Authentication

What Data Protection Officers Need to Know for GDPR


Data Protection Officers (DPOs) are required to oversee an IT security strategy compliant with a myriad of GDPR requirements across the E.U. If you’re reading this, you may be a newly appointed DPO, or responsible for naming one.

DPO’s are required in public agencies, in businesses that conduct regular and systematic monitoring of data subjects on a “large scale” and in cases where personal information that falls into “special categories of personal data” – such as that revealing racial or ethnic origin, political opinions, genetic information, and biometric identity markers. And in Germany, the German Federal Data Protection Act has made this regulation more stringent, essentially requiring every business with more than 10 employees to appoint a DPO. A credible estimate has been that 28,000 DPOs will be appointed or newly hired across 28 EU countries. (source: iapp.org)

As we count down to May 25, what should be the top priorities of newly named DPOs? Here are six actionable suggestions to complete prior to the deadline:

  • Lay out a plan for breach response that you can execute within Article 33’s timeframe of 72 hours, including maintaining an accessible customer list with contacts.
  • Advise your company’s employees of GDPR and provide a package of available education, training – this can take the form of articles, webinars, podcasts.
  • Designate people in your organization who will handle data requests from customers (Articles 15 through 22). Such requests – which can include correction, removal, or receipt of a copy – must be executed within 30 days.
  • Conduct a data security audit. Document and understand what personal data your organization stores, how long it’s retained, and who it’s shared with. Determine and codify your breach detection measures that are in place.
  • Update privacy and consent notices and forms so that customers can opt in or out of communication, and clarify the process in writing for requesting to have personal data “forgotten” and purged.
  • Test all processes above, with completion prior to May 25 – test scenarios including a response to data requests, verification of individual identity, flagging PII in your systems, data purge requests, consent form submission and processing, breach detection, and breach notification.

The E.U. is now at the global forefront of taking privacy matters seriously, and backing up protection of privacy rights, with hard policies that contain teeth. Obviously, continued compliance efforts will be needed – it’s simply no longer an option to incur a data breach, and proactive, vigilant measures to mitigate such risk, are now in the hands of the new cadre of Data Privacy Officers across the European continent.

An advanced cybersecurity program is imperative in protecting against data breaches that will carry severely punitive fines after May 25, 2018 – ranging from 2-4% of annual company revenue. Crossmatch can help Data Protection Officers fully protect against costly data breaches. Only DigitalPersona offers a human hack-proofed solution that delivers the right level of security through the broadest possible selection of authentication factors – delivering a completely frictionless user experience that provides the strongest data protection available in the industry.

Jonathan Sigel is a product marketing professional with 15 years of experience in the high-tech sector – spanning infrastructure, services, and software within security, web content management, and data storage segments, among others. He has held managerial positions with IBM and NEC Corporations and is currently Market Segment Manager at Crossmatch. In his current position at Crossmatch, Jonathan is evangelizing and guiding an evolution of Crossmatch DigitalPersona – a composite authentication solution portfolio that that addresses the data and systems security needs of financial services organizations – with use cases that meet regulatory compliance and go beyond, to support business continuity and growth.

Authentication
A Bridge Too DFARS: Authentication and the DoD Deadline for Cyber Compliance
Authentication
Podcast: Barriers to Adopting Multi-factor Authentication
Authentication
Top Trends Throwing Passwords into a Death Spiral
There are currently no comments.