GDPR may be quiet in the media, but it’s still just as important as ever.
Ongoing compliance is a key aspect of adhering to GDPR, so we spoke to PGI’s GDPR experts to find out which areas many organisations are still working on or finding difficult to understand.
PGI’s experts have been working with clients around the UK over the past year - helping them to implement GDPR and, importantly, maintain compliance. Non-compliance due to having no (or inconsistent) processes in place or experiencing a data breach can result in real damage to an organisation’s reputation and bottom line.
Five areas to assess for GDPR compliance in your organisation
Many PGI clients ask how long their organisation can store personal data. The short answer is that the Regulation doesn’t specify this. However, data must be retained in line with the principles of the Regulation, which include only retaining it for as long as necessary. Organisations should assess how long personal data is required and define their own retention schedules. This doesn’t mean you can keep data forever; the need to retain data should be reviewed regularly and if it’s not needed delete it.
Data Protection Impact Assessments (DPIAs)
When should Data Protection Impact Assessments (DPIAs) be completed? DPIAs should be completed when processing activities pose a significant risk to the rights and freedoms of individuals. Organisations may decide to perform these for every new project, major changes to IT systems, or as part of compiling data process maps. All organisations should consider the need for DPIAs for any processing activities they undertake. If it is felt that a DPIA is not required as there is no significant risk to individuals’ rights and freedoms, this decision should be documented.
Dealing with Subject Access Requests (SARs)
Requests from data subjects exercising their rights (including Subject Access Requests), must be dealt with in a structured and controlled manner. This ensures that appropriate actions are taken to retrieve all relevant data held, within the necessary timescales. Companies must have defined responsibilities and procedures for dealing with such requests, including verifying the identity of the data subject and considering the impact to other individuals whose personal data may be caught up in such fulfilling SARs (obfuscate where necessary).
Data inventories and process flows
In order to fulfil requests from data subjects exercising their rights, organisations must know where all personal data is stored and with whom it is shared. Organisations should work on constructing inventories of personal data and map-out data flow diagrams that show how this data moves through the organisation and its systems—as well as any third parties (data processors) this data is shared with. It may be necessary to inform data processors of requests from data subjects.
Marketing and GDPR
There is still much confusion around what marketing information organisations can provide to data subjects and when it is necessary to obtain consent. There is variation between:
- Whether marketing materials are sent to existing customers or potential new customers
- Whether these communications are business to business or to individual consumers
- What is contained within these communications and the method by which they are delivered (e.g. email, post)
It’s not all about GDPR. Where marketing is concerned, the Privacy and Electronic Communications Regulation must also be considered. This provides further granularity as to what is required for marketing communications.
GDPR – where are you now?
The implementation of good practices will ensure your organisation meets the necessary ongoing GDPR requirements, as well as providing assurance for customers, employees and all other data subjects that their information is being processed lawfully and stored securely.
If you aren’t sure if your organisation is compliant or you think you still have more work to do, our GDPR experts are here to help. Talk to us today about GDPR: email@example.com or via phone +44 (0)207 887 2699
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Making ongoing compliance easier for you and your business
GDPR is now in force – make sure your business meets the necessary requirements and assurance for all your customers and employees
A full audit of your business to assess the level of your compliance against GDPR requirements
Become GDPR compliant with minimal work – we’ll conduct an analysis, review, report and implementation of necessary changes to your business
We’ll carry out simple assessments of security to help you understand and mitigate the potential risks to your business
Get your business ready to face the cyber challenge
We provide a full range of accredited, certified and bespoke services that assess the resilience of your cyber security posture
PGI’s Qualified Security Assessors (QSA) will help you meet Payment Card Industry Data Security Standards (PCI DSS)
Find out more on PCI DSS
Demonstrate your commitment to cyber security by achieving and maintaining accreditation for the globally-recognised information security standard
Find out more on ISO 27001
Understand the threats of phishing and malware to avoid being targeted
Undertake our phishing capability assessment to reduce your organisation’s risk of of attack, by measuring the cyber awareness of your workforce.
PGI will conduct a tailored phishing campaign, using multiple methods, to identify realism and train employees where necessary to mitigate future attacks
PGI monitor multiple metrics to identify the types of phishing, generate in-depth analysis reports and provide an informed decision to help improve your organisation’s level of security and awareness
Prevent attacks, respond to breaches and protect your business
Our bespoke range of cyber security services not only protect your critical assets but provide the education you need to keep your operations and data safe.
implement the cost-effective cyber security measure launched by the government to prevent cyber-attacks, demonstrate commitment to your clients, and attract new business by being recognised as a secure organisation
Find out more on Cyber Essentials Accreditation
The most effective way to identify how attackers target your organisation’s weaknesses by evaluating your system and network security and reporting on any vulnerabilities that could lead to a business impact
Find out more on Penetration Testing
If your business has experienced breaches, network compromises or operational disruption, our team of cyber security specialists can deploy quickly, and efficiently begin the process of detecting and eliminating the threat
Find out more on Data Breach Response & Recovery
Data Breach Response & Recovery
We prevent attacks, respond to security breaches, and protect your business
Our team of specialists can deploy quickly and efficiently to begin the process of detecting, eliminating and prevention of future threats of a breach.
A vital part of the response process is making a copy of your data for safe forensic analysis. We will work with you to preserve and use this evidence to discover the extent of an intrusion
Find out more on Digital Forensics
We will identify and minimise the risks, as well as the possibility of future risks to your business
Consistent interaction with your management team and recommendations on how to approach all outcomes that need attention
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.