:56

basically start with this aspect about

play09:58

uh what is gdpr and sorry how the gdpr

play10:01

is basically Implement in the

play10:03

organization and what is basically the

play10:04

road map yeah sure so for those who

play10:08

don't know let's say gdpr gdpr stands

play10:10

for General data protection regulation

play10:12

so it is uh you can say kind of an

play10:15

advanced level regulation in data

play10:17

privacy which was proposed in the

play10:19

European Union so European Union consist

play10:22

of 28 countries so during uh two uh last

play10:26

decade the proposal was made during 2012

play10:29

then slowly it came into um the force in

play10:33

2016 and then in 2016 the organizations

play10:36

were given 2 years of timeline to comply

play10:38

with gdpr that was in 2018 so by 2018

play10:41

everybody has to be comping so what

play10:44

makes gdpr stands out with respect to

play10:48

the earlier versions of data privacy

play10:50

regulation is that it contains more

play10:54

controls over how things are driven in

play10:57

today's technological world world so

play10:59

let's say the let's say the you know how

play11:04

system system because the earlier

play11:06

regulation were more um of a what I can

play11:11

say more computerized but not that

play11:15

advanc so it was more like for paper

play11:17

based data also the same regulation were

play11:19

there so same regulations were

play11:21

applicable but in today's world where

play11:23

the internet has you know has given

play11:26

people the closeness the globalization

play11:29

so earlier regulation were more

play11:31

Standalone to the European Union itself

play11:33

but through gdpr now the control has

play11:36

expanded towards the entire Globe so

play11:39

that was kind of a major change which

play11:41

gdpr bought in okay okay so um when we

play11:46

talk about gdpr or let's say any data

play11:48

privacy program so gdpr we can keep that

play11:51

as a reference let's say any data

play11:53

privacy program be it in any

play11:55

jurisdiction so this workflow definitely

play11:58

will help you you uh in achieving that

play12:01

okay so let's say you are hired as a

play12:05

analyst for example okay you are

play12:07

starting new now what would you do now

play12:10

basically there can be two aspects to it

play12:13

either an organization has certain level

play12:16

of controls or organization is starting

play12:19

pretty new okay so we'll take the first

play12:22

uh second case which is starting pretty

play12:24

new they have nothing in place so they

play12:26

have just hired you as an analyst or

play12:28

consult or a DPO whatever you call it

play12:31

and then uh it grows from there so the

play12:36

first thing so what will be the first

play12:38

thing that you will do so for me when I

play12:42

go to an organization my first question

play12:44

to them is where is your business

play12:48

generally located and where are your

play12:50

customer bases because that becomes my

play12:52

starting point to do the entire analysis

play12:55

why this is important now when I say

play12:59

certain jurisdiction let's say if I'm

play13:01

working in India and my customer base

play13:04

vendor base let's say they are also in

play13:06

India itself then I know that for me the

play13:09

prime thing or prime jurisdiction I need

play13:11

to focus is the data protection bill

play13:13

passed by the India the

play13:15

dpdp now similarly if I am working in

play13:19

India but my I have clients or customers

play13:22

in European Union that means I have to

play13:25

comply by Indian Privacy Law and I have

play13:27

to comply by European Privacy Law

play13:29

so the first point for me would be to

play13:32

knowing what regulations are going to

play13:35

come ahead so that I can plan my entire

play13:37

program accordingly so that helps me to

play13:41

device a perfect plan that okay uh now

play13:44

there are two regulations let's say in

play13:47

European union and in India so what I

play13:49

would do as a first step I'll do a gap

play13:51

analysis between the two regulation that

play13:53

what are the common common items between

play13:56

both the and then what are the SE

play13:59

separate ones which I need to take care

play14:01

only for the European Union and only for

play14:04

India so that will be my first task that

play14:06

I'll do an

play14:08

example so um when I was working here so

play14:11

currently I am working

play14:14

for uh so I am the regional manager for

play14:16

four different countries and the four

play14:18

different countries have different data

play14:20

privacy laws so it some are sectorial

play14:23

law some are federal law when I say

play14:25

sectorial it means free zone based law

play14:27

so only specific to that area not to the

play14:30

entire country so likewise so what I did

play14:33

so basically in an Excel okay in a

play14:36

normal Exel I copy pasted all the

play14:39

um regulations okay after that you know

play14:45

if you guys have seen the regulation you

play14:47

know certain in regulation there are

play14:50

articles so certain articles are just

play14:52

information based and certain articles

play14:55

are uh on which you have to take certain

play14:58

actions

play14:59

so I have in one once I have listed the

play15:02

entire regulation in one item then I

play15:04

have selected the Articles which are

play15:07

only actionable obviously the some ones

play15:10

have like just definitions right just

play15:11

definitions who the so those you kind of

play15:15

ignore so after finding out that okay

play15:18

let's say out of 100 articles 75 are

play15:21

actionable 25 are just definition so

play15:24

then these 75

play15:26

articles what I do I try to see that

play15:30

okay now if I take Oman for example if

play15:34

there are 75 articles in Oman then I

play15:37

will see in UAE what are the common ones

play15:40

okay what are the common ones and try to

play15:43

Club them together so okay so I know so

play15:46

let's say Club 25 might be common

play15:48

between two so 50 stands here 50 stands

play15:50

out there then I will try to what are

play15:53

the individual gaps so similarly when I

play15:55

am working for in multi-jurisdiction

play15:58

kind of a a setup then uh this becomes

play16:01

my easily one or two months task to you

play16:05

know identify all the reg all the

play16:07

Articles finding out the gaps and so

play16:11

on so this is my first step and after

play16:15

that what I generally have so I now

play16:19

since I have been working in this field

play16:20

for long I know that I know what my

play16:23

program plan will look like but for you

play16:25

guys you are starting new so it will

play16:27

also be a question that okay now you

play16:29

have identified the regulation now what

play16:31

now what is the next so next step so

play16:34

next step probably uh as a suggestion I

play16:39

would say probably yes you can make use

play16:41

of this um PPD which we'll be showing

play16:44

you today it's just the two slid nothing

play16:46

else you can definitely use this or else

play16:50

there are lot of online um versions

play16:53

available on how to know do a basic data

play16:56

privacy program and I'm sure you'll find

play16:59

similar steps in this but this is more

play17:00

on a detailed side so framework then

play17:05

what you do so let's say there are uh 50

play17:08

control items in the framework so even

play17:11

in data privacy policy let's say in data

play17:13

privacy policy looks very easy but then

play17:16

identification of jurisdiction is one

play17:18

part of that then I after that revie and

play17:22

uh first is making a privacy policy then

play17:25

getting it either signed by the audit

play17:28

committee or relevant committees within

play17:30

your organization so all these uh

play17:33

functions form as a part of your

play17:35

framework so it is your responsibility

play17:38

as a DPO or analyst to see that how can

play17:42

I drill down one particular item into

play17:45

multiple small small item so that it

play17:47

becomes measurable for them so this is

play17:49

how when you say let's say only privacy

play17:51

but is I have to do privacy by Design

play17:53

it's a very vast topic and I don't know

play17:56

so I want to make it measurable so so

play17:58

that's why then I'll try to make a

play18:00

policy first then I'll try to do the Gap

play18:03

analysis that this is the thing which we

play18:05

are currently doing but this is missing

play18:07

then I'll try to make a assessment

play18:09

template on basis on which I'll do the

play18:11

Privacy by Design assessment and so on

play18:13

so that granularity as long as you have

play18:16

in your framework it will be very easy

play18:19

for you to map that granularity to the

play18:22

regulation okay that is the idea so then

play18:26

now we can start with the workflow if

play18:29

please please yeah okay

play18:32

fine all right so then to start let's

play18:35

look at now the workflow one by one okay

play18:38

so the first part I have put as a global

play18:40

privacy handbook now obviously this will

play18:45

not be like a start to finish kind of a

play18:48

thing okay this Global privacy handbook

play18:50

when we say it will be a continuous

play18:53

document but let's assume let's say you

play18:55

start with this because this privacy

play18:58

hand handbook is something like a manual

play19:00

for you it's like a manual on what are

play19:02

the things you'll be doing so it will

play19:04

incorporate uh your regulations

play19:07

applicable regulations it will

play19:09

incorporate your data privacy framework

play19:11

it will incorporate your procedural

play19:13

documents it will Inc even policies to

play19:16

some extent so I had made I remember

play19:19

when I was working with KH times it was

play19:21

one of the newspaper company I had a 135

play19:24

pag of global privacy handbook it was so

play19:27

comprehensive

play19:29

and U it was very good actually I was

play19:31

also very proud of myself to make it

play19:35

because it had very intricate details

play19:37

about what needs to be done and how it

play19:40

needs to be handled and so on so that is

play19:42

why um after that experience only I have

play19:45

started making this Habit to have a

play19:48

global privacy handbook so the idea here

play19:50

is like I said in the first phase you

play19:53

identify the regulation keep a track in

play19:55

the handbook and then you identify the

play19:57

freame framework that you are going to

play19:59

follow it can be anything it can be a n

play20:01

framework it can be ISO 27,000 27701

play20:05

framework it can be this framework which

play20:06

we'll be discussing any framework so

play20:08

once you have identified just have it in

play20:11

the manual and then you try to map it

play20:13

okay so This Global privacy handbook

play20:15

gives you a picture that okay my now I

play20:17

know what are the jurisdiction now I

play20:19

need to follow ahead after

play20:22

that uh the first thing then you will do

play20:24

is try to device a policy now because

play20:27

you know the jurisdiction because you

play20:29

have a good idea about you know what are

play20:33

the specific factors so for example in

play20:35

European Union uh international data

play20:39

transfer is a big question because if

play20:42

you want to do it there are certain ways

play20:44

in which only you can do it for example

play20:46

you need to have a standard contractual

play20:47

Clauses or there should finding

play20:49

corporate rules or there can there

play20:51

should be approved code of conduct and

play20:53

so on so there are multiple ways to do

play20:55

it so your privacy policy because as

play20:59

long as you don't know the regulation

play21:01

devising a privacy policy will be very

play21:03

difficult correct so that is why that

play21:05

becomes our firstep and next is after

play21:07

identifying the jurisdiction we devise a

play21:09

privacy policy now if you ask me whether

play21:13

you do a privacy policy from scratch

play21:15

obviously not I use my industry you know

play21:19

um so for example now currently I'm

play21:21

working in Insurance I'll see many

play21:24

Insurance privacy policies I'll see what

play21:26

are how those are Dev and then I'll try

play21:29

to tweak it to my needs and requirements

play21:32

so that is how I do it so obviously if

play21:35

somebody wants to make hit from scratch

play21:37

that's your call you can do it

play21:39

definitely but

play21:41

uh um if you want help that is fine but

play21:44

don't please don't copy as is the policy

play21:48

uh make sure that you have your own

play21:50

agenda in it you make sure your

play21:52

organization needs are catered in that

play21:54

your data subjects are catered in that

play21:57

and so on so that is how I make the

play21:59

policy okay

play22:02

now after making uh this particular

play22:05

policy um so this again in policies also

play22:10

there are multiple ways to do it one is

play22:13

the data privacy policy let's say it's

play22:15

sitting in the Apex okay either you can

play22:18

have a single data privacy policy or you

play22:21

can have multiple short shot other

play22:23

policies so for example data retention

play22:25

is one privacy by Design is one how to

play22:28

conduct dpia is one and so on that is

play22:31

completely your call I like to go with a

play22:34

single privacy

play22:36

policy where if it's a smaller

play22:38

organization let's say not more than 100

play22:41

200 you know people if it's a big

play22:43

organization then I would like to go

play22:45

with uh smaller ones because it's easy

play22:49

to communicate the smaller ones rather

play22:52

than a bigger one because in a smaller

play22:53

organization in one or two training you

play22:56

can you know let know the people that

play22:58

okay these are the conditions and these

play23:00

are the things why which we'll be

play23:01

following but in a larger organization

play23:03

this becomes a challenge so that is why

play23:05

I have this habit of having a chunk of

play23:09

policies and then I'll keep it in a

play23:10

intranet somewhere so that everybody has

play23:13

access okay so after policy making uh

play23:17

The Next Step would be um to create to

play23:21

design certain templates so these

play23:23

templates are what now these templates

play23:25

generally will help you to know know

play23:28

more about the business so there can be

play23:30

many template so there can be a records

play23:32

of processing activity template there

play23:35

can be a privacy impact assessment

play23:38

template there will there can be a

play23:41

transfer impact assessment template that

play23:43

if you have to transfer data from one

play23:45

jurisdiction to other then so these are

play23:47

kind of template making template

play23:49

building so till now if you realize till

play23:53

now you are not depending on any other

play23:57

um departments within your organization

play24:00

create this so this is this you are

play24:01

doing wholly and solely by yourself

play24:04

because as as you dwell into this role

play24:07

you will understand that our dependency

play24:09

on people is more rather than we doing

play24:12

our task so if it was on me I would have

play24:14

finished a lot of things pretty fast but

play24:17

obviously it's a group thing it's a no

play24:20

organization wide thing so we have to

play24:22

depend on people we have to respect

play24:24

their time as well because not all

play24:26

people when we want they'll be free

play24:28

right so from that aspect what I do

play24:31

whatever is possible from my end I try

play24:34

to create it as soon as possible and

play24:36

then it gives me a buffer time that okay

play24:38

oh

play24:40

somebody if someone is free then I can

play24:42

you know immediately start with the

play24:44

assessment for there to see whether

play24:46

there are any risk and so on and so

play24:48

forth so that's why this template

play24:49

building is one key

play24:51

aspect okay after that um okay you have

play24:55

created certain policies you have

play24:57

created C templates now what now maybe

play25:01

you try to see what is the existing part

play25:05

within the organization

play25:08

Now privacy policy being one of them so

play25:11

generally people have privacy policy now

play25:13

why I have not you know focused it to

play25:18

make it before like for example the

play25:20

fourth step why I have why I haven't

play25:23

kept it as a first step because when you

play25:26

see any existing policy um the notion

play25:29

your thought process becomes very

play25:31

streamlined to that angle so which I

play25:34

generally avoid so that's why what I do

play25:36

I make my own privacy policy first it

play25:38

doesn't take a lot of time maybe a week

play25:40

or so that should be if I am very good

play25:42

with the regulations a week or so would

play25:44

be good enough for me to create one so

play25:47

that is why so once I have that

play25:48

knowledge that okay these are the kind

play25:49

of things that should be there in my

play25:51

policy then I go and see that okay what

play25:53

is the existing policy so that I can see

play25:56

the difference and make the changes

play25:58

so that is where so at the fourth step

play26:01

what you do you see what are the

play26:03

existing policy probably there can be a

play26:04

retention policy as well there can be a

play26:07

trading policy there can be any number

play26:09

of policies so you check and

play26:11

you map it to the ones that you have

play26:14

created so that if there is any Gap you

play26:16

try to fill it so that is the idea

play26:19

basically and you try to know uh once

play26:23

you are in this role you'll realize that

play26:26

you start with small small wins first so

play26:29

that you know you also feel motivated at

play26:31

the same time uh the organization also

play26:35

feels that yes there there is certain

play26:37

progress which is happening why I'm

play26:38

saying this because many people see data

play26:41

privacy as a you know uh what you can

play26:44

say compliance department they call it

play26:46

as a complicated Department generally in

play26:49

our world so you don't want to know

play26:52

showcase that we are just blocking their

play26:55

work because for us data privacy is a

play26:58

full-time role but for them data privacy

play27:01

is like some somewhat over and above

play27:03

what they do because that is something

play27:05

the controls that we need to put

play27:07

obviously now that is that comes under

play27:08

organization policy and all those stuff

play27:11

but you will realize that change

play27:13

management is one of the very key aspect

play27:17

in this role so making people understand

play27:19

certain things um making them learn

play27:22

making them change the way they were

play27:25

doing things earlier that is quite

play27:27

challeng ing than I think any of the

play27:29

other cases so if very if you are very

play27:33

good at communication skills you know

play27:35

personal development way so I think this

play27:37

role will be pretty easy that way

play27:39

because once you have the technical

play27:40

knowledge this this part becomes easy

play27:42

but even if you have technical knowledge

play27:44

and this is challenging then it becomes

play27:46

a pretty messy thing that's should this

play27:49

is what I have learned okay so okay so

play27:53

once you have reviewed everything then

play27:55

you move to uh the easy wins so for me

play27:58

Cookie compliance is the basic easy win

play28:01

because cookie compliance obviously you

play28:03

can't do it with by yourself um you need

play28:06

have certain tools for it because

play28:07

cookies are generated automatically so

play28:09

you can't manually manage the cookies

play28:11

which are going right so there are not

play28:14

very expensive software I could say um

play28:17

probably your company might be using

play28:19

many U many of the what do you call

play28:23

softwares which generally comes with the

play28:25

cookie related things okay uh so you can

play28:29

either enable that or you can ask for

play28:33

you know that cookie implementation is

play28:36

better now few people might say that

play28:39

cookie policy and implementation can be

play28:42

taken up as phe two or phase three which

play28:44

is also fine why I have kept it here

play28:47

because like I said it's a easy win and

play28:49

that's why if you want to demonstrate

play28:51

something on a quicker scale this is a

play28:54

easy way okay so once you have that

play28:57

cookie policy is nothing but uh as you

play28:59

know we whatever cookies are getting

play29:02

stored on the browser certain

play29:04

regulations have given them the idea

play29:07

that yes you can do that but you only

play29:12

and only if the data subject has given

play29:14

consent to it so that's why after gdpr

play29:17

you might have recognized like since

play29:19

last four five years there lot of cookie

play29:22

banners which comes on every website

play29:24

right a lot of cookie banners you have

play29:25

to allow or reject the cookie before you

play29:27

can even see it so that the reason that

play29:30

data privacy that is why this has come

play29:33

up okay okay so that's the case now once

play29:39

I have done this so the next step would

play29:42

be that okay I try to uh either see

play29:46

records of processing activity or I see

play29:49

privacy impact assessment now let's

play29:51

understand these both process in detail

play29:53

what it is now when I say records of

play29:57

process processing activity so this

play30:00

activity you can call it as you know the

play30:03

main the Bible of the entire privacy

play30:07

program that you are running now why I

play30:08

am seeing this now what are the contents

play30:11

let's understand what are the contents

play30:12

of records of processing activ so the

play30:15

idea behind this particular document or

play30:19

activity is that you have a

play30:23

comprehensive knowledge of all the

play30:26

business process which is within your

play30:28

organization irrespective of whether it

play30:30

has personal data or not so that is a

play30:33

prime responsibility of a data

play30:35

Protection Officer or those who are

play30:37

working in data privacy office that this

play30:40

particular document is maintained now in

play30:43

certain jurisdiction like gdpr this is a

play30:46

pretty mandatory document where um if

play30:49

the regulator asks they have to present

play30:52

it in certain case it's a good to have

play30:55

kind of a environment so so but in but

play30:59

we will go with the idea that yes we

play31:01

have to have this document because you

play31:04

will see that if you have this

play31:06

particular document all the Privacy

play31:08

modules which you are about to follow

play31:11

next will be will become very very easy

play31:14

okay now let's understand what are the

play31:16

contents of these documents so like I

play31:18

said all the business processes then it

play31:21

will have idea as to for example let's

play31:24

take HR okay now HR has has payroll as a

play31:28

process HR has recruitment as a process

play31:32

HR has Performance Management as a

play31:34

process correct so let's take these

play31:37

three process

play31:39

now um we will try to have this

play31:43

documented in the records of processing

play31:45

activity now against each process there

play31:47

will be a purpose now obviously payroll

play31:50

the purpose of processing is to process

play31:52

the payroll of the organ of the

play31:55

employees similarly recruitment and

play31:57

Performance Management is evaluation of

play31:59

employees so so on so we will take

play32:01

purpose for each after that it it will

play32:04

be like from where the data is coming we

play32:06

we will try to find out the source for

play32:08

that for the payroll data let's say it

play32:10

is coming from an hrms system for

play32:13

example okay so we are trying to find

play32:14

out the source of the data or it can

play32:17

also happen that in recruitment the

play32:19

recruitment process itself is the source

play32:21

of the data okay so why this is

play32:23

important this is important because if

play32:26

we know that from where the data is

play32:27

coming or from or they are the source it

play32:29

will be very easy for us to build a data

play32:31

flow diagram okay that we will further

play32:34

why a data flow diagram is important

play32:37

okay now that is where this records of

play32:39

processing activity comes handy where we

play32:41

will know the source of the data

play32:43

destination of the data we will know lot

play32:46

of technical aspects as

play32:48

to if the data is traveling to any Third

play32:52

Country so that gets captured in this if

play32:54

the data has relevant um you know legal

play32:59

basis now for those who don't know what

play33:02

a legal Base legal basis is so in order

play33:06

for an organization to process personal

play33:10

data there are certain legal bases which

play33:13

are defined in the regulation okay so

play33:15

this is this idea this uh terminology of

play33:19

legal basis is common across all the

play33:21

jurisdiction probably the number of

play33:24

legal bases might be six somewhere

play33:26

probably somewhere might be four only

play33:28

that is the difference so you need to

play33:31

understand that for you as an

play33:34

organization to process a personal data

play33:37

it has to fall under either one of the

play33:40

legal base now what are these legal

play33:42

bases so consent is one legal

play33:45

base uh then U uh legitimate interest is

play33:49

one legal base performance of contract

play33:51

is one legal base uh then legal

play33:54

obligation is one legal basis and so on

play33:57

so do you want me to go into technical

play33:59

terms no no that's okay we can we can

play34:01

have a next session on that better yeah

play34:03

yeah okay so these legal bases get

play34:06

captured and once the legal bases get

play34:09

captured once you know the incoming and

play34:10

outgoing Source it also captures that

play34:12

what kind of personal information is

play34:14

used for example in payroll can happen

play34:16

that bank details is used employee ID is

play34:19

used employee email is used and let's

play34:21

say their home address is us for example

play34:24

so these gets captured so now this

play34:27

particular document is my repository of

play34:30

all the business processes for example

play34:32

in my previous organization we had

play34:34

identified more than 230 business

play34:36

processes which were there it was

play34:38

a big form so we had 230 plus processes

play34:41

in it and in that 230 plus

play34:44

processes we tried to

play34:46

identified uh which were using personal

play34:49

data and which were not so that was the

play34:51

first case and then after that we Tred

play34:54

to find the source and the destination

play34:56

so once you have have an idea about how

play34:58

and where the personal data is lying

play35:00

within the organization then obviously

play35:02

next steps becomes easy for example

play35:04

privacy impact ass Now privacy impact

play35:07

assessment again it's a technical term

play35:10

so in privacy impact assessment the idea

play35:12

is to

play35:13

identify what are the risk involved if

play35:17

you are using personal data of a data

play35:19

subject so risk involved to the data

play35:21

subject not to the company to the data

play35:23

subject so for example if you use my

play35:25

name and date of work probably the risk

play35:28

is pretty minimum but if you are

play35:30

processing my credit card details you're

play35:33

processing my bank account then the risk

play35:35

is high then the evaluation here you are

play35:38

doing is to

play35:40

see that whether I should be you know

play35:45

processing this at the first place if

play35:47

yes then what are the controls in place

play35:49

what kind of information security

play35:51

controls do I have at my end in order to

play35:54

make sure that this uh particular data

play35:57

doesn't get exposed to any unauthorized

play35:59

entity okay so this is type of risk you

play36:02

try to identify so that is the phe that

play36:07

after that you come to making of data

play36:10

privacy addendum or say this is a kind

play36:15

of a document which

play36:17

is first of all when there are vendors

play36:20

involved there will be contracts in

play36:23

contracts there will be certain terms

play36:25

and condition Clauses involved

play36:27

our role here is to

play36:29

check the uh existing

play36:32

contracts uh that whether data privacy

play36:34

Clauses were accepted or not okay

play36:37

because this is a pretty easy step you

play36:39

just need to see and if it is not there

play36:42

obviously you will either update that

play36:44

existing contract or put an addendum on

play36:46

top of

play36:47

it idea here is you get contractually

play36:51

protected due to on the basis of uh this

play36:54

thing and so that in tomorrow something

play36:57

happens let's say breach happens at a

play36:58

vendor's place then at least you had

play37:01

made sure that all the liability was

play37:03

transferred to the um particular vendor

play37:07

so this is why this is where uh the

play37:09

contract makes uh life easy of a data

play37:13

privacy officer because the liability

play37:15

wise it balances out both the towns okay

play37:20

okay so again this becomes an easy win

play37:22

because managing contracts you just have

play37:26

to Let's say it can be it can happen

play37:28

that you have a central portal where all

play37:29

the contacts are managed or you have to

play37:32

take a list from let's say your vendor

play37:34

team or so on decentralize yeah okay

play37:37

yeah so that's where that is why and

play37:39

just see the context don't go into much

play37:41

detail so there are two ways to even see

play37:44

at it

play37:45

so in one case you are the owner of the

play37:50

data like you are collecting data so

play37:52

there are two concepts in it one is

play37:54

called as data controller and one is

play37:56

called as data processor data controller

play37:58

is someone who H who makes decision

play38:02

about the data and data processor you

play38:05

can think of someone who doesn't have

play38:07

its own mind it just acts on behalf of

play38:10

data controller whatever data controller

play38:11

says only that way the data processor

play38:14

will act and give back the data so that

play38:17

is the idea so when you are working as a

play38:19

data processor that time you can make a

play38:22

data processing agreement that yes if

play38:25

you give us the data and if we are

play38:27

vendor for you then these are the

play38:29

contracts or these are the obligations

play38:31

which will be following and so on so we

play38:33

will not go in detail but there are two

play38:35

kinds of documents data processing

play38:37

agreement which will go on the processor

play38:39

side and it can one will be General MSA

play38:41

which is Master service agreement so

play38:43

that is how it is done that is that is

play38:45

one of the important Insight I find

play38:47

because when it come to people always

play38:49

get confused with this two type of

play38:50

agreement and thanks for bringing that

play38:52

particular Topic in the session because

play38:54

that that give a very good Clarity and

play38:55

second important part you talk about

play38:57

this SEC or BCR and all that that's also

play38:59

an important part which people used to

play39:02

you know don't give attention to that

play39:03

and I have seen lot of people get

play39:05

confused on that area thanks thanks for

play39:06

bringing that point in this session page

play39:09

yes yes no worries

play39:14

so

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
GDPR ComplianceData PrivacyExpert InsightsRegulatory AnalysisGlobal StandardsPrivacy PolicyData ProtectionCompliance StrategyInformation SecurityEU Regulations