EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide - Second Edition by ITGP Privacy Team
Author:ITGP Privacy Team [Privacy Team, ITGP]
Language: eng
Format: azw3
ISBN: 9781849289481
Publisher: IT Governance Publishing
Published: 2017-09-05T04:00:00+00:00
As with any new process, you need to identify the objectives and desired outcomes of data mapping before you begin. The overall objective of data mapping as part of GDPR compliance is to identify and address potential privacy issues.
The process of data mapping is not always as simple as just figuring out where the data is and what it’s used for; in many instances, the process includes analysis on the go. That is, while you work through the data flow, you take the time to identify the issues relevant to the data at each point. For instance, if the data passes through a storage phase, you might identify that the server where it resides isn’t behind a locked door.
The output of the data mapping should record key aspects of a data workflow that will inform the measures that you take to comply with the GDPR. Your primary interest in this activity will be personal data, which includes your employees’ personal data.
You’re also aiming to identify the specific risks to personal data, so your data mapping process should help you to identify unforeseen or unintended uses of the data. Because you generally need to inform data subjects about what you’re doing with their data, any additional uses are likely to be in breach of the Regulation.
It’s quite possible that the data mapping process can be rewarding for the organisation. In addition to identifying where efficiency can be improved, it can also draw your attention to potentially lucrative or useful processing opportunities.
Finally, and quite significantly, the data mapping process should help you to recognise who is involved at each stage in data processing activities and who should be involved. This will ensure that the people who will be using the information can be consulted on the practical implications of compliance with the Regulation (including the impact controls or other measures might have).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12724)
Hello! Python by Anthony Briggs(10021)
The Mikado Method by Ola Ellnestam Daniel Brolund(9893)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9890)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(9881)
Dependency Injection in .NET by Mark Seemann(9432)
Hit Refresh by Satya Nadella(8878)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8404)
The Kubernetes Operator Framework Book by Michael Dame(8045)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7848)
Exploring Deepfakes by Bryan Lyon and Matt Tora(7829)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7819)
Grails in Action by Glen Smith Peter Ledbrook(7787)
Practical Computer Architecture with Python and ARM by Alan Clements(7779)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7743)
Robo-Advisor with Python by Aki Ranin(7733)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7668)
Building Low Latency Applications with C++ by Sourav Ghosh(7631)
Svelte with Test-Driven Development by Daniel Irvine(7619)
