GDPR Data Security and Breaches 10 December 2019 Newcastle | Leeds - - PowerPoint PPT Presentation

gdpr data security and breaches
SMART_READER_LITE
LIVE PREVIEW

GDPR Data Security and Breaches 10 December 2019 Newcastle | Leeds - - PowerPoint PPT Presentation

GDPR Data Security and Breaches 10 December 2019 Newcastle | Leeds | Manchester 2 What we will look at today Technical and Organisational Security Handling data breaches Case law Newcastle | Leeds | Manchester 3 Data


slide-1
SLIDE 1

Newcastle | Leeds | Manchester

10 December 2019

GDPR – Data Security and Breaches

slide-2
SLIDE 2

Newcastle | Leeds | Manchester

  • Technical and Organisational Security
  • Handling data breaches
  • Case law

What we will look at today

2

slide-3
SLIDE 3

Newcastle | Leeds | Manchester

Elizabeth Denham (Information Commissioner) "cyber security is not an IT issue, it is a boardroom issue. Companies must be diligent and vigilant. They must do this not only because they have a duty under the law, but because they have a duty to their customers”. Data security?

3

slide-4
SLIDE 4

Newcastle | Leeds | Manchester

  • Legal obligations
  • Reputation and goodwill
  • Fines and enforcement
  • Other data protection liabilities
  • Compensation
  • Criminal penalties
  • Vicarious liability

Why does data protection matter?

4

slide-5
SLIDE 5

Newcastle | Leeds | Manchester

Reported Personal Data Breaches in 2018

5

slide-6
SLIDE 6

Newcastle | Leeds | Manchester 6

slide-7
SLIDE 7

Newcastle | Leeds | Manchester

Types of Cyber Security Breach

7

slide-8
SLIDE 8

Newcastle | Leeds | Manchester

Data Security

slide-9
SLIDE 9

Newcastle | Leeds | Manchester

  • GDPR obligation
  • Personal data shall be processed in a manner that ensures appropriate security of the

personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or

  • rganisational measures (integrity and confidentiality)
  • Security should be appropriate to likelihood and severity of risks
  • Failure to keep data secure leads to personal data breaches

What do we mean by the term data security?

9

slide-10
SLIDE 10

Newcastle | Leeds | Manchester

  • GDPR requires;-
  • Controllers to ensure a level of security appropriate to risk
  • Risk analysis
  • Proportionality test

The requirement to use technical and organisational measures….

10

slide-11
SLIDE 11

Newcastle | Leeds | Manchester

  • Confidentiality/Integrity/Availability
  • Confidentiality
  • Processed by those authorised to do so (and act within that authority)
  • Integrity
  • Accurate and complete
  • Availability
  • Accessible and usable

What is risk?

11

slide-12
SLIDE 12

Newcastle | Leeds | Manchester

  • Analyse risk by looking at your security aims:
  • Managing security risk
  • Protecting personal data (against cyber attack)
  • Detecting security events
  • Minimising the impact

Security Aims (ICO and NCSC)

12

slide-13
SLIDE 13

Newcastle | Leeds | Manchester

  • GDPR encourages a risk based approach to compliance
  • Need to identify high risks
  • Classify information from risk perspective
  • Identify and locate sensitive data and mark it
  • Develop and maintain a risk register
  • Describe/rate risks
  • Risk management

Identify Key Risks

13

slide-14
SLIDE 14

Newcastle | Leeds | Manchester

Identify Key Risks

14

1 2 3 4 5 1 2 3 4 5 Likelihood of risk Impact of risk

slide-15
SLIDE 15

Newcastle | Leeds | Manchester

  • You are aware individuals are conducting work business on private email accounts
  • You have premises with swipe card access but are aware cabinets containing HR records

are not locked

  • HR have received only standard GDPR training
  • HR data stored in bespoke software system which IT department maintains itself
  • HR holiday and sickness forms are still manual (i.e. paper based)

Rate the risks – HR Team

15

slide-16
SLIDE 16

Newcastle | Leeds | Manchester

  • What are the biggest risks in your organisation?

Identify Key Risks

16

slide-17
SLIDE 17

Newcastle | Leeds | Manchester

  • What does appropriate mean?
  • What measures are appropriate?
  • What factors should take into account?
  • Record measures you take

What are appropriate measures?

17

slide-18
SLIDE 18

Newcastle | Leeds | Manchester

  • Appropriate to achieve the intended purpose
  • Appropriateness linked to effectiveness
  • i.e. measure is appropriate to implement data security effectively
  • Ensure any safeguards operate through the project lifecycle

Appropriate measures

18

slide-19
SLIDE 19

Newcastle | Leeds | Manchester

  • Take into account
  • State of the art
  • Cost
  • Nature, scope, context and purposes of processing
  • Likelihood and severity of risks

Appropriate measures: Factors to take into account

19

slide-20
SLIDE 20

Newcastle | Leeds | Manchester

What do we mean by “organisational security”?

20

slide-21
SLIDE 21

Newcastle | Leeds | Manchester

  • Governance
  • Contracts and data sharing
  • Training and awareness

What do we mean by “organisational security”?

21

slide-22
SLIDE 22

Newcastle | Leeds | Manchester

  • Management structures
  • Policies, procedures and documentation
  • Compliance and assurance
  • Identify and manage risks
  • Use of data protection impact assessments
  • Data protection by design and default

What is “Governance”?

22

slide-23
SLIDE 23

Newcastle | Leeds | Manchester

  • Appointment of senior officer/director
  • Executive level
  • Responsibility for reporting data protection issues to executive
  • DPO/senior data protection manager
  • Supporting roles
  • IAO/DP Champions etc
  • Information security/information governance group
  • Accountability
  • Ensure evidence exists of roles and responsibilities

Management Structures

23

slide-24
SLIDE 24

Newcastle | Leeds | Manchester

  • Art 24 GDPR
  • Obligation to implement appropriate measures to ensure and demonstrate compliance

(accountability)

  • Includes implementation of appropriate data protection policies
  • Ensure clear endorsement of policies by board/ executive
  • Policies should indicate how risks assessed and escalated

Policies, Procedures and Documentation

24

slide-25
SLIDE 25

Newcastle | Leeds | Manchester

  • What policies do you have?

Policies and Procedures

25

slide-26
SLIDE 26

Newcastle | Leeds | Manchester

  • What policies do you have?
  • Do you have:-
  • A complaint policy?
  • A data security policy?
  • A security breach policy/protocol?
  • A training and awareness policy?
  • IT Use Policy/BYOD policy?
  • Physical security policy
  • Remote working policy?
  • Data retention policy

Policies and Procedures

26

slide-27
SLIDE 27

Newcastle | Leeds | Manchester

  • You need to keep a full set of documentation to demonstrate your commitment to

accountability

  • Processing record (Article 30)
  • Date breach log (Article 33(5))
  • Fair processing record (Article 5(1)(a) and 5 (1)(b))
  • Date protection impact assessments (Article 35)
  • Contracts (Article 28)
  • Record of data sharing agreements
  • Record of consent (Article 7(1))
  • Risk register

Documentation (1)

27

slide-28
SLIDE 28

Newcastle | Leeds | Manchester

  • Information required for processing special category or criminal conviction and offence

data

  • Policies and procedures
  • General obligation to have a data protection policy (Article 24(2))
  • Data minimisation policy (Article 5(1)(c))
  • Data accuracy policy (Article 5(1)(d))
  • Data retention policy (Article 5(1)(e))
  • Data security policy (Article 5(1)(f))
  • Ability to demonstrate compliance

Documentation (2)

28

slide-29
SLIDE 29

Newcastle | Leeds | Manchester

  • Data protection audit – mapping, document analysis and risk identification
  • Part of compliance with Art 24 but also:-
  • Deal with changes to processing presented by GDPR
  • Ensure accountability principle is satisfied
  • Reduce risk of data protection breaches occurring
  • Minimise consequences of data breaches
  • Reduce risk of being fined if breach occurs and restrict the amount of fine if one is

levied

  • Rate your risks

Compliance and Assurance

29

slide-30
SLIDE 30

Newcastle | Leeds | Manchester

  • Part of accountability principle
  • General obligation to show you have considered and integrated data protection

considerations into processing activities from the start

  • Benefits
  • Identify and address privacy problems at an early stage (save cost)
  • Raise awareness of privacy and data protection
  • More likely to meet and exceed legal obligations/less likely to breach GDPR
  • Actions less likely to be privacy intrusive

Organisational security – data protection by design and default

30

slide-31
SLIDE 31

Newcastle | Leeds | Manchester

  • Take into account
  • Cost
  • Nature, scope, context and purposes of processing
  • Likelihood and severity of risks arising from processing
  • Implement appropriate technical and organisational measures to implement the data

protection principles

  • Integrate safeguards into processing/throughout project lifecycle
  • Privacy embedded
  • Privacy integral to design without diminished functionality

Organisational security – Data protection by design

31

slide-32
SLIDE 32

Newcastle | Leeds | Manchester

  • Implement appropriate technical and organisational measures by default
  • Only personal data processed when necessary for a specific purpose
  • Data protection by default to be considered
  • When collect personal data
  • Extent of processing
  • Period of storage
  • Accessibility

Organisational security - Data protection by default

32

slide-33
SLIDE 33

Newcastle | Leeds | Manchester

  • An assessment of processing operations to identify privacy impacts and implications
  • Review processing operations
  • Analyse purpose of processing
  • Assess risk
  • Find ways to minimise risk
  • Mandatory for high risk projects that started after 25 May 2018
  • Consult with ICO/supervisory authority where DPIA identifies risk cannot be managed and

remains high

Organisational security - Data protection impact assessments

33

slide-34
SLIDE 34

Newcastle | Leeds | Manchester

  • Carry out due diligence on processors and those you share data with
  • Consider nature of processing and risks
  • Contracts-
  • Processors – need “sufficient guarantees” to appoint:-
  • To comply with GDPR
  • Protect data subject rights
  • Expert knowledge, resources and reliability
  • Data sharing (i.e. controller to controller transfers):-
  • Where share personal data carry out due diligence on sharing partner

What do we need to consider with contracts and data sharing?

34

slide-35
SLIDE 35

Newcastle | Leeds | Manchester

  • What do we mean by due diligence?

What do we mean by due diligence?

35

slide-36
SLIDE 36

Newcastle | Leeds | Manchester

  • What do we mean by due diligence?
  • Compliance with industry standards
  • Level of technical expertise
  • Check accreditations/references
  • Check GDPR compliance – compliance audit/documentation/breaches?
  • If work performed off site, check site
  • Assessment of security procedures
  • Adherence to code of conduct/certification scheme

What do we mean by due diligence?

36

slide-37
SLIDE 37

Newcastle | Leeds | Manchester

  • Contract with controllers
  • Article 28 clauses/other clauses
  • Contracts with data sharing partners
  • Controller – controller transfers not covered by Article 28
  • Ensure data sharing partner contractually bound to:-
  • Comply with data protection legislation
  • Use data for specific purpose only
  • Keep personal data secure
  • Report breaches

What contract terms do we need?

37

slide-38
SLIDE 38

Newcastle | Leeds | Manchester

  • Raising awareness
  • Training
  • Accountability and training and awareness

Do we need to perform training and awareness raising activities?

38

slide-39
SLIDE 39

Newcastle | Leeds | Manchester

  • Raising awareness
  • Training
  • Training strategy
  • When to train (on induction and annual refresher)
  • Training needs analysis
  • Specialist training
  • Temporary and agency worker training
  • Accountability and training
  • Training record
  • Use of KPIs

Do we need to perform training and awareness raising activities?

39

slide-40
SLIDE 40

Newcastle | Leeds | Manchester

  • 72% UK employees have taken corporate data out of their organisation
  • 70% have plans to take data if were to resign or lose job
  • 59% believed data was theirs to take
  • 62% theft carried out by staff in IT or customer services department
  • 54% accessed data outside their explicit permissions

Organisational Security – The Enemy Within – Imperva Survey

40

slide-41
SLIDE 41

Newcastle | Leeds | Manchester

  • Paralegal fined for taking sensitive information of over 100 people
  • Moved law firm and took workload lists, file notes and template documents containing

personal data

  • Prosecuted under s55 DPA (equivalent to s170 DPA 2018):

“Stealing personal information is a crime….employees may think work related documents that they have produced or worked on belong to them and so are entitled to take them when they

  • leave. But if they include people’s details, then taking them without permission is breaking

the law”

ICO Head of Enforcement – Stephen Eckersly

James Pickles – theft of data

41

slide-42
SLIDE 42

Newcastle | Leeds | Manchester

  • Information risk management
  • Home and mobile working
  • User education awareness
  • Incident management
  • Managing user privilege
  • Removable media controls
  • Monitoring
  • Secure configuration
  • Malware protection
  • Network security

10 Steps to Cyber Security

42

slide-43
SLIDE 43

Newcastle | Leeds | Manchester

  • What does technical security consist of?

What do we mean by “technical security”?

43

slide-44
SLIDE 44

Newcastle | Leeds | Manchester

  • Technical controls framework
  • Secure configuration
  • Patch and software version management Up to date malware protection
  • Manage & monitor your network
  • Access rights
  • Default settings/passwords
  • Encryption/pseudonymisation
  • User education
  • Data minimisation
  • Using contractors
  • Incident management

What do we mean by “technical security”?

44

slide-45
SLIDE 45

Newcastle | Leeds | Manchester

  • Technical controls framework
  • E.g. cyber essentials
  • Secure configuration
  • Set up and configure software for your needs
  • Patch and software version management
  • Increased vulnerability over time
  • Software update policy
  • What to do with unsupported software
  • Responsibility for updates

What do we mean by “technical security”?

45

slide-46
SLIDE 46

Newcastle | Leeds | Manchester

  • Up to date malware protection
  • Manage & monitor your network
  • Periodic testing/assessment/evaluation
  • Access rights
  • Concept of “least privilege”
  • Default settings/passwords
  • Password protection
  • Encryption/pseudonymisation

What do we mean by “technical security” (2)?

46

slide-47
SLIDE 47

Newcastle | Leeds | Manchester

  • User education and awareness
  • Train staff on data security/cyber awareness
  • Minimise data
  • Using IT contractors - ISO 27001/other standards/testimonials and other due diligence
  • Incident management
  • Availability/resilience
  • Back up data
  • Ability to restore access

What do we mean by technical security? (3)

47

slide-48
SLIDE 48

Newcastle | Leeds | Manchester

Personal Data Breaches

slide-49
SLIDE 49

Newcastle | Leeds | Manchester

  • NB Not all breaches of GDPR are personal data breaches. Not all fines will be for

personal data breaches

  • ICO particularly concerned with personal data breaches-
  • “personal data breach means a breach of security leading to the accidental or unlawful

destruction, loss, alteration, unauthorised disclosure of or access to personal data transmitted, stored or otherwise processed” - Article 4(12)

  • Types of breach
  • Confidentiality/Integrity/Availability breach

What is a data security breach?

49

slide-50
SLIDE 50

Newcastle | Leeds | Manchester

  • Contain
  • Assess
  • Notify
  • Review

How to deal with security breaches

50

slide-51
SLIDE 51

Newcastle | Leeds | Manchester

  • Controller must be able to identify security breaches (Article 87)
  • Have a security breach checklist
  • Immediate containment
  • Who needs to know?

Contain: Initial Action

51

slide-52
SLIDE 52

Newcastle | Leeds | Manchester

  • Need to assess to understand risks presented by breach
  • Investigation team
  • Produce investigation report
  • Gather information on:
  • Type of personal data
  • Volume
  • Likelihood and severity of risk
  • Circumstances of breach

Assess

52

slide-53
SLIDE 53

Newcastle | Leeds | Manchester

  • Notify without undue delay and where feasible within 72 hours of becoming aware
  • Unless the breach is unlikely to result in a risk to the rights and freedoms of natural

persons

  • When do you “become aware”?
  • If not notified within 72 hours must include reason for delay in notification to supervisory

authority

  • Must document the breach to enable supervisory authority to verify compliance
  • Failure to notify is a breach

Notify: When must we notify personal data breaches to the ICO

53

slide-54
SLIDE 54

Newcastle | Leeds | Manchester

  • Notify unless breach unlikely to result in risk
  • Need to assess risk
  • Types of risk
  • Physical
  • Material/non-material damage
  • Risks include:
  • Loss of control/ limitation of rights/ discrimination/ identity theft or fraud/ financial loss/

unauthorised reversal of pseudonymisation/ damage to reputation/ loss of confidentiality

Is there guidance on what breaches must be notified to ICO?

54

slide-55
SLIDE 55

Newcastle | Leeds | Manchester

  • Notify individuals where there is a high risk to rights and freedoms of individuals
  • Where personal data breach results in high risk, must communicate breach without

undue delay

  • What is a high risk?
  • Where breach may lead to physical, material or non-material damage
  • Loss or disclosure of special category and criminal data – likely to be high risk

You have to notify individuals of breaches in some circumstances…

55

slide-56
SLIDE 56

Newcastle | Leeds | Manchester

How do we decide if a breach is a risk or a high risk? (1)

56

  • What is the difference between a risk and a high risk?
  • Likelihood and potential severity
  • Type of breach
  • Nature, sensitivity and volume of data/numbers affected
  • Other circumstances
  • Ease of identification – pseudonymisation?
  • Severity of consequences
  • E.g. discrimination, identity theft, physical harm, fraud, financial loss, damage

to reputation

  • Intentions of recipient of data
  • special characteristics of individual/controller
slide-57
SLIDE 57

Newcastle | Leeds | Manchester

How do we decide if a breach is a risk or a high risk? (2)

57

  • What protections are in place to minimise the risk of damage and to mitigate ongoing

impact?

  • Is information encrypted/pseudonymised?
  • Was it already publicly available?
slide-58
SLIDE 58

Newcastle | Leeds | Manchester

Risk or a high risk?

58

  • USB lost containing patient data. It is password protected
  • Letter containing notice of substantial pay award sent to wrong address (what if it includes

individual’s bank account details?)

  • Email sent to wrong person asking for repayment of substantial debt owed to the company
  • CCTV data showing individuals at work doing unusual activities circulated round work for

amusement

  • HR database access rights incorrectly set so that everyone has access although no

evidence inappropriate access occurred

  • Papers containing salary details of all senior staff left on the printer in the office and read

by other staff

slide-59
SLIDE 59

Newcastle | Leeds | Manchester

  • Regulator
  • Insurer
  • Stakeholder
  • Employees
  • Police
  • Media

Other Notifications

59

slide-60
SLIDE 60

Newcastle | Leeds | Manchester

  • Look at:
  • Security review to work out what happened
  • Consider other breaches suffered – check for similarities
  • Prevention plan (i.e. a plan to prevent future breaches)
  • Audits to enforce the prevention plan
  • Review policies and procedures
  • Review employee tasks and training
  • Review should strengthen security and reduce reoccurrence

Review

60

slide-61
SLIDE 61

Newcastle | Leeds | Manchester

  • You have two employees with the same name. A disciplinary notice is sent to the wrong

employee.

  • A customer informs you that your privacy notice does not comply with the requirements

set out in the GDPR; you review the privacy policy and conclude she is correct.

  • An employee has a disciplinary hearing. In that hearing he is asked not to record the

meeting but does so anyway and you later find out that a recording of the meeting exists.

  • A hospital emails out a record of disabled patients who require assistance with transport to

those patients. The email is meant to be sent "bcc" but is instead sent "cc“.

  • A cyber attack leaves you unable to access your systems for 12 hours. Although no data

is stolen you were unable to complete customer transactions for that period.

To notify or not to notify – that is the question

61

slide-62
SLIDE 62

Newcastle | Leeds | Manchester

  • Investigatory powers
  • Right to audit
  • Order provision of information
  • Access personal data held
  • Access premises and equipment
  • Enforcement powers
  • Administration fines
  • Fines for personal data breaches and other fines
  • compensation

Fines, Compensation and other Remedies

62

slide-63
SLIDE 63

Newcastle | Leeds | Manchester

  • Compensation claims
  • Material and non-material damage
  • Court action required if organisation won’t voluntarily pay compensation
  • Joint liability for compensation claims between controller and processor

Compensation Claims

63

slide-64
SLIDE 64

Newcastle | Leeds | Manchester

  • Requirement to follow pre-action protocol before claim brought
  • Exchange sufficient information to: understand each others position / decide how to

proceed / settle issue / consider ADR / support efficient management of proceedings / reduce cost of resolving dispute

  • Claim letter detailing claim
  • Defendant response within reasonable time
  • Disclosure of key documents to each other
  • Award of costs?
  • ICO input
  • If you make complaint ICO will investigate and take action if it considers there has

been a breach of data protection law.

Compensation Claims continued

64

slide-65
SLIDE 65

Newcastle | Leeds | Manchester

Case law

slide-66
SLIDE 66

Newcastle | Leeds | Manchester

  • Fine of €460,000 for insufficient internal security on patient records
  • Celebrity patient file viewed by over 197 hospital staff
  • Dutch DPA reviewed security measures for compliance with:-
  • Article 32
  • Specific health sector security standards
  • No alert to administrators if someone viewed a file they weren’t entitled to view
  • Inadequate control of access logs – should be “systematic, risk-orientated or intelligent

control”

  • Lack of two-factor authentication
  • If no improvement in security by 2 October the Dutch authority required payment of an

extra €100,000 a week up to maximum of €300,000

Case 1 – Haga Hospital - Netherlands

66

slide-67
SLIDE 67

Newcastle | Leeds | Manchester

  • Fine of €250,000
  • To combat piracy La Liga used app to collect data without consent
  • App covertly collected audio and location data – it detected bars where La Liga

matches were on but not paying the fee.

  • App got consent to activate microphone on the mobile (so it could detect sounds of

football) but didn’t tell users why it did this - consent not specific and therefore inadequate

  • Privacy notice inadequate
  • Didn’t give users ability to withdraw consent

Case 2 – La Liga - Spain

67

slide-68
SLIDE 68

Newcastle | Leeds | Manchester

  • Fine of 1.5m DKK (€200,800)
  • Failure to delete data about 385,000 customers
  • Fine followed supervisory visit and audit question regarding deadlines for deletion of

customer data

  • ID Design ran two separate customer systems. Data in the old system had never been
  • deleted. It included names, addresses, telephone number, email addresses and purchase
  • history. No deadline had been set for deletion from the old system
  • Danish DPA concluded there was a breach of principle 5 (keep only as long as necessary)

Case 3 – ID Design - Denmark

68

slide-69
SLIDE 69

Newcastle | Leeds | Manchester

  • Fine of 1.2m DKK (€160.754)
  • Retention of data for too long
  • Taxa deleted customer names and addresses after 2 year but kept phone numbers for

further 3 years

  • Taxa argued telephone numbers an essential part of its IT system and couldn’t be deleted

as quickly

  • Danish DPA said a failure in the IT system can’t justify a serious breach of data protection

laws (data minimisation)

Case 4 – Taxa 4x35 - Denmark

69

slide-70
SLIDE 70

Newcastle | Leeds | Manchester

  • Proposed fine of £183.39m
  • Cyber attack led to user traffic to BA website being diverted to fraudulent site
  • 500,000 customer details compromised including payment card, name and address
  • Breach due to poor security arrangements
  • Known vulnerability which had not been updated since 2012.

Case 5 – British Airways - UK

70

slide-71
SLIDE 71

Newcastle | Leeds | Manchester

  • Proposal to fine £99,200,396
  • Cyber incident lead to 7m guest records in UK disclosed (30m in EU and 339m worldwide)
  • Vulnerability arose out of acquisition of Starwood hotels group.
  • Starwood systems compromised in 2014, bought by Marriott in 2016, discovered 2018
  • Marriott failed to undertake adequate due diligence on the corporate acquisition – should

have done more to secure systems

Case 6 – Marriott Hotels - UK

71

slide-72
SLIDE 72

Newcastle | Leeds | Manchester

  • Relates to request for damages against a social network provider for its removal of a post

by that individual.

  • The right to compensation under GDPR does not apply to intangible trivial damage
  • Includes ‘perceived discomfort or minor trivialities’ and no ‘serious impairment to a

person’s self image or reputation.

  • Court stated that the right to compensation under GDPR could be absurd if cases of minor

damage can trigger claims for compensation.

Case 7 – Beschl - Germany

72

slide-73
SLIDE 73

Newcastle | Leeds | Manchester

  • Security breach of website platform hosting political party websites (including 5 star)
  • Following breach in 2017 platform required to implement various security measures
  • Platform failed to do so
  • Fine of €50,000

Case 8 – Rousseaum – Italy (1)

73

slide-74
SLIDE 74

Newcastle | Leeds | Manchester

  • Security measures required:
  • Vulnerability assessment to be periodically repeated
  • Old software no longer updated – patching was complicated and time consuming
  • Password system to be strengthened
  • Secure protocol and digital certificate to protect data during transfer
  • Solution regarding storage of passwords
  • Auditing measures to keep record of access and operations completed in the database
  • To guarantee integrity of data

Case 8 – Rousseau – Italy (2)

74

slide-75
SLIDE 75

Newcastle | Leeds | Manchester 75

slide-76
SLIDE 76

wardhadaway.com @WardHadaway Ward Hadaway Newcastle | Leeds | Manchester