"Complying with the General Data Protection Regulation (GDPR) is not optional. If your organization controls or processes personal data on natural persons in the European Union, GDPR almost certainly applies to you."
-- RSA 2018
No one likes looming deadlines. You might have a sticky note on your monitor or a reminder on your white board but sometimes it’s easier to let tomorrow’s deadline take a back seat to the mini-crisis happening today. Of course, the closer we get to a deadline, the tension begins to mount … the stress builds … and we start to feel like we’re running out of time. We’re here to be the bug in your ear to remind you the May 2018 GDPR deadline is quickly approaching. Fortunately, if you do not yet have your GDPR strategy in place, there’s still time to implement a plan.
What should your GDPR strategy and plan include? Once you have that plan, what happens next?
Here are 5 Steps to Achieve GDPR Compliance:
It’s time to understand how your organization is managing data. It means finding out where the information is stored, who has access to it, and how long you are keeping it. Take inventory of your data sources. Whether it’s structured or unstructured, sitting in a data warehouse or in a Hadoop cluster, this inventory is critical. Remember, GDPR is about data privacy so you need to know what personal data is being stored and used. Identification and inventory is the first step to evaluating your risk exposure.
Ok, so now you have access to all your data sources. Now it’s time to find out what personal data is within those data sources. Simply put, you must see it, know it, and be able to search it. This means being able to extract, categorize, and catalog various personal data elements. This cataloging cannot be accomplished manually, but requires proven tools to help automate and ensure data quality.
Article 32 requires that measures implemented must ensure a level of security appropriate to the risk. So, the next step, a critical step, is to keep sensitive data where it belongs. Prevent security breaches with a thorough risk assessment that looks at potential threats to your organization’s data and vulnerabilities. Assess your internal security programs and those of your third parties. Then establish a process to identify if, when, and where a breach takes place and the appropriate policies and notification schemes that will be triggered in that event.
Accountability for GDPR standards and adherence to compliance is an ongoing, evolving process and requires vigilance. It requires auditing and reporting and tools to automate such tasks.
Most organizations are not yet adequately prepared for compliance with the GDPR. Fortunately, if you’ve teamed with the right technology partner, GDPR compliance becomes a good opportunity to upgrade your organization’s posture to meet both the regulation’s requirements and improve your overall security capabilities.
Andrew (Andy) Becker is a Solutions Architect in Trace3’s Data Management Group, whose 17 years of experience in the field began in the Israeli Defense Forces and includes subsequent experience consulting with client environments of all sizes. He specializes in Information Governance with a focus on email archiving, data classification, and eDiscovery. Andrew has architected, designed, and implemented solutions for some of the largest household name companies in the country, particularly in defense, financial, healthcare, gaming, airlines, oil and gas, utilities and other heavily regulated sectors. Andrew has been recognized as an industry Veritas Information Professional (VIP) and awarded the Trace3 President’s Award for leadership and teamwork. Outside of work, Andrew is an avid mountain biker, self-proclaimed foodie, and volunteers on the board of a national non-profit creating programming for young professionals to engage face-to-face at meaningful events and learn about philanthropy.
Trace3’s holistic approach to your business, underscored by our Data Management Group, leverages industry leading technology solutions combined with consulting and engineering expertise (aka “secret sauce”) to create and provide positive, predictable outcomes for our clients.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.