GDPR Update 3 October 2019 Phil Tompkins and Dean Murray Newcastle - - PowerPoint PPT Presentation

gdpr update
SMART_READER_LITE
LIVE PREVIEW

GDPR Update 3 October 2019 Phil Tompkins and Dean Murray Newcastle - - PowerPoint PPT Presentation

GDPR Update 3 October 2019 Phil Tompkins and Dean Murray Newcastle | Leeds | Manchester 2 What we will look at today GDPR to date How to handle data subject access requests Data security and handling data breaches Whats


slide-1
SLIDE 1

Newcastle | Leeds | Manchester

GDPR Update

3 October 2019 Phil Tompkins and Dean Murray

slide-2
SLIDE 2

Newcastle | Leeds | Manchester

  • GDPR to date
  • How to handle data subject access requests
  • Data security and handling data breaches
  • What’s new
  • Case law

What we will look at today

2

slide-3
SLIDE 3

Newcastle | Leeds | Manchester

  • Legal obligations
  • Reputation and goodwill
  • Fines and enforcement
  • Other data protection liabilities
  • Compensation
  • Criminal penalties
  • Vicarious liability

Why does data protection matter?

3

slide-4
SLIDE 4

Newcastle | Leeds | Manchester

  • Personal data
  • What is personal data
  • Identifies living individual
  • Anything about the individual
  • Examples
  • Paper and digital/ Staff and customer records/ CCTV/ Website/photos/ Applications

/biometrics/ location data/identifiers

  • Special category data (criminal offence/conviction data)

What data does the GDPR protect?

4

slide-5
SLIDE 5

Newcastle | Leeds | Manchester

  • You must process personal data in accordance with the data protection principles:
  • Lawfulness, fairness & transparency
  • Specific, explicit and legitimate purpose -use for that purpose only (purpose limitation)
  • Adequate, relevant and limited (data minimisation)
  • Accurate and up to date (use every reasonable step)
  • Keep only as long as necessary (e.g. retail orders, ticket forms etc.)
  • Appropriate security
  • NB: Need to be able to demonstrate compliance with the above – "Accountability Principle"

Data protection principles

5

slide-6
SLIDE 6

Newcastle | Leeds | Manchester

  • Article 5(2)
  • “The controller shall be responsible for, and be able to demonstrate compliance with

paragraph 1 (accountability).”

  • Organisations need to develop a proactive, systematic and ongoing approach to GDPR

compliance

  • Risk based approach
  • How to demonstrate accountability
  • Policies and procedures (Information Governance Framework)
  • Other documentation

Accountability

6

slide-7
SLIDE 7

Newcastle | Leeds | Manchester

GDPR to date – security breaches in 2018

7

200 400 600 800 1000 1200 1400 1600 1800 2000 March April May June

slide-8
SLIDE 8

Newcastle | Leeds | Manchester

GDPR to date – personal data breach reports to date

8

slide-9
SLIDE 9

Newcastle | Leeds | Manchester

GDPR to date – increase in exercise of information rights

9

0% 5% 10% 15% 20% 25% 30% 35% Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree

There has been an increase in individuals exercising their information rights

slide-10
SLIDE 10

Newcastle | Leeds | Manchester

  • “the public has woken up” E Denham
  • 471,224 contacts via helpline, chat and written advice (66% increase)
  • Data protection complaints rose from 21,019 in 2017/18 to 41,661 in 2018/19
  • 11 assessment notices issued
  • 2 intentions to fine announced

GDPR to date – personal data breach reports to date

10

slide-11
SLIDE 11

Newcastle | Leeds | Manchester

How to Handle Data Subject Access Requests

Dean Murray

slide-12
SLIDE 12

Newcastle | Leeds | Manchester

  • Right of access to own personal data
  • Right of access is to:-
  • Confirmation personal data is being processed
  • Access copy of personal data
  • Supplemental information
  • Supplemental information
  • Purpose of processing/ categories of personal data/ recipients (including outside

EEA)/ retention period (where possible)/ subject rights/ sources of data/ automated decision making or profiling/ safeguards for transfers outside EEA

Basics: What are data subject access requests and what must I provide?

12

slide-13
SLIDE 13

Newcastle | Leeds | Manchester

  • Provision of information:-
  • Provide in concise, transparent, intelligible and easily accessible format
  • Use plain and clear language
  • Provide in writing (orally if requested)

How do I provide information requested?

13

slide-14
SLIDE 14

Newcastle | Leeds | Manchester

  • Personal data held at the time the request is received
  • Held in paper or electronic records
  • Personal data which relates to the individual
  • No requirement to provide exempt information

What do data subjects get a right of access to?

14

slide-15
SLIDE 15

Newcastle | Leeds | Manchester

  • Right of access is subject to a number of exemptions:-
  • Information already held by data subject
  • Impossible to provide or disproportionate effort
  • Third party data
  • Request for large volume of data
  • Can request data subject specifies information
  • UK derogations

Some information is exempt…

15

slide-16
SLIDE 16

Newcastle | Leeds | Manchester

  • Check if the personal data requested falls within an exemption
  • The exemptions include:-
  • Crime and taxation (prejudice)
  • Legal professional privilege
  • Management forecasts (prejudice)
  • Negotiations (prejudice)
  • Health/Social work/Education data (serious harm)

What specific exemptions are there and how do I use them?

16

slide-17
SLIDE 17

Newcastle | Leeds | Manchester

  • Confirm identity of requestor
  • Requests by parent/carer/spouse/solicitor on behalf of data subject
  • Requests by others
  • Public authority - Freedom of Information Act 2000/ EIR 2004
  • Not a public authority
  • Legal right of access (e.g. HMRC/police)

How do I handle third party requests?

17

slide-18
SLIDE 18

Newcastle | Leeds | Manchester

  • No need to supply personal data requested if it contains information about other

people unless:

  • Have consent
  • Reasonable to supply without consent
  • Factors to take into account where you don’t have consent:
  • Type of information/ Any duty of confidentiality /Steps taken to obtain consent /Is individual

capable of giving consent /Any express refusal of consent

  • What to do with third party data
  • Obligation is to provide information not documents
  • Redact or edit documents to exclude third party data

Reviewing third party data requests

18

slide-19
SLIDE 19

Newcastle | Leeds | Manchester

  • Check identity of individual
  • Log the request
  • Timescales
  • Without undue delay and in any event, one month
  • Time extensions up to 3 months
  • Keeping the data subject informed
  • Must provide free of charge unless manifestly unfounded or excessive
  • Searching for data
  • Search systems and locations. Provide personal data requested unless exempt etc
  • Form of response

Handling requests

19

slide-20
SLIDE 20

Newcastle | Leeds | Manchester

  • All refusals must be writing
  • Keep record of what sent and reasons why
  • Set out
  • Reason for refusal
  • Sufficient to say they aren’t entitled to information as it is exempt
  • No requirement for detailed explanation why refused
  • Right to complain to ICO

Refusing requests

20

slide-21
SLIDE 21

Newcastle | Leeds | Manchester

  • Metropolitan Police Service
  • Enforcement notice re handling of DSARs
  • On 17 April 2019 it was processing 1,535 DSARs and over 94% outside statutory time

frame for a response

  • By 13 June 2019 – 1,727 DSARs with 1,169 overdue and 689 over 100 days old
  • ICO considers delay causes damage or distress
  • Met to use best endeavours to:-
  • Answer all DSARs by 30 September
  • Make changes to it internal systems so can answer future DSARs properly

Data subject access requests – case law

21

slide-22
SLIDE 22

Newcastle | Leeds | Manchester

Data Breaches and Data Security

Phil Tompkins

slide-23
SLIDE 23

Newcastle | Leeds | Manchester

  • GDPR obligation
  • Personal data shall be processed in a manner that ensures appropriate security of the

personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or

  • rganisational measures (integrity and confidentiality)
  • Security should be appropriate to likelihood and severity of risks
  • Failure to keep data secure leads to personal data breaches

What do we mean by the term data security?

23

slide-24
SLIDE 24

Newcastle | Leeds | Manchester

  • GDPR requires;-
  • Controllers to ensure a level of security appropriate to risk
  • Risk analysis
  • Proportionality test
  • Take into account
  • State of the art
  • Cost of implementation
  • Nature, scope, context and purposes of processing
  • Risk of varying likelihood and severity for the rights and freedoms of natural persons
  • Risks presented by processing

The requirement to use technical and organisational measures….

24

slide-25
SLIDE 25

Newcastle | Leeds | Manchester

  • What measures are appropriate?
  • Pseudonymisation and encryption
  • Managing, limiting and controlling access to personal data
  • Ensure the ongoing confidentiality, integrity, availability of data
  • Resilience of processing systems to restore availability and access to personal data in the event of

an incident

  • Regular testing, assessment and evaluation of security measures
  • Approved codes of conduct and certification mechanisms
  • Record measures you take
  • Art 30(2)(d) – processing record (accountability)

What are appropriate measures?

25

slide-26
SLIDE 26

Newcastle | Leeds | Manchester

  • Governance
  • Contracts and data sharing
  • Training and awareness

What do we mean by “organisational security”?

26

slide-27
SLIDE 27

Newcastle | Leeds | Manchester

  • Management structures
  • Policies, procedures and documentation
  • Compliance and assurance
  • Identify and manage risks
  • Use of data protection impact assessments
  • Data protection by design and default

What is “Governance”?

27

slide-28
SLIDE 28

Newcastle | Leeds | Manchester

  • Carry out due diligence on processors and those you share data with
  • Consider nature of processing and risks
  • Contracts-
  • Processors – need “sufficient guarantees” to appoint:-
  • To comply with GDPR
  • Protect data subject rights
  • Expert knowledge, resources and reliability
  • Data sharing (i.e. controller to controller transfers):-
  • Where share personal data carry out due diligence on sharing partner

What do we need to consider with contracts and data sharing?

28

slide-29
SLIDE 29

Newcastle | Leeds | Manchester

  • What do we mean by due diligence?
  • Compliance with industry standards
  • Level of technical expertise
  • Check accreditations/references
  • Check GDPR compliance – compliance audit/documentation/breaches?
  • If work performed off site, check site
  • Assessment of security procedures
  • Adherence to code of conduct/certification scheme

What do we mean by due diligence?

29

slide-30
SLIDE 30

Newcastle | Leeds | Manchester

  • Contract with controllers
  • Article 28 clauses/other clauses
  • Contracts with data sharing partners
  • Controller – controller transfers not covered by Article 28
  • Ensure data sharing partner contractually bound to:-
  • Comply with data protection legislation
  • Use data for specific purpose only
  • Keep personal data secure
  • Report breaches

What contract terms do we need?

30

slide-31
SLIDE 31

Newcastle | Leeds | Manchester

  • Raising awareness
  • Training
  • Training strategy
  • When to train (on induction and annual refresher)
  • Training needs analysis
  • Specialist training
  • Temporary and agency worker training
  • Accountability and training
  • Training record
  • Use of KPIs

Do we need to perform training and awareness raising activities?

31

slide-32
SLIDE 32

Newcastle | Leeds | Manchester

  • Technical controls framework
  • E.g. cyber essentials
  • Secure configuration
  • Set up and configure software for your needs
  • Patch and software version management
  • Increased vulnerability over time
  • Software update policy
  • What to do with unsupported software
  • Responsibility for updates

What do we mean by “technical security”?

32

slide-33
SLIDE 33

Newcastle | Leeds | Manchester

  • Up to date malware protection
  • Manage & monitor your network
  • Periodic testing/assessment/evaluation
  • Access rights
  • Concept of “least privilege”
  • Default settings/passwords
  • Password protection
  • Encryption/pseudonymisation

What do we mean by “technical security” (2)?

33

slide-34
SLIDE 34

Newcastle | Leeds | Manchester

  • ICO particularly concerned with personal data breaches-
  • “personal data breach means a breach of security leading to the accidental or unlawful

destruction, loss, alteration, unauthorised disclosure of or access to personal data transmitted, stored or otherwise processed” - Article 4(12)

  • NB Not all breaches of GDPR are personal data breaches. Not all fines will be for

personal data breaches

  • Types of breach
  • Confidentiality/Integrity/Availability breach

What is a data security breach?

34

slide-35
SLIDE 35

Newcastle | Leeds | Manchester

  • Notify without undue delay and where feasible within 72 hours of becoming aware
  • Unless the breach is unlikely to result in a risk to the rights and freedoms of natural

persons

  • When do you “become aware”?
  • If not notified within 72 hours must include reason for delay in notification to supervisory

authority

  • Must document the breach to enable supervisory authority to verify compliance
  • Failure to notify is a breach

When must we notify personal data breaches to the ICO

35

slide-36
SLIDE 36

Newcastle | Leeds | Manchester

  • Notify unless breach unlikely to result in risk
  • Need to assess risk
  • Types of risk
  • Physical
  • Material/non-material damage
  • Risks include:
  • Loss of control/ limitation of rights/ discrimination/ identity theft or fraud/ financial loss/

unauthorised reversal of pseudonymisation/ damage to reputation/ loss of confidentiality

Is there guidance on what breaches must be notified to ICO?

36

slide-37
SLIDE 37

Newcastle | Leeds | Manchester

  • Notify individuals where there is a high risk to rights and freedoms of individuals
  • Where personal data breach results in high risk, must communicate breach without

undue delay

  • What is a high risk?
  • Where breach may lead to physical, material or non-material damage
  • Loss or disclosure of special category and criminal data – likely to be high risk

You have to notify individuals of breaches in some circumstances…

37

slide-38
SLIDE 38

Newcastle | Leeds | Manchester

  • What is the difference between a risk and a high risk?
  • Likelihood and potential severity
  • Type of breach
  • Nature, sensitivity and volume of data/numbers affected
  • Other circumstances
  • Ease of identification – pseudonymisation?
  • Severity of consequences
  • E.g. discrimination, identity theft, physical harm, fraud, financial loss, damage to reputation
  • Intentions of recipient of data
  • special characteristics of individual/controller
  • What protections are in place to minimise the risk of damage and to mitigate ongoing impact?
  • Is information encrypted/pseudonymised?
  • Was it already publicly available?

How do we decide if a breach is a risk or a high risk?

38

slide-39
SLIDE 39

Newcastle | Leeds | Manchester

What’s new?

Phil Tompkins and Dean Murray

slide-40
SLIDE 40

Newcastle | Leeds | Manchester

  • Brexit
  • Data sharing code
  • DSARs
  • Retention of personal data
  • Offence of knowingly or recklessly retaining personal

data without the consent of the controller

  • Certification and Codes of Conduct
  • Cases

What’s new?

40

slide-41
SLIDE 41

Newcastle | Leeds | Manchester

  • UK government intends to write GDPR into UK law, so called “UK GDPR”
  • No deal planning:
  • International transfers
  • Permitted to EEA and countries with adequacy decisions
  • Privacy shield issues – US organisation must update public commitment to include transfers from UK
  • No adequacy decision? Must use appropriate safeguards
  • Contract wording
  • Privacy notices
  • Update any DPIA involving international data flows

I hoped I wouldn’t hear the word Brexit this morning….

41

slide-42
SLIDE 42

Newcastle | Leeds | Manchester

  • Fine of €460,000 for insufficient internal security on patient records
  • Celebrity patient file viewed by over 197 hospital staff
  • Dutch DPA reviewed security measures for compliance with:-
  • Article 32
  • Specific health sector security standards
  • No alert to administrators if someone viewed a file they weren’t entitled to view
  • Inadequate control of access logs – should be “systematic, risk-orientated or intelligent control”
  • Lack of two-factor authentication
  • If no improvement in security by 2 October the Dutch authority will require payment of an extra

€100,000 a week up to maximum of €300,000

Case 1 – Haga Hospital - Netherlands

42

slide-43
SLIDE 43

Newcastle | Leeds | Manchester

  • Fine of €250,000
  • To combat piracy La Liga used app to collect data without consent
  • App covertly collected audio and location data – it detected bars where La Liga

matches were on but not paying the fee.

  • App got consent to activate microphone on the mobile (so it could detect sounds of

football) but didn’t tell users why it did this - consent not specific and therefore inadequate

  • Privacy notice inadequate
  • Didn’t give users ability to withdraw consent

Case 2 – La Liga - Spain

43

slide-44
SLIDE 44

Newcastle | Leeds | Manchester

  • Fine of 1.5m DKK (€200,800)
  • Failure to delete data about 385,000 customers
  • Fine followed supervisory visit and audit question regarding deadlines for deletion of

customer data

  • ID Design ran two separate customer systems. Data in the old system had never been
  • deleted. It included names, addresses, telephone number, email addresses and purchase
  • history. No deadline had been set for deletion from the old system
  • Danish DPA concluded there was a breach of principle 5 (keep only as long as necessary)

Case 3 – ID Design - Denmark

44

slide-45
SLIDE 45

Newcastle | Leeds | Manchester

  • Fine of 1.2m DKK (€160.754)
  • Retention of data for too long
  • Taxa deleted customer names and addresses after 2 year but kept phone numbers for

further 3 years

  • Taxa argued telephone numbers an essential part of its IT system and couldn’t be deleted

as quickly

  • Danish DPA said a failure in the IT system can’t justify a serious breach of data protection

laws (data minimisation)

Case 4 – Taxa 4x35 - Denmark

45

slide-46
SLIDE 46

Newcastle | Leeds | Manchester

  • Proposed fine of £183.39m
  • Cyber attack led to user traffic to BA website being diverted to fraudulent site
  • 500,000 customer details compromised including payment card, name and address
  • Breach due to poor security arrangements
  • Known vulnerability which had not been updated since 2012.

Case 5 – British Airways - UK

46

slide-47
SLIDE 47

Newcastle | Leeds | Manchester

  • Proposal to fine £99,200,396
  • Cyber incident lead to 7m guest records in UK disclosed (30m in EU and 339m worldwide)
  • Vulnerability arose out of acquisition of Starwood hotels group.
  • Starwood systems compromised in 2014, bought by Marriott in 2016, discovered 2018
  • Marriott failed to undertake adequate due diligence on the corporate acquisition – should

have done more to secure systems

Case 6 – Marriott Hotels - UK

47

slide-48
SLIDE 48

Newcastle | Leeds | Manchester 48

slide-49
SLIDE 49

wardhadaway.com @WardHadaway Ward Hadaway Newcastle | Leeds | Manchester