Data inventarization according to GDPR

Legal IT Group
17 May 202234:45

Summary

TLDRThis webinar script delves into the essentials of data inventorization under GDPR, emphasizing the importance of understanding data flows for compliance. It guides through creating data maps, offers tips for data minimization, and addresses the roles of data controllers and processors. The speakers, privacy lawyers from Legality Group, also highlight the significance of maintaining records of processing activities and responding to data subject requests. Additionally, they introduce a charity program to support children affected by the war in Ukraine, encouraging donations.

Takeaways

  • πŸ“ The webinar focuses on data inventorization according to GDPR, emphasizing the importance of understanding data flows and creating a data map for compliance.
  • πŸ‘€ The speakers, Ledeslav and his colleague, are privacy lawyers from Legality Group, who specialize in various international data protection laws including GDPR and CCPA.
  • πŸ’‘ The webinar highlights the significance of data minimization and understanding applicable laws for data militarization, suggesting that maintaining a data inventory can mitigate risks of unnecessary data storage.
  • πŸ“ˆ Data inventory and mapping are crucial for GDPR compliance as they help companies adhere to its principles, such as purpose limitation and storage limitation.
  • πŸ”’ GDPR's Article 30 mandates maintaining records of processing activities, which can be facilitated by having a data inventory or map, detailing information like purposes of processing and data categories.
  • πŸ”„ The involvement of third parties in data flows is significant, and companies must identify all parties involved and specify what data is shared and for how long.
  • 🀝 The role of data controllers and processors is clarified, with examples given to distinguish between the two, especially in scenarios involving software development services.
  • 🌐 Data transfers, especially to third countries outside the EU, require additional safeguards like data protection agreements with standard contractual clauses.
  • πŸ›‘οΈ Data inventory and mapping are instrumental in responding to data subject requests and security incidents, helping to identify impacted data subjects and meet GDPR's notification timelines.
  • πŸ”‘ Tips for data inventorization include understanding what constitutes personal data, knowing one's roles under GDPR, and utilizing data maps for handling data subject requests.
  • ♻️ Regular review of data flow maps and records of processing activities is advised, especially when new features are implemented that may collect additional personal data.

Q & A

  • What is the main topic of the webinar?

    -The main topic of the webinar is data inventorization according to the General Data Protection Regulation (GDPR).

  • What are the three main points covered in the webinar's agenda?

    -The three main points covered are understanding data flows, drawing a data map, and providing tips for data minimization and understanding applicable laws regarding data militarization.

  • What roles do Ledeslav and the colleague from Legality Group have in the webinar?

    -Ledeslav and the colleague are privacy lawyers working for Legality Group, and they are presenting on data militarization according to GDPR.

  • What is the significance of the charity program mentioned in the webinar?

    -The charity program is developed by the company to support Ukrainian children affected by the war, providing assistance and encouraging donations to help those in need.

  • What does GDPR stand for and what does it govern?

    -GDPR stands for General Data Protection Regulation, which is a regulation in EU law that governs the processing of personal data of individuals within the European Union.

  • What are the GDPR principles mentioned in the script?

    -The GDPR principles mentioned are purpose limitation, storage limitation, and the requirement for data to be processed only in accordance with specified, explicit, and legitimate purposes.

  • What is the importance of maintaining records of processing activities under GDPR?

    -Maintaining records of processing activities is a direct obligation under GDPR for certain controllers and processors, which helps in compliance and provides necessary information for handling data subject requests and security incidents.

  • What is the role of third parties in data flow and how should it be managed?

    -Third parties may receive personal data from companies, and it's important to identify all third parties, the data shared with them, and the duration of data sharing. Information about data sharing should be included in the data inventory or map.

  • How can a data inventory or data map assist in responding to data subject access requests?

    -A data inventory or data map can help identify all the information a company has about a data subject, making it easier to locate and provide the requested information or to determine if the request can be fulfilled.

  • What are the key steps in drawing a data map for GDPR compliance?

    -The key steps include understanding the sources of personal data collection, identifying the roles of all subjects under GDPR (data controller, processor, or subject), and mapping out the flow of data, including transfers to third parties and data recipients.

  • What are some tips for data inventory and understanding applicable laws under GDPR?

    -Tips include understanding which data is personal, knowing your roles under GDPR, utilizing data maps for handling data subject requests, specifying the categories of data collected, understanding retention periods, and regularly reviewing data flow maps and records of processing activities.

Outlines

00:00

πŸ“ GDPR Data Inventory and Mapping Basics

The first paragraph introduces the webinar's focus on data inventory and mapping under the General Data Protection Regulation (GDPR). It outlines the agenda, which includes understanding data flows, creating a data map, and discussing data minimization and legal compliance. The speakers, Ledeslav and a colleague, both privacy lawyers from Legality Group, provide a brief introduction of themselves and mention their company's charity program supporting children affected by the war in Ukraine. They encourage donations and transition into the main topic of GDPR compliance.

05:02

πŸ”’ Understanding GDPR Principles and Data Inventory

The second paragraph delves into the GDPR principles, emphasizing the importance of data inventory and mapping for compliance. It explains the purpose limitation and storage limitation principles, highlighting the need to process personal data only for specified purposes and within a defined time frame. The paragraph also discusses the connection between data inventory and the maintenance of records of processing activities as required by Article 30 of the GDPR. It touches on the role of third parties in data flows and the necessity of documenting data sharing arrangements.

10:03

🀝 Third Parties and Data Subject Rights in GDPR Compliance

This paragraph discusses the significance of third-party involvement in data processing and the importance of identifying all recipients of personal data. It also addresses the rights of data subjects under the GDPR, using a scenario where a user submits a data subject access request. The paragraph illustrates how a data inventory can facilitate the identification and provision of all personal data held by a company about an individual, thus aiding in the fulfillment of data subject requests.

15:04

πŸ› οΈ Creating Your First Data Map for GDPR Compliance

The third speaker provides a step-by-step guide on creating a data map, emphasizing its importance for GDPR compliance. The explanation covers understanding the subjects involved in data processing activities, identifying the sources of personal data collection, and recognizing the roles of data controllers, processors, and subjects under the GDPR. An example of a software development company is used to illustrate how to create a data map, including identifying data sources, the types of data collected, and the recipients of that data.

20:07

🌐 Data Transfers and International Considerations under GDPR

This paragraph focuses on the complexities of data transfers, especially to third countries outside the European Union and European Economic Area. It discusses the need for additional safeguards, such as data protection agreements with standard contractual clauses, to justify such transfers under the GDPR. The paragraph also highlights the importance of understanding the destinations of personal data transfers and the implications for compliance with GDPR regulations.

25:08

πŸ“š Tips for Data Inventory and GDPR Compliance

The sixth paragraph offers practical tips for conducting data inventory and maintaining compliance with the GDPR. It advises on understanding what constitutes personal data, the roles of data controllers and processors, and the importance of utilizing data maps and records of processing activities when handling data subject requests. The paragraph also touches on the example of payment processors and their role in collecting personal data on behalf of their clients.

30:08

πŸ—“οΈ Data Categories, Retention, and Regular Reviews for GDPR

The final paragraph provides additional tips on data inventory, emphasizing the need to specify the categories of data collected, understand retention periods, and perform regular reviews of data flow maps and records of processing activities. It also advises on the importance of knowing where data is stored, especially if it involves cloud storage outside the EU, and the necessity of updating records when new data categories are introduced due to new features or services.

πŸ“’ Conclusion and Call to Action for Webinar Participants

The conclusion of the video script thanks the participants for their attention and provides a final reminder about the charity initiative to help Ukrainian children. It encourages viewers to subscribe to their YouTube channel for updates on legal webinars and to follow their social media for the latest information. The paragraph ends with a call to action for donations and assistance for those affected by the war in Ukraine.

Mindmap

Keywords

πŸ’‘Data Inventory

Data Inventory refers to a comprehensive record of all personal data held by a company. It is a critical component in achieving compliance with the General Data Protection Regulation (GDPR). In the video, it is discussed as the first step to GDPR compliance, helping companies understand what personal data they collect, store, or process, and ensuring that data is processed only for specified purposes and for no longer than necessary.

πŸ’‘Data Mapping

Data Mapping is the process of creating a visual representation of data flows within an organization. It is closely related to Data Inventory and is used to identify where data comes from, where it is stored, and how it is processed and shared. The script mentions data mapping as a tool to help companies understand their data flows and to maintain records of processing activities, which is a direct obligation under Article 30 of the GDPR.

πŸ’‘GDPR Principles

The GDPR Principles are guidelines set out in Article 6 of the GDPR that dictate how personal data should be processed. They include principles such as lawfulness, fairness, and transparency, purpose limitation, data minimization, accuracy, storage limitation, integrity, and confidentiality. The video emphasizes the importance of adhering to these principles when processing personal data and how a data inventory can assist in compliance.

πŸ’‘Data Minimization

Data Minimization is the concept of collecting and retaining only the minimum amount of personal data necessary to fulfill a specified purpose. The script discusses tips for data minimization, which is one of the GDPR principles that helps to reduce the risk of unnecessary data storage and potential data breaches.

πŸ’‘Data Subject Requests

Data Subject Requests are formal requests made by individuals to access or modify their personal data held by a company. The video script describes how a data inventory and data mapping can facilitate the process of responding to such requests, ensuring that companies can quickly identify and provide the information requested by the data subject.

πŸ’‘Records of Processing Activities

Records of Processing Activities are documents that controllers and processors must maintain under Article 30 of the GDPR. They detail the processing of personal data, including purposes, categories of data subjects, categories of personal data, and information about international data transfers. The script explains that having a data inventory can simplify the task of maintaining these records.

πŸ’‘Third Parties

Third Parties in the context of the GDPR are external entities that a company may share personal data with, such as CRM systems, cloud technologies, or marketing platforms. The script discusses the importance of identifying all third parties involved in data transfers and the data shared with them, which is crucial for compliance with GDPR's data protection requirements.

πŸ’‘Data Controller

A Data Controller is an entity that determines the purposes and means of processing personal data. The script explains that a company can act as a data controller when it uses personal data for its own purposes, such as when developing software for a client who provides the data.

πŸ’‘Data Processor

A Data Processor is an entity that processes personal data on behalf of a data controller, following the controller's instructions. The script provides an example of a software development company acting as a data processor when it develops a feature for a client's software, using the client's data according to the client's defined purposes.

πŸ’‘Personal Data

Personal Data is any information relating to an identified or identifiable natural person. The script clarifies that personal data can include not only names and email addresses but also IP addresses and other identifiers. It is important for companies to understand what constitutes personal data to ensure they are processing it in compliance with the GDPR.

πŸ’‘Data Protection Officer (DPO)

A Data Protection Officer is a role designated by organizations under the GDPR to oversee and monitor data protection strategies and compliance. While the script does not explicitly mention the role of a DPO, the mention of 'DPO' in the context of the records of processing activities implies the importance of having a responsible person to ensure GDPR compliance.

Highlights

Webinar focuses on data inventorization according to GDPR, covering understanding data flows, data mapping, and tips for compliance.

Introduction of speakers Ledeslav and colleague, both privacy lawyers from Legality Group, specializing in GDPR and other data protection laws.

The importance of data mapping for GDPR compliance, helping to identify and minimize unnecessary data storage.

GDPR principles require data to be processed only for specified, limited purposes, and data inventory can assist in this.

Data mapping is crucial for maintaining records of processing activities as mandated by Article 30 of GDPR.

Involvement of third parties in data flows and the necessity to document data sharing practices.

Data inventory facilitates the process of responding to data subject access requests under GDPR.

Data mapping aids in identifying impacted data subjects and responding to security incidents.

The webinar discusses the creation of a data map, emphasizing understanding data sources and GDPR roles.

Examples provided to illustrate the concept of data controllers, processors, and subjects in different scenarios.

Importance of identifying data recipients and the destinations of data transfers, especially regarding third countries.

Tips for data inventory include understanding which data is considered personal under GDPR.

Clarification on the roles of data controllers and processors, and how companies can act as both.

Utilization of data maps and records for handling data subject requests and understanding data storage locations.

Advice on specifying data categories, retention periods, and the necessity of regular reviews of data flow maps.

Highlighting the need to understand the exact information maintenance requirements as per Article 13 of GDPR.

Closing remarks include a call to action for supporting Ukrainian children through the company's charity program.

Transcripts

play00:00

data inventorization according to gdpr

play00:03

um

play00:05

can we have a presentation displayed

play00:06

thank you yeah um you can see the topic

play00:10

uh of our webinar right now it's data

play00:13

interaction according to gdpr uh today

play00:16

we will talk about um

play00:20

several topics on this

play00:23

um schema

play00:25

the agenda of our webinar will be first

play00:28

of all the understanding of data flows

play00:29

of your company as the first step to

play00:32

hdbar compliance

play00:33

secondly we will try to draw a data map

play00:36

and thirdly we will

play00:40

include some tips for data minimization

play00:42

and

play00:43

understanding the applicable laws

play00:45

regarding the data militarization

play00:49

we will shortly introduce ourselves my

play00:51

name is ledeslav i am a privacy lawyer

play00:54

in legality group we work on

play00:57

different um projects regarding uh

play01:00

s-gdpr and ccpa other

play01:04

international data protection laws um

play01:06

and my colleague

play01:08

yeah hello my name is uh

play01:12

i am also a privacy lawyer uh working

play01:14

for legality group

play01:16

and today we will talk about uh data

play01:19

militarization according to gdpr about

play01:22

what uh what yosof has said before yeah

play01:25

nice to meet you

play01:27

yeah

play01:28

and a short framework we wanted to pay

play01:31

your to draw your attention to the

play01:33

uh

play01:34

to the war in ukraine and our charity

play01:36

program developed by our company

play01:39

despite the difficult situation which

play01:42

forced many of our

play01:45

many of our many of ukrainians

play01:48

go to the war and many of children

play01:51

move from their cities

play01:54

because of the shellings

play01:56

we continue to work and we provide

play01:59

consultations to our at army as well as

play02:01

take part in the information exchange to

play02:04

ensure that

play02:06

the children in need are supported

play02:07

regardless of their uh whereabouts in

play02:10

any way possible and you can also

play02:12

help the children by

play02:15

donating

play02:18

according to our requisites which you

play02:20

can find on our website uh in the

play02:22

charity

play02:25

page

play02:26

yeah so uh thank you for your attention

play02:28

again this topic um and we will move to

play02:30

the topic of our webinar

play02:34

i give the word to my colleague first of

play02:36

all

play02:37

okay

play02:38

thank you for supporting children again

play02:43

and

play02:43

let's go back to the gdpr

play02:47

today we're going to talk about

play02:50

terms such as data inventory and

play02:54

data mapping and

play02:56

how this connects with gdpr namely gdpr

play03:00

principles records of processing

play03:02

activities

play03:04

third parties fulfilling data subject

play03:07

requests responding to security

play03:09

incidents and so on

play03:12

firstly we need to understand

play03:14

what the term data inventory or data

play03:17

mapping does mean within the gdpr or

play03:21

other applicable laws

play03:23

these terms are synonyms

play03:25

very basically

play03:27

personal data inventory or personal data

play03:30

map is a record of personal data

play03:32

processed by a company which can be

play03:35

expressed in the variety of forms such

play03:37

as lists

play03:39

diagrams tables and so on

play03:43

overall the process of data making helps

play03:47

companies to understand what information

play03:50

including what personal data the company

play03:52

collects stores or otherwise processes

play03:57

okay

play03:58

that's clear so

play04:01

we can talk about principles of the gdpr

play04:04

and connections

play04:06

to data inventory

play04:10

the article 6 of the gdpr sets out six

play04:14

principles that controllers and

play04:17

processors should follow

play04:19

when they process personal data in

play04:22

europe

play04:23

we would like to point out that

play04:26

supervisory authorities often

play04:29

impose fines on companies for violating

play04:33

gdpr principles so

play04:36

you obviously have to pay special

play04:37

attention to those principles

play04:40

when you process personal data

play04:42

and

play04:44

having a data inventory or having data

play04:47

mapping

play04:48

help you in compliance with

play04:51

those

play04:52

principles

play04:53

it means

play04:54

that

play04:55

you need to process personal data

play04:59

only with accordance with those

play05:02

principles for example gdpr provides

play05:04

with

play05:06

purpose limitation and storage

play05:08

limitation principles

play05:10

and that means that you need to process

play05:12

personal data only for specified

play05:15

purposes and for no longer

play05:18

for which

play05:20

the data is used and for the work

play05:24

that

play05:25

this data

play05:27

for one case then you need this data for

play05:30

these purposes

play05:31

and creating a data inventory can help

play05:34

you identify all these purposes and

play05:37

specifies the exact time period for

play05:40

processing this personal data

play05:43

and

play05:44

in this way

play05:46

you minimize the risk that you will find

play05:49

out yourself in situations

play05:52

this situation

play05:53

when you have

play05:55

in your database unnecessary data

play05:59

that stores for a limited period of time

play06:02

which is bad

play06:04

and let's talk uh a little bit of uh

play06:08

records of uh processing activities

play06:11

uh the data inventory and data mapping

play06:15

is closely related to the maintaining of

play06:18

records of processing activities or

play06:20

europa

play06:21

maintaining of europa is a direct

play06:24

obligation for certain controllers and

play06:28

processors under article 30

play06:31

of the

play06:33

they gdpr

play06:34

said that

play06:35

you can make

play06:37

your data inventory or data making in a

play06:40

variety of forms but

play06:43

the list of required information

play06:45

on the maintaining the records of

play06:48

processing activities is strictly

play06:50

specified in article 30.

play06:53

such information should include

play06:56

name and contact details of the

play06:58

processor

play07:00

the applicable joint controller

play07:03

controller representative and dpo such

play07:06

information may also include

play07:08

the purposes of processing description

play07:12

of the categories of data subjects and

play07:15

the categories of personal data

play07:17

processed

play07:18

information regarding international data

play07:21

transfers

play07:22

storage period and

play07:24

applied organizational and technical

play07:27

measures such

play07:28

as anonymization

play07:31

vpn access control physical security and

play07:35

so on and so on

play07:36

it's really hard to identify and list of

play07:40

such information but if you have data

play07:42

inventory or data map it becomes much

play07:46

easier for you to complete this task

play07:51

and also we should talk about

play07:54

third parties and their role in new data

play07:57

flow

play07:58

the involvement of third parties has

play08:02

great importance nowadays

play08:04

because many companies

play08:07

use

play08:08

crm systems cloud technologies uh other

play08:12

different marketing platforms and so on

play08:16

and because the personal data you

play08:19

collect may be shared with third parties

play08:21

we need to include information about

play08:24

site sharing in your data format

play08:27

firstly it is good to identify all third

play08:30

parties to whom you can transfer your

play08:33

personal data

play08:34

personal data of your users and then it

play08:38

is good to

play08:39

identify what personal data can be

play08:41

transmitted

play08:42

and for how long

play08:45

please

play08:46

also note

play08:48

that

play08:49

you may obtain

play08:51

such personal data

play08:53

not directly from data subject but from

play08:56

other third parties and when it happens

play09:00

you should

play09:00

include information about such

play09:03

transmissions in your data for map

play09:07

as well

play09:08

and also

play09:10

you should note

play09:11

that

play09:13

some personal data

play09:14

companies can obtain

play09:17

automatically for example through api or

play09:21

sdk

play09:22

and such information should be included

play09:25

in

play09:26

data for map

play09:28

maps excel

play09:30

also we should talk a little bit about

play09:33

satisfying the rights of data subjects

play09:37

under gdpr

play09:39

and the

play09:40

maintaining of data inventory and data

play09:44

map

play09:45

also helps in such situations

play09:49

and let's imagine uh situation uh you

play09:52

have you are owner of uh platform which

play09:56

puts processes uh

play09:58

personal some personal data of users

play10:01

and

play10:03

one day you obtain a dsr data subject

play10:07

access request from one of your users

play10:09

and

play10:10

[Music]

play10:11

this email

play10:13

user asks you to provide

play10:16

them with all information you have on

play10:19

them

play10:21

firstly we need to understand what

play10:23

information do you have

play10:25

about

play10:26

this

play10:27

person

play10:29

you think and you remember that

play10:32

this user

play10:34

has an account on your platform so you

play10:37

have a name surname and maybe phone

play10:40

number

play10:41

but

play10:42

at this time you also remember that

play10:47

this user can provide feedback

play10:51

on your platform and

play10:53

you can also collect some insights about

play10:56

users behavior through cookies and

play11:00

other tracking technologies and you also

play11:03

had a conversation with these users two

play11:07

months ago so you have a lot of

play11:09

information about these users and it's

play11:13

really hard to identify all this

play11:16

information that you have without data

play11:18

making but if you have data inventory or

play11:21

data mapping

play11:23

i think it becomes

play11:24

more easier

play11:26

and

play11:28

for for identifying all pieces of

play11:31

information yeah

play11:33

and

play11:35

the last but not least

play11:38

responsible security

play11:40

incidents

play11:41

how does data making can help

play11:44

in such situations

play11:46

here

play11:47

similar to satisfying data subject

play11:50

requests data mapping can also help you

play11:54

to respond to such incidents

play11:57

of course

play11:58

you need to have

play12:00

information security policies for

play12:02

handling such requests

play12:05

or personal data breach under gdpr with

play12:08

strict rules how to react in a

play12:10

particular situation when security

play12:13

incidents is occurred but if you have

play12:16

data inventory you can more swiftly

play12:20

identify impacted

play12:22

data subjects

play12:23

in case of data breach and

play12:26

under gdpr there are notification

play12:29

timelines for notification of data

play12:31

subject and for notification supervisory

play12:35

authority and communication to data

play12:38

subjects

play12:39

so the time saved can help you to meet

play12:43

these requirements

play12:45

under gdpr

play12:48

i think that's all from me for this

play12:51

topic

play12:52

and what

play12:54

you can go on

play12:55

yeah thank you

play12:56

um so i would like to

play12:59

talk about

play13:00

how to draw your first data map as my

play13:02

colleague have already mentioned data

play13:04

flow maps are one of the essential parts

play13:07

of the gdpr audit and ongoing gdpr

play13:09

compliance

play13:11

before we begin to grow

play13:13

we need to understand what subjects

play13:16

takes take place in the processing

play13:18

activities of your company namely from

play13:20

whom and what personal data you collect

play13:23

and what are the third parties or

play13:25

service providers you share your you

play13:27

share personal data with

play13:30

and what roles do all of the subjects

play13:32

have under gdpr it may be data

play13:34

controller or joint data controller data

play13:38

processor or data subject if you want to

play13:41

simplify it in order to understand the

play13:43

basic concepts data subject is the one

play13:46

who whose data is collected uh for some

play13:49

purposes uh data controllers

play13:52

uh on on

play13:54

on his site defines the means and

play13:56

purposes of such collecting so it uses

play13:59

personal uh data for its own goals us

play14:02

and if um there are several data

play14:04

controllers and they define

play14:06

and then define uh means and purposes

play14:08

together uh that's the important point

play14:10

uh that they do it together uh they will

play14:13

be joined data controllers and the gdpr

play14:16

and data processor is the one who acts

play14:18

on behalf of data controller and

play14:20

processes personal data not in

play14:22

his or her own purposes but in

play14:24

accordance with

play14:25

the purpose defined by the data

play14:26

controller

play14:28

it may seem a bit abstract um and

play14:31

unclear when we talk about it uh

play14:32

theoretically so it's better to show an

play14:35

example uh so let's imagine you have a

play14:37

soft software development company and

play14:40

you need to uh draw um your data map

play14:45

with regard to the services due to our

play14:47

search

play14:48

outsource services you provide to your

play14:50

clients

play14:51

so uh take a look at this map

play14:54

firstly you need to

play14:56

understand what are the sources

play14:58

from which you receive personal data uh

play15:00

in this case uh like on the map uh you

play15:03

may see the following services sources

play15:06

uh data collected from a visitor who is

play15:08

a visitor we usually call uh an

play15:11

individual a visitor when he or she just

play15:14

merely browses the website and leave no

play15:16

personal data except

play15:18

some technical identifiers which are

play15:21

collected

play15:23

excuse me do you hear me

play15:26

everything's fine uh okay uh sorry um it

play15:28

may be um

play15:30

i'll begin uh we usually call uh an

play15:32

individual visitor when he or she just

play15:34

merely browses on the website and leave

play15:36

no personal data except

play15:38

some technical identifiers which are

play15:40

usually collected by cookies it may be

play15:42

ip gps

play15:45

country of visit time of the site with a

play15:47

duration of such visit and etc so uh the

play15:50

source of receiving such data is usually

play15:52

the website secondly you may see uh

play15:54

potential clients who are these guys uh

play15:57

these are the people who leave their

play15:59

personal data using for example contact

play16:02

us contact us form on the website um or

play16:05

using email or phone number

play16:07

these are usually the people who are

play16:09

interested in your services and they

play16:11

leave their data for further

play16:13

communication regarding such services

play16:16

and thirdly um

play16:18

let's imagine that your company is

play16:19

looking for

play16:20

more i.t specialists so you also use

play16:22

your website

play16:24

email and phone number to collect data

play16:25

about the potential employees

play16:27

and such data is needed um of course for

play16:30

communication with

play16:32

such employees so as you will see as you

play16:34

may see all of the data

play16:37

company collects as a data controller

play16:41

it uses

play16:43

companies in such

play16:46

processes is the data controller because

play16:49

it uses uh such data in uh its own

play16:51

purposes for example we stress data may

play16:54

be used for analytics to understand uh

play16:56

user's behavior on the website what's uh

play16:58

for example uh

play17:00

from from where uh uh the majority of

play17:03

the users uh and then potential clients

play17:06

data for uh maybe used for communication

play17:08

with such clients regarding the services

play17:10

and the police data for communication

play17:12

regarding the employment process

play17:14

uh then please take a look at the

play17:16

company's great icon uh so as you may

play17:18

see that same company may act uh as a

play17:21

data controller and a data processor but

play17:23

with regard to different uh processing

play17:25

activities

play17:26

uh so in the case of typical software

play17:29

development companies the most

play17:30

widespread situation is one client which

play17:34

asks for software development services

play17:36

is the data controller and the company

play17:38

who performs such services is the data

play17:41

processor

play17:42

why is it so imagine your client has a

play17:45

for example fitness software which

play17:48

collects some personal data from its

play17:49

users then these clients as this client

play17:52

asks you to develop a new feature for

play17:54

this software uh providing you with

play17:56

success to the dates that this

play17:57

application collects

play18:02

then

play18:04

so so client collects personal data from

play18:07

application users in its own purposes

play18:09

and therefore uh it is the data

play18:12

controller as we have already discussed

play18:14

and then uh

play18:15

it transfers such data to your software

play18:17

development company which act as a data

play18:19

processor because uh it uses such data

play18:22

only on behalf and in accordance with

play18:24

the order of the client so

play18:26

your company does not define the means

play18:28

and and purposes of the processing thus

play18:30

you are the data processor in this case

play18:33

and what happens with the collected data

play18:36

next you can

play18:38

look above

play18:40

the company's icons

play18:42

uh so such data may be transferred to

play18:44

different data recipients uh

play18:48

they could be really really different uh

play18:50

depending on the specifics of this

play18:51

service we have identified most common

play18:55

use of service providers these are the

play18:57

cloud storages crms and analytics

play18:59

services

play19:01

the same story is about your contractors

play19:03

we have defined them as the separate

play19:05

category

play19:06

because often companies attract

play19:08

contractors for accomplishing specific

play19:10

tasks for example it could be marketing

play19:13

specialists technical specialists

play19:14

lawyers uh search engine analysts and uh

play19:18

so on

play19:19

they all will act as data processors

play19:21

because uh they process personal data

play19:23

only in accordance with yours or your

play19:25

company's instructions uh inside the

play19:28

scope of provision of

play19:30

your services

play19:31

what's uh

play19:32

is also important uh take a look at

play19:35

arrows

play19:36

which show what data what data are

play19:39

transferred during particular processing

play19:40

activity it may be important if you

play19:43

transfer uh for example only a

play19:44

particular category of data to one of

play19:46

the data recipients for example you use

play19:48

two cloud storages one for client states

play19:50

and another one for visitors data

play19:52

therefore you need to make it clear on

play19:54

your map

play19:56

also it's very important to see their

play19:57

destinations where you transfer your

play19:59

personal data as on the gdpr there are

play20:02

additional rules concerning data

play20:03

transfers to so-called third countries

play20:06

so the countries outside of the european

play20:09

union and european economic area

play20:12

so it's better to understand what

play20:13

additional safeguards you need to

play20:15

implement to justify

play20:17

such transfer for example conclude the

play20:19

data protection agreements which include

play20:21

standard contractual clauses developed

play20:22

by the european commission it's one of

play20:24

the

play20:25

gdpr requirements

play20:28

so

play20:29

i guess

play20:31

that's all about the map if you have any

play20:34

questions you may ask of course and we

play20:36

will

play20:37

move forward

play20:39

to the topic of the tips for that

play20:41

inventorization and how to understand

play20:42

the applicable laws and i'll give the

play20:44

word to michael league

play20:48

okay

play20:48

thank you

play20:50

uh

play20:51

the next topic is

play20:53

tips for data memorization understanding

play20:56

applicable laws and we want to share

play20:59

with you

play21:00

some tips and tricks regarding data

play21:03

inventory and

play21:05

data maintenance and the applicables

play21:08

namely gdpr

play21:10

firstly

play21:11

it is important to understand

play21:14

which of the data you processed is

play21:16

personal

play21:18

personal data is any information

play21:20

relating to

play21:22

identified or identifiable natural

play21:24

person

play21:25

it can be not only name or surname but

play21:28

email ip address

play21:32

nickname

play21:33

date of doors

play21:35

and so on so

play21:37

and

play21:38

the most important that such

play21:40

information can help

play21:42

to identify

play21:44

such

play21:45

a person

play21:47

and

play21:48

you should note that not every piece of

play21:50

data is a personal data

play21:53

for example anonymized data cannot be

play21:56

regarded as personal data under gdpr

play22:00

and

play22:01

we have an example

play22:03

quite often platforms for any reason

play22:07

reasons

play22:09

block

play22:10

their users and

play22:12

then anonymize

play22:14

their email

play22:16

used for creating an account on the

play22:19

platform and stored hashed email without

play22:24

storing actually personal data

play22:27

and

play22:28

this solution kills two birds with one

play22:31

stone

play22:32

you

play22:33

doesn't

play22:34

allow to create a new account

play22:37

on the platform

play22:38

and at the same time you do not store

play22:42

any personal data because you store only

play22:45

cash

play22:46

and

play22:47

this is good

play22:50

also you should know

play22:52

about

play22:53

your roles under gdpr and about location

play22:56

of such roles

play22:59

honestly it is not a simple task because

play23:03

allocation of roles

play23:05

and gdpr can be tough in most situations

play23:09

but

play23:10

you should remember that the main two

play23:13

roles under gdpr is a controller or a

play23:16

processor and controller is a company

play23:20

that determines the purposes and means

play23:22

of the processing of personal data

play23:25

namely how and why personal data should

play23:28

be processed

play23:30

and the processor is a company that

play23:32

processes personal data on behalf of the

play23:36

contrary

play23:38

we

play23:39

want to point out

play23:41

that

play23:41

the companies that

play23:43

collects personal data can be both a

play23:47

controller and a processor what has

play23:50

talked about this

play23:52

but

play23:53

i want to

play23:55

give you an example

play23:57

a processor can collect some personal

play24:00

data

play24:02

on behalf of a controller and the

play24:07

striking example

play24:10

of

play24:11

allocation of rows

play24:13

is the

play24:14

operation of payment processors

play24:17

where the payment

play24:18

processor

play24:19

collects some personal data of

play24:22

from users directly and in this case the

play24:27

payment processor who collects who

play24:29

actually collects personal data will be

play24:31

a processor acting on behalf of their

play24:34

client controller who even

play24:38

cannot have

play24:40

any

play24:40

payment data of users but only reports

play24:45

of complete and completed payments for

play24:47

example

play24:49

and

play24:51

we also advise you to utilize

play24:53

your data maps

play24:55

data inventory records of processing

play24:58

activities when you're working with

play25:01

data subject

play25:03

access

play25:04

requests

play25:06

and

play25:07

we already looked at the case of

play25:11

data subject access request

play25:14

but this also applies to

play25:17

handling with other requests as well

play25:19

for example when you handle with

play25:22

direction requests

play25:24

you can check in your data inventory and

play25:27

records of processing activities

play25:30

where and what personal data can be

play25:32

stored about

play25:34

this particular user and

play25:37

by doing that

play25:38

you can also understand whether you can

play25:41

satisfy this data subject uh requests at

play25:45

all

play25:46

because

play25:48

there is a situation uh that

play25:52

it may be situations that

play25:55

you may find out

play25:57

that

play25:58

you have other legal grounds for

play26:00

processing of such personal data

play26:04

and

play26:05

the

play26:06

you can find out that you have no

play26:09

information

play26:10

about

play26:11

this data subject and you can receive

play26:14

these requests

play26:16

by mistake and

play26:18

you cannot satisfy this request because

play26:20

you have no information about this user

play26:22

it happens to

play26:24

and

play26:26

i think that's all tips i wanted to

play26:28

share with you so what

play26:31

yeah i would like to address

play26:33

three more tips

play26:35

i

play26:36

want you to pay attention to

play26:39

the

play26:40

necessity to specify the categories of

play26:42

data you collect so depending on the

play26:44

service depending of your uh platform uh

play26:48

it could be different categories for

play26:50

example contact information is uh the

play26:52

most common case um

play26:55

this could be like email phone number

play26:57

full name uh username in social medias

play26:59

and so on uh message information is um

play27:03

also common

play27:06

it is all of the information which could

play27:08

be

play27:09

treated as personal data

play27:12

which you receive during messaging

play27:14

during communication with your clients

play27:16

financial information

play27:19

is used for for example issuing an

play27:21

invoice

play27:23

or other payment operations when you

play27:25

have some paid services you may collect

play27:28

also financial

play27:29

information about your users

play27:31

and one of the most important and

play27:34

sensitive topics is the sensitive data

play27:37

as if your

play27:39

service

play27:40

is connected for example with some

play27:42

medical

play27:43

services medical issues and you collect

play27:46

medical data for example from your uh

play27:48

clients it is very important to identify

play27:51

uh that

play27:52

such type of data is being collected by

play27:54

you because uh there are

play27:57

additional uh requirements to the

play27:59

collection of such data

play28:01

on the gdpr you need to

play28:04

receive for you to obtain um

play28:06

an explicit consent uh for example to

play28:08

collect such data lawfully

play28:11

uh when you have specified the

play28:13

categories of the data you collect um it

play28:16

is very important to understand the

play28:18

retention periods of such data so uh it

play28:21

may vary from

play28:23

different categories for example um

play28:26

some technical data collected via

play28:27

cookies

play28:29

maybe

play28:30

may be stored uh even like for a session

play28:32

or for a day and uh other data the

play28:36

contact information may be used by a

play28:38

company like for for several years

play28:40

because um you have the purpose of

play28:42

retargeting your previous clients with

play28:45

new features of your service with

play28:48

new services so you need to identify

play28:52

the retention periods for different

play28:54

categories of data and if you cannot

play28:56

identify such periods

play28:58

for some reasons you need to specify the

play29:01

criteria by which you

play29:04

delete or store some data

play29:07

also

play29:08

[Music]

play29:09

these retention periods

play29:13

should be

play29:14

tracked

play29:15

in compliance with the storage

play29:17

limitation principle of gdpr which

play29:20

obliges data controllers to store

play29:22

personal data only

play29:24

for the period which uh for which such

play29:26

data is needed so for example if you do

play29:28

not need

play29:30

any data you shall delete it on the

play29:32

hdbar uh also uh purpose limitation um

play29:36

principle

play29:38

of gtpar is a bit similar uh similar so

play29:41

you you collect every piece of data um

play29:45

and you base uh such a collection on the

play29:48

particular

play29:49

purpose and for example if you do not uh

play29:53

some amount of data for their particular

play29:56

purpose for example you collect a photo

play29:59

of your user uh for

play30:01

the communication purposes with him

play30:05

it is not essential so

play30:07

such data

play30:08

may not be used and

play30:10

to comply with the purpose limitation

play30:12

principle it is important to understand

play30:14

uh the limits of uh the data collection

play30:18

and also it's important to understand

play30:20

where is data stored some of the

play30:22

companies use their own services

play30:25

server servers excuse me

play30:28

and some companies

play30:30

use cloud storages it's very popular now

play30:34

and you need to understand where such

play30:36

cloud storage is for example are servers

play30:38

located because if uh they are outside

play30:41

of the european uh

play30:43

union and european economic area you

play30:45

need to implement additional safeguards

play30:47

to protect such data

play30:54

also

play30:55

you need

play30:57

moving to the next tip

play30:59

also i would advise you to perform a

play31:01

regular review of your data flow maps

play31:03

and records of processing activities

play31:05

especially while you implementing or

play31:08

removing some new features

play31:11

which

play31:13

make you to collect more personal data

play31:14

for example

play31:16

as we have

play31:17

discussed the software development

play31:19

company on the data map you decided to

play31:21

uh

play31:22

develop your it courses and you collect

play31:25

uh

play31:26

some data for the

play31:28

enrolling on such courses

play31:30

you for example collect education data

play31:33

or

play31:34

certificates of english knowledge

play31:37

so uh you have a new categories of data

play31:40

and you need to um

play31:42

you need to update your data maps and

play31:44

records of processing activities with

play31:46

regard to such

play31:48

new

play31:49

processing activities

play31:51

uh and

play31:52

the last but not least tip for today

play31:55

you need to understand the exact amount

play31:57

of information you need to maintain

play31:59

in accordance with article 13 gdpr i

play32:02

would recommend you to

play32:04

read to

play32:05

examine this article which says that

play32:08

controllers

play32:09

shall maintain a record of processing

play32:11

activities but that record shall contain

play32:13

um the information uh the particular

play32:16

amount of information so is the name and

play32:18

the contact details of the controller so

play32:20

uh of your company for example

play32:22

uh the purposes of processing uh a

play32:25

description of categories of data

play32:27

subjects and uh categories of personal

play32:30

data

play32:31

uh the categories of recipients so whom

play32:33

the personal data have been

play32:36

will be disclosed

play32:37

and where applicable

play32:39

uh information about the transfers of

play32:41

personal data to a certain country

play32:43

uh and um

play32:45

general uh description of technical

play32:48

organizational security measures so i

play32:50

would like you to note that um

play32:53

it's

play32:53

the article the this article of gdpr

play32:56

asks uh only the categories of data

play32:59

subject the categories of personal data

play33:01

and the categories of recipients so you

play33:02

do not need to

play33:05

to disclose uh the particular

play33:08

piece of date as a particular

play33:11

data recipient or as a particular data

play33:13

subject it could be only the category so

play33:15

as we have discussed on the data map

play33:17

slides um it could be like visitors or

play33:19

clients you don't need to say that john

play33:22

smith's data you have collected and put

play33:26

that in your records of processing

play33:28

activities

play33:29

uh so do not maintain uh unnecessary

play33:31

data and do it in compliance um with

play33:35

in accordance with the article of gdpr

play33:40

um

play33:41

i guess um that's all we wanted to tell

play33:43

you today uh we would like to thank you

play33:46

for your attention and to ask you to

play33:48

subscribe to our

play33:50

youtube channel uh for our new for new

play33:53

legal webinars to track our updates on

play33:56

our social medias and i would like to

play33:57

remind you one more time to

play34:00

uh to donate if you have a an

play34:02

opportunity to help the children of

play34:04

ukraine

play34:06

and eager

play34:08

yeah yes thank you for attention

play34:10

and i also would like to remind you

play34:14

that you can help ukrainian children

play34:18

you can find information about this

play34:22

on our charity page

play34:24

the links

play34:25

you can find the links in the chat or in

play34:29

the description of this webinar on

play34:32

youtube linkedin instagram

play34:35

and facebook

play34:38

and

play34:39

i guess we can say goodbye yeah thank

play34:42

you thank you

play34:44

bye

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
GDPR ComplianceData InventoryData MappingPrivacy LawWebinar SeriesData ProtectionLegality GroupCharity SupportUkraine CrisisData SecurityPersonal Data