GDPR means no “no-outsourcing or offshoring”

Publish date:

Organizations need to ensure that their data processing activities are carried out in accordance with the data protection principles set out in the GDPR.

In the last few months, I have witnessed several client conversations about the EU GDPR (General Data Protection Regulation) impacting “personal data” application services delivered from non-EU locations. The first reaction (not backed up by application or transaction insight) is usually that data processing services for such applications cannot be offshored to a non-EU location—which can be a misplaced interpretation.

The GDPR requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within the territory of EU Member States. Organizations need to ensure that their data processing activities are carried out in accordance with the data protection principles set out in the GDPR.

To manage application services from a non-EU location, IT services organizations should pay close attention to and align with:

 

  1. Organization data classification policy covering personal data classification. Internal policies should adopt principles of data protection by design and data protection by default.
  2. Procedures to ensure that all contractual clauses with clients related to personal data, security exhibits are validated internally before the contract is signed.
  3. Implementation of DPO (data protection officer) organization, tool-based approach to manage detailed mapping of all personal data processing.
  4. Procedures in place to check the correct implementation of personal data protection policies and transfer of personal data policies in compliance with client contractual requirements.
  5. Training programs to onboard teams, to raise awareness on personal data issues and regulations
  6. Strong enforcement of Identity access management policy, tools and processes for databases containing personal data, backed by strong authentication and audit procedures.
  7. Implementing tools for masking or applying pseudonyms to personal data.
  8. Procedures to ensure personal data protection during encryption, archiving, or deletion (data lifecycle management).
  9. Incident management process to adequately report, respond and mitigate data breaches. These policies and programs should be kept up to date and tested regularly to provide timely notification (within 72 hours of becoming aware of it) to regulators and consumers in the event of a data breach.

GDPR impacts data processors and data controllers alike, bringing data protection practices to the forefront of business agenda. With the rise of cybercrime, it is becoming more important to consider consumer protection and brand reputation in information security design. For organizations to remain GDPR compliant, they must continuously monitor the effectiveness of the measures implemented and continuously improve them by incorporating best practices of personal data protection.

 

Related Posts

Cybersecurity

A new frontier for the digital leadership of intelligent organizations: Cyber resilience

Alessandro Menna
Date icon July 17, 2019

What is the typical trait of a cyber-resilient organization? Obviously, there is no short...

Cybersecurity

Cloud Security – Fix Governance not just technology

Lee Newcombe
Date icon June 12, 2019

Large enterprises in particular will be operating multi-modal IT, i.e. elements of...

Cybersecurity

The process side of things: Four areas of focus your SIEM/SOC efforts should consider

André Hohner
Date icon June 4, 2019

Often, the matters of processes or organizational structures are overlooked in SIEM/SOC...

cookies.

By continuing to navigate on this website, you accept the use of cookies.

For more information and to change the setting of cookies on your computer, please read our Privacy Policy.

Close

Close cookie information