SlideShare uma empresa Scribd logo
1 de 38
Data Protection EMEA Training
NEC EMEA New Joiners 2020
NEC Group Internal UseOnly
2
AGENDA OF THE TRAINING
I. INTRODUCTION
II. DATA PROTECTION KEY REQUIREMENTS.
III. WHAT DOES PERSONAL DATA MEAN.
IV. DATA PROCESSING. ROLES.
V. PRINCIPLES.
VI. NEC ACCOUNTABILITY.
VII. LEGAL BASIS FOR PROCESSING PERSONAL DATA.
VIII. PERSONAL DATA BREACHES.
IX. ENFORCEMENT.
X. NEC EMPLOYEES’ RESPONSIBILITIES
XI. QUIZ
3
• The Convention for the Protection of Individuals
with regard to Automatic Processing of Personal
Data №108.
• OECD Guidelines.
• GDPR and EU members’ data protection law.
• Protection law acts, standards and regulations
which are in force. Protection of Personal Data No.
6698 dated April 7, 2016 (PDPL), Federal Law of July
2006, POPI Act…
• Data privacy cases, precedents, guidelines.
Source @UNCTAD 2020.
4
I. INTRODUCTION. OVERVIEW
Data protection laws generally set out rules and standards for the use and handling ('processing') of
information ('personal data') about living identifiable individuals ('data subjects'). Laws apply to
organizations in all sectors, both public and private.
Data Protection Laws. Global Overview
5
Enforcement
Accountability
Data Protection
Principles
Security on
processing
Registry of
activities
Data Subject
Rights
Data Breaches
II. DATA PROTECTION KEY REQUIREMENTS
DATA PROTECTION LAWS ARE BASED AROUND THE NOTIONS OF PRINCIPLES, INDIVIDUALS RIGHTS, RISK ASSESSMENTS AND THE
ACCOUNTABILITY CONCEPT.
Data protection Laws seek to
protect and prevent the abuse
and misuse of personal data,
owned by individuals whose
information is collected,
processed, and used by the
companies.
III. PERSONAL DATA MEANING UNDER DATA PROTECTION LAWS
 Personal Data means any information relating to an identified or identifiable natural person.
 Sensitive Personal Data includes data consisting of racial or ethnic origin, political opinions, religious or
philosophical beliefs, or trade union membership, genetic data, biometric data, data concerning health
or data concerning a natural person's sex life or sexual orientation.
77
III. PERSONAL DATA EXAMPLES
Betty Miller
ID Number: N000182
miller-b@nec.com
+33 134 432345
Algeria
male
40 Years
IP: 7000182-23-3019
born: 12.01.1980Moscow Road, London
likes hamburgers
BA of Law 1993,
Engineer. Project Manager Leader
shoe size: 48/12,5
married, 4 kids
John Smith
IV. DATA PROCESSING/ ROLES UNDER DATA PROTECTION LAWS
 Processing: Processing covers a wide range of operations performed on personal data, including
by manual or automated means. It includes the collection, recording, organization, structuring,
storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission,
dissemination or otherwise making available, alignment or combination, restriction, erasure or
destruction of personal data. For example, staff management and payroll administration; access
to/consultation of a contacts database containing personal data.
 Data Controller/Responsible Party/Operator: person or entity who (either alone, jointly, or in
common with others) determines the purposes for which and the manner in which personal data is
processed. In other words, deciding “what” personal data will be processed for and “how” it will be
done. NEC shall act as Data Controller/Responsible Party/Operator when determine the purposes
for which and the way in which, personal data is processed.
 Data Processor/Operator/party that process personal data under Operator’ instructions:
person or entity who processes personal data on behalf of a controller/ Responsible Party/
Operator.
 gathering
 collecting
 uploading
 recalling
 storing
 deleting
 modifying
 auditing
 using
 sending
 distributing
 modulating
 linking
 restricting
 printing
 editing
 erasing
 transferring
 distributing
 adjusting
IV. DATA PROCESSING/ ROLES UNDER DATA PROTECTION LAWS
 It is essential for NEC to be able to determine the role in
which is acting in respect of the processing. This is
particularly important in situations such as a data breach
where it will be necessary to determine which
organisation has data protection responsibility.
 The key distinction is to determine the degree of
independence that each party has in determining how
and in what manner the data is processed, as well as the
degree of control over the content of personal data.
 The fact that one organisation provides a service to
another organisation does not necessarily means that it is
acting as a data processor (called as well operator or
party that over the processing operation.
 NEC cannot assume both roles for process personal data
under Operator’ instructions. It could be a data controller
(called as well responsible party or operator) in its own
right, depending on the degree of control it exercises
the same data processing activity: it must be one or the
other. However can be acting as both in the same
Agreement.
9
Make sure that you comply with NEC GUIDELINES. A data processing agreement (DPA) must be
signed.
V. DATA PROTECTION PRINCIPLES. QUESTIONS
QUESTIONS
1
Is my processing activity lawful? Have the data subject been informed about the
processing activity?
2
Do I use personal data for an specific purpose?
Do I use personal data for other purposes?
3 Are all personal data necessary and not only useful?
4 Are personal data accurate and up to date?
5
Must I delete personal data at the end of the processing activity or are there other
obligations to keep the data?
6 Are personal data sufficiently secure?
© NEC Corporation 2019
Questions to ask prior to the processing of personal data
© NEC Corporation 2019
Lawfulness, Fairness and Transparency
NEC employees must:
• Ensure that you do not do anything with the data in breach of any other laws.
• Identify legal basis for collecting and using personal data.
• Please follow internal policies.
• Use personal data in a way that is fair: you must not process the data in a way that is unduly
detrimental, unexpected or misleading to the individuals concerned.
• Be clear, open and honest from the start about how you will use their personal data.
Examples:
Premises is going to be filming in a certain part of an office for celebrating NEC’s 120
anniversary. NEC asks all the employees who sit in that area for their consent to be filmed.
Those who do not want to be filmed are not penalised and don´t appear any way but instead
are given equivalent desks elsewhere in the building for the duration of the filming.
NEC informs its employees that it will use their email address to keep inform them on IT
updates. However, NEC shares their email address with a provider for a different purpose.
V. DATA PROTECTION PRINCIPLES
V. DATA PROTECTION PRINCIPLES
© NEC Corporation 2019
Purpose Limitation
NEC employees must:
• Be clear from the start about what are the purposes for processing.
• Record the purposes as part of your documentation obligations and specify them in the privacy
notice for individuals.
• Collect it for a determined, specific, and legitimate purpose. Any further processing must not be
incompatible with the purposes specified at the outset. Collecting person’s data for one purpose,
and then use it for something else without notice or justification is not acceptable.
Examples:
NEC Finance team stores personal data in separate databases, entities, and areas for
each purpose and process. By separating the processing or storage of several sources of
personal data that belong to the same person, the possibility of creating complete
profile of one person is reduced and moreover to avoid linkability between different data
sets.
Mary, from the HR department discloses her employees’ sickness list to her husband,
who runs a travel agency, so that he can offer special holiday deals to those employees
needing recuperation.
V. DATA PROTECTION PRINCIPLES
© NEC Corporation 2019
Data Minimisation
NEC employees must ensure the personal data processing is:
• Adequate - sufficient to properly fulfil your purpose.
• Relevant: has a rational link to that purpose.
• Limited to what is necessary.
Examples:
NEC offers car-sharing services to employees. For those services NEC requires the
name, address and credit card number of employees, health data and racial origin.
EIS restricts digital file paths and folder using permissions and passwords so only NEC
employees who need access to personal data have access to it.
V. DATA PROTECTION PRINCIPLES
© NEC Corporation 2019
Accuracy
NEC employees should:
• Ensure the personal data hold is not incorrect or misleading. And if so, take reasonable steps to correct
or erase it as soon as possible.
• Keep the personal data up to date, although this will depend on what you are using it for.
Examples:
A customer places a one-off order with NEC. NEC will probably have a good reason to
retain a record of the order for a certain period for accounting reasons. However, this
does not mean that NEC has to regularly check that the customer is still located at the
same address.
An employee informs HR of a new address, however, the person in charge of HR doesn´t
update the records and keeps sending letters to such address with the risk that another
person, not authorised to receiving them, has access to them.
V. DATA PROTECTION PRINCIPLES
© NEC Corporation 2019
Storage Limitation
NEC employees must:
• Not keep personal data for longer than you need it.
• Follow NEC Retention Policy and Schedule Instructions.
• Be able to justify, how long you keep personal data. This will depend on your purposes for holding the
data.
• Periodically review the data you hold, and erase, archive or anonymize it when you no longer need it.
• Remember that individuals have the right to erase if you no longer need the data.
Examples:
NEC sales teams receive several applications for a job vacancy. They keep recruitment
records for unsuccessful applicants forever in their mailbox.
NEC should review the personal data it holds about an employee when they leave
NEC’s employment. It will need to retain enough data to enable NEC to deal with, for
example, providing references or pension arrangements. However, it should delete
personal data that it is unlikely to need again, such as the employee’s emergency
contact details, previous addresses, or death-in-service beneficiary details.
V. DATA PROTECTION PRINCIPLES
© NEC Corporation 2019
Integrity and Confidentiality
This is the integrity, availability and confidentiality principle of Data Protection laws, also known as Data
security principle.
Generally, Data Protection Laws don't define the security measures. It requires to have a level of security
that is appropriate to the risks presented by each processing. Consider this in relation to the state of art
and costs implementation as well as the nature, scope, context and purpose of the processing of personal
data.
Ensure that you have appropriate security measures in place to protect the personal data hold aligned with
local NEC ISMS Policies.
Examples:
Each employee should use an account that has permissions appropriate to the role job
they are carrying out at the time.
Confidential documentation need to be securely stored, but the employee leaves the
office without locking the cabinet.
VI. NEC ACCOUNTABILITY
Accountability requires translate legal requirements into risk-
based, verifiable and enforceable corporate practices and
controls
Accountability is one of the data protection principles - it makes NEC responsible for complying with Data
Protection Laws and says that NEC must be able to demonstrate compliance. NEC must be able to demonstrate
accountability – internally and externally.
Accountability is not static, but
dynamic, reiterative and a constant
journey. Accountability obligations
are ongoing.
Leadership and oversight
Risk Assessment
Policies and procedures.
Transparency
Training and Awareness
Monitoring and verification
Accountability effective
compliance and protection for
individuals
Implement a privacy management framework this can help you
embed your accountability measures and create a culture of
privacy across NEC.
Being accountable can help NEC in
EMEA to build trust with individuals
and may help NEC mitigate
enforcement action.
VII. LEGAL BASIS FOR PROCESSING PERSONAL DATA
 NEC in EMEA must have a valid lawful basis in order to process personal data.
 No single basis is ’better’ or more important than the others – which basis is most
appropriate to use will depend on NEC purpose and relationship with the
individual.
A lawful basis for
processing personal
data may consist of at
least one of those
legal grounds and will
vary per personal data
processing activity,
scope and purpose.
Data Subject provides consent
to the processing.
Legitimate interest of the
controller provided that rights
and freedoms of data subject
are not violated.
Performance of a contract to
which the data subject is party.
Compliance with a legal
obligation.
Protection of vital interests.
Public interest or official
authority.
VIII. PERSONAL DATA BREACHES
Destruction of personal data, where
personal data no longer exits or no longer
exits in a form that is of any use to the
controller.
Damage, where personal data has been
altered, corrupted or is no longer
complete.
Loss of personal data, personal data may
still exist but the controller has lost control
or access to it or no longer has it in
possession.
Unauthorised or unlawful processing may
include disclosure of personal data (or
access by) recipients who are not
authorised to receive (or access) the data,
or any other form of processing which is
not compliant with laws and regulations.
A breach of security leading to the accidental or
unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to, personal data transmitted,
stored or otherwise processed, whether by accidental
or deliberate causes.
© NEC Corporation 2019
VIII. EXPLORING DATA BREACHES
Visibly copying in all
individual recipients to an
email without permission to
share their email address
(assuming its personally
identifiable).
Sending personal data to an
incorrect recipient.
Access to personal data by
an unauthorised third party.
Alteration of personal data
without permission.
Devices/laptops containing
personal data being lost or
stolen.
Deliberate or accidental
action (or inaction) by a
controller or processor.
Insecure disposal of
paperwork containing
personal data.
Inappropriate access controls
allowing unauthorised use. ls
to gain unauthorised access
or make unauthorised
changes to personal data or
information systems.
PERSONAL DATA BREACH is more
than just about losing personal
data. It is about the relative
consequences to the
individuals concerned.
© NEC Corporation 2019
VIII. PERSONAL DATA BREACHES PROCESS
© NEC Corporation 2019
EMEA Personal data Breaches
should be reported
immediately upon discovery to
incident@emea.nec.com.
Be familiar and follow NEC
internal Policies. Please
check EMEA intranet
If determined a personal data breach,
NEC must perform an internal risk
assessment to assess the likely risk to
individuals as a result of a breach.
If appropriate, NEC reports the
personal data breach, if the
threshold is met.
Remediation plan for
containing the data breach.
Data Subjects
Supervisory
authority
IX. ENFORCEMENT
22
 Enforcement can be significant different in each country. However most EMEA Data Protection
Supervisory Authorities are entitled to:
carry out checks;
consider complaints from data subjects;
require the submission of necessary information about personal data processing by the data
controller;
require the undertaking of certain actions according to the law by the data processor,
including discontinuance of the processing of personal data;
file court actions;
initiate criminal cases; and
impose administrative liability.
NEC in EMEA Data Protection Programs. Are you aware of it?
 Data Protection Privacy Framework. Policies, protocols and instructions for EMEA NEC’s
compliance approach to the requirements of Data Protection Laws. You can find the Data
Protection Framework in the Intranet site. https://intra.emea.nec.com/legal.
 Training and awareness. General and refreshing training for NEC employees around the
requirements of Data Protection Laws, new compliance channel for data protection
communications and layers regularly published for specific topics in the EMEA intranet.
 Alignment with NEC Corporation. Alignment within NEC Group on projects where data
protection applies or where NEC EMEA Affiliates are part of.
 Data Protection Governance Structure. Reinforce the Privacy team within EMEA Region (i)
Data Protection Officer(s) and, (ii) Privacy Collaborators.
© NEC Corporation 2019
X. NEC EMPLOYEES’ RESPONSIBILITIES
X. NEC EMPLOYEES’ RESPONSIBILITIES
NEC
Corporation
• Global Chief Compliance Officer.
• Compliance Division.
NEC EMEA
• EMEA Data Protection Officer.
• Privacy Collaborators.
NEC CA's
• Data Protection Officer(s).
• Privacy Collaborators.
© NEC Corporation 2019
X. NEC EMPLOYEES’ RESPONSIBILITIES
All NEC employees are responsible
towards Data Protection.
Data Protection is for the entire
Group.
All employees have an important
role in continuous compliance of
Data Protection Laws.
25
X. NEC EMPLOYEES’ RESPONSIBILITIES
• Be aware of the importance of privacy: Follow and read NEC
Policies.
• Be careful in deciding about Data Protection Laws
compliance without consultation. Always ask!
• Only collect personal data that is reasonably necessary for
the legitimate purposes for which you are collecting that
personal data.
• Do not share any individual’s information with any third
parties unless you have received authorization from your
Manager based on advice from Privacy team.
• Choose the less intrusive privacy approach in your day to
day activities including managing data, designing
products, and services.
• Follow closely the principles and obligations highlighted in
this training.
NEC collects and process personal
data of its customers, employees,
suppliers and any third parties. NEC
is committed to respect the privacy
rights and freedoms of the
individuals whose personal data is
collected and processed by
complying with all applicable data
protection laws.
© NEC Corporation 2019
ATTENTION!
• All NEC employees are
responsible towards Data
Protection compliance.
• All employees, have an
important role in continuous
Data Protection compliance.
Follow NEC internal rules
XI. QUIZ
© NEC Corporation 2019
1)Data protection laws generally set out rules and standards for:
(a)Processing personal data;
(b)About deceased persons;
(c)Apply to private companies;
(d)None of the above.
Answer : a) Data protection laws generally set out rules and standards for the
use and handling ('processing') of information ('personal data') about living
identifiable individuals ('data subjects'). Laws apply to organizations in all sectors,
both public and private.
XI. QUIZ
© NEC Corporation 2019
2) Under the sensitive personal data definition which of the following
is not considered sensitive: :
(e)Trade union membership;
(f)Biometric data;
(g)Financial data ( bank accounts)
(h)Religion;
Answer c) Financial data is considered personal data, however is not sensitive
personal data.
XI. QUIZ
© NEC Corporation 2019
3)Data protection is guided by certain principles on how NEC should
handle personal data. Which one of the following is not one of these
principles?
(a) Only collect what is necessary.
(b) Ensure data is accurate and up to date.
(c) Ensure data is not duplicated to minimise spread of data.
(d) Don’t keep data longer than required and dispose of it properly.
Answer c) Ensure data is not duplicated to minimise its spread. Although data
should be as streamlined as possible, this is not one of the principles. EMEA
intranet site is a good place to look at those.
XI. QUIZ
© NEC Corporation 2019
4) Data Protection Laws introduces a new data protection
accountability concept, please select the correct
a)It makes NEC responsible for complying with Data Protection Laws and says that
NEC must be able to demonstrate compliance
(b) Implement a privacy management framework this can help you embed your
accountability measures and create a culture of privacy across NEC.
(c) Being accountable can help NEC in EMEA to build trust with individuals and may
help NEC mitigate enforcement action;
(d)All the above
Answer d)
XI. QUIZ
© NEC Corporation 2019
5)When a personal data breach occurs, what is the maximum time an
NEC employee have to report it?
(a) 12 hours.
(b) Immediately upon discovery.
(c) No need to report it internally I can manage by my own.
(d) There isn’t a limit.
Answer b) You should report a data breach as soon as you are aware. If you’re
not sure what’s happened or whether what you’ve found is a data breach, the
rule is: If in doubt, report – it’s better to over-report than under-report., NEC
keeps a record of all actual and potential breaches.
XI. QUIZ
© NEC Corporation 2019
6) I sent an internal mail with personal data attached to an incorrect
internal recipient. Which are following steps?
(a) Nothing, that’s is not a data breach. It’s internal and I can handle the situation by
my own.
(b)Report it immediately upon discovery to incident@emea.nec.com.
(c) I recall the message, data breach is closed.
(d) all of the above.
Answer b) Report it immediately upon discovery to incident@emea.nec.com
XI. QUIZ
© NEC Corporation 2019
7) If you have a general question about data protection, where should
you go for more information? Choose as many options you consider.
(a)Always go to your Supervisory Authority.
(b)Check out the Data Protection EMEA intranet site.
(c) Contact your Privacy Collaborator in your NEC CA.
(d) Contact the Data Protection Officer(s).
Answer: b, c and d) You can, of course, speak to your Supervisory Authority or
anyone else, but our Data Protection EMEA intranet sire is a good place to look.
If you can’t find an answer there, contact the Data Protection Collaborators in
your CAs or to your Data Protection Officer (s)
XI. QUIZ
© NEC Corporation 2019
8) Staff management and payroll administration; access
to/consultation of a contacts database containing personal data are
examples of
(a) Data Controller/Responsible Party/Operator;
(b) Data Processor/Operator/party that process personal data under Operator’
instructions;
(c) Processing of personal data;
(d) None of the above;
Answer : c) Processing of personal data;
XI. QUIZ
© NEC Corporation 2019
9) Be clear from the start about what are the purposes for processing
is part of:
(a) Lawfulness, fairness and transparency principle;
(b) Data minimisation principle;
(c) Purpose limitation principle;
(d) Security principle.
Answer : c) Purpose limitation.
XI. QUIZ
© NEC Corporation 2019
10) NEC collects and process personal data of its customers,
employees, suppliers and any third parties. NEC is committed to
respect the privacy rights and freedoms of the individuals whose
personal data is collected and processed by complying with all
applicable data protection laws
(a)True
(b)False
Answer a)
37
Thank you very much for your collaboration
Orchestrating a brighter world
38

Mais conteúdo relacionado

Mais procurados

GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)The Pathway Group
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developersExove
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
 
How to get started with being GDPR compliant
How to get started with being GDPR compliantHow to get started with being GDPR compliant
How to get started with being GDPR compliantSiddharth Ram Dinesh
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulationFahad Ameen
 

Mais procurados (20)

GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
Data protection
Data protectionData protection
Data protection
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
How to get started with being GDPR compliant
How to get started with being GDPR compliantHow to get started with being GDPR compliant
How to get started with being GDPR compliant
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 

Semelhante a Data protection training emea new joiners. mandatory quiz

The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance PreparationLawPlus Ltd.
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfkiruthigajawahar6
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochureJean Luc Creppy
 
The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)LawPlus Ltd.
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationsilvereyez11
 
Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18Jon Rathbone
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014UsmanMAmeer
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfkiruthigajawahar6
 
Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4
Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4
Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4Adestra
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startupsEkoInnovationCentre
 
Reddico GDPR Presentation
Reddico GDPR PresentationReddico GDPR Presentation
Reddico GDPR PresentationLuke Kyte
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
GDPR Cheat Sheet
GDPR Cheat SheetGDPR Cheat Sheet
GDPR Cheat SheetTorii
 
Top 10 GDPR Requirements
Top 10 GDPR RequirementsTop 10 GDPR Requirements
Top 10 GDPR RequirementsRusty Stanberry
 

Semelhante a Data protection training emea new joiners. mandatory quiz (20)

The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochure
 
The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
 
Can we ask that
Can we ask thatCan we ask that
Can we ask that
 
Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4
Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4
Key marketing impacts of the GDPR - Rosemary Smith, Director, Opt-4
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
Reddico GDPR Presentation
Reddico GDPR PresentationReddico GDPR Presentation
Reddico GDPR Presentation
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR Cheat Sheet
GDPR Cheat SheetGDPR Cheat Sheet
GDPR Cheat Sheet
 
Top 10 GDPR Requirements
Top 10 GDPR RequirementsTop 10 GDPR Requirements
Top 10 GDPR Requirements
 

Último

SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 

Último (20)

SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 

Data protection training emea new joiners. mandatory quiz

  • 1. Data Protection EMEA Training NEC EMEA New Joiners 2020 NEC Group Internal UseOnly
  • 2. 2
  • 3. AGENDA OF THE TRAINING I. INTRODUCTION II. DATA PROTECTION KEY REQUIREMENTS. III. WHAT DOES PERSONAL DATA MEAN. IV. DATA PROCESSING. ROLES. V. PRINCIPLES. VI. NEC ACCOUNTABILITY. VII. LEGAL BASIS FOR PROCESSING PERSONAL DATA. VIII. PERSONAL DATA BREACHES. IX. ENFORCEMENT. X. NEC EMPLOYEES’ RESPONSIBILITIES XI. QUIZ 3
  • 4. • The Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data №108. • OECD Guidelines. • GDPR and EU members’ data protection law. • Protection law acts, standards and regulations which are in force. Protection of Personal Data No. 6698 dated April 7, 2016 (PDPL), Federal Law of July 2006, POPI Act… • Data privacy cases, precedents, guidelines. Source @UNCTAD 2020. 4 I. INTRODUCTION. OVERVIEW Data protection laws generally set out rules and standards for the use and handling ('processing') of information ('personal data') about living identifiable individuals ('data subjects'). Laws apply to organizations in all sectors, both public and private. Data Protection Laws. Global Overview
  • 5. 5 Enforcement Accountability Data Protection Principles Security on processing Registry of activities Data Subject Rights Data Breaches II. DATA PROTECTION KEY REQUIREMENTS DATA PROTECTION LAWS ARE BASED AROUND THE NOTIONS OF PRINCIPLES, INDIVIDUALS RIGHTS, RISK ASSESSMENTS AND THE ACCOUNTABILITY CONCEPT. Data protection Laws seek to protect and prevent the abuse and misuse of personal data, owned by individuals whose information is collected, processed, and used by the companies.
  • 6. III. PERSONAL DATA MEANING UNDER DATA PROTECTION LAWS  Personal Data means any information relating to an identified or identifiable natural person.  Sensitive Personal Data includes data consisting of racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, biometric data, data concerning health or data concerning a natural person's sex life or sexual orientation.
  • 7. 77 III. PERSONAL DATA EXAMPLES Betty Miller ID Number: N000182 miller-b@nec.com +33 134 432345 Algeria male 40 Years IP: 7000182-23-3019 born: 12.01.1980Moscow Road, London likes hamburgers BA of Law 1993, Engineer. Project Manager Leader shoe size: 48/12,5 married, 4 kids John Smith
  • 8. IV. DATA PROCESSING/ ROLES UNDER DATA PROTECTION LAWS  Processing: Processing covers a wide range of operations performed on personal data, including by manual or automated means. It includes the collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction of personal data. For example, staff management and payroll administration; access to/consultation of a contacts database containing personal data.  Data Controller/Responsible Party/Operator: person or entity who (either alone, jointly, or in common with others) determines the purposes for which and the manner in which personal data is processed. In other words, deciding “what” personal data will be processed for and “how” it will be done. NEC shall act as Data Controller/Responsible Party/Operator when determine the purposes for which and the way in which, personal data is processed.  Data Processor/Operator/party that process personal data under Operator’ instructions: person or entity who processes personal data on behalf of a controller/ Responsible Party/ Operator.  gathering  collecting  uploading  recalling  storing  deleting  modifying  auditing  using  sending  distributing  modulating  linking  restricting  printing  editing  erasing  transferring  distributing  adjusting
  • 9. IV. DATA PROCESSING/ ROLES UNDER DATA PROTECTION LAWS  It is essential for NEC to be able to determine the role in which is acting in respect of the processing. This is particularly important in situations such as a data breach where it will be necessary to determine which organisation has data protection responsibility.  The key distinction is to determine the degree of independence that each party has in determining how and in what manner the data is processed, as well as the degree of control over the content of personal data.  The fact that one organisation provides a service to another organisation does not necessarily means that it is acting as a data processor (called as well operator or party that over the processing operation.  NEC cannot assume both roles for process personal data under Operator’ instructions. It could be a data controller (called as well responsible party or operator) in its own right, depending on the degree of control it exercises the same data processing activity: it must be one or the other. However can be acting as both in the same Agreement. 9 Make sure that you comply with NEC GUIDELINES. A data processing agreement (DPA) must be signed.
  • 10. V. DATA PROTECTION PRINCIPLES. QUESTIONS QUESTIONS 1 Is my processing activity lawful? Have the data subject been informed about the processing activity? 2 Do I use personal data for an specific purpose? Do I use personal data for other purposes? 3 Are all personal data necessary and not only useful? 4 Are personal data accurate and up to date? 5 Must I delete personal data at the end of the processing activity or are there other obligations to keep the data? 6 Are personal data sufficiently secure? © NEC Corporation 2019 Questions to ask prior to the processing of personal data
  • 11. © NEC Corporation 2019 Lawfulness, Fairness and Transparency NEC employees must: • Ensure that you do not do anything with the data in breach of any other laws. • Identify legal basis for collecting and using personal data. • Please follow internal policies. • Use personal data in a way that is fair: you must not process the data in a way that is unduly detrimental, unexpected or misleading to the individuals concerned. • Be clear, open and honest from the start about how you will use their personal data. Examples: Premises is going to be filming in a certain part of an office for celebrating NEC’s 120 anniversary. NEC asks all the employees who sit in that area for their consent to be filmed. Those who do not want to be filmed are not penalised and don´t appear any way but instead are given equivalent desks elsewhere in the building for the duration of the filming. NEC informs its employees that it will use their email address to keep inform them on IT updates. However, NEC shares their email address with a provider for a different purpose. V. DATA PROTECTION PRINCIPLES
  • 12. V. DATA PROTECTION PRINCIPLES © NEC Corporation 2019 Purpose Limitation NEC employees must: • Be clear from the start about what are the purposes for processing. • Record the purposes as part of your documentation obligations and specify them in the privacy notice for individuals. • Collect it for a determined, specific, and legitimate purpose. Any further processing must not be incompatible with the purposes specified at the outset. Collecting person’s data for one purpose, and then use it for something else without notice or justification is not acceptable. Examples: NEC Finance team stores personal data in separate databases, entities, and areas for each purpose and process. By separating the processing or storage of several sources of personal data that belong to the same person, the possibility of creating complete profile of one person is reduced and moreover to avoid linkability between different data sets. Mary, from the HR department discloses her employees’ sickness list to her husband, who runs a travel agency, so that he can offer special holiday deals to those employees needing recuperation.
  • 13. V. DATA PROTECTION PRINCIPLES © NEC Corporation 2019 Data Minimisation NEC employees must ensure the personal data processing is: • Adequate - sufficient to properly fulfil your purpose. • Relevant: has a rational link to that purpose. • Limited to what is necessary. Examples: NEC offers car-sharing services to employees. For those services NEC requires the name, address and credit card number of employees, health data and racial origin. EIS restricts digital file paths and folder using permissions and passwords so only NEC employees who need access to personal data have access to it.
  • 14. V. DATA PROTECTION PRINCIPLES © NEC Corporation 2019 Accuracy NEC employees should: • Ensure the personal data hold is not incorrect or misleading. And if so, take reasonable steps to correct or erase it as soon as possible. • Keep the personal data up to date, although this will depend on what you are using it for. Examples: A customer places a one-off order with NEC. NEC will probably have a good reason to retain a record of the order for a certain period for accounting reasons. However, this does not mean that NEC has to regularly check that the customer is still located at the same address. An employee informs HR of a new address, however, the person in charge of HR doesn´t update the records and keeps sending letters to such address with the risk that another person, not authorised to receiving them, has access to them.
  • 15. V. DATA PROTECTION PRINCIPLES © NEC Corporation 2019 Storage Limitation NEC employees must: • Not keep personal data for longer than you need it. • Follow NEC Retention Policy and Schedule Instructions. • Be able to justify, how long you keep personal data. This will depend on your purposes for holding the data. • Periodically review the data you hold, and erase, archive or anonymize it when you no longer need it. • Remember that individuals have the right to erase if you no longer need the data. Examples: NEC sales teams receive several applications for a job vacancy. They keep recruitment records for unsuccessful applicants forever in their mailbox. NEC should review the personal data it holds about an employee when they leave NEC’s employment. It will need to retain enough data to enable NEC to deal with, for example, providing references or pension arrangements. However, it should delete personal data that it is unlikely to need again, such as the employee’s emergency contact details, previous addresses, or death-in-service beneficiary details.
  • 16. V. DATA PROTECTION PRINCIPLES © NEC Corporation 2019 Integrity and Confidentiality This is the integrity, availability and confidentiality principle of Data Protection laws, also known as Data security principle. Generally, Data Protection Laws don't define the security measures. It requires to have a level of security that is appropriate to the risks presented by each processing. Consider this in relation to the state of art and costs implementation as well as the nature, scope, context and purpose of the processing of personal data. Ensure that you have appropriate security measures in place to protect the personal data hold aligned with local NEC ISMS Policies. Examples: Each employee should use an account that has permissions appropriate to the role job they are carrying out at the time. Confidential documentation need to be securely stored, but the employee leaves the office without locking the cabinet.
  • 17. VI. NEC ACCOUNTABILITY Accountability requires translate legal requirements into risk- based, verifiable and enforceable corporate practices and controls Accountability is one of the data protection principles - it makes NEC responsible for complying with Data Protection Laws and says that NEC must be able to demonstrate compliance. NEC must be able to demonstrate accountability – internally and externally. Accountability is not static, but dynamic, reiterative and a constant journey. Accountability obligations are ongoing. Leadership and oversight Risk Assessment Policies and procedures. Transparency Training and Awareness Monitoring and verification Accountability effective compliance and protection for individuals Implement a privacy management framework this can help you embed your accountability measures and create a culture of privacy across NEC. Being accountable can help NEC in EMEA to build trust with individuals and may help NEC mitigate enforcement action.
  • 18. VII. LEGAL BASIS FOR PROCESSING PERSONAL DATA  NEC in EMEA must have a valid lawful basis in order to process personal data.  No single basis is ’better’ or more important than the others – which basis is most appropriate to use will depend on NEC purpose and relationship with the individual. A lawful basis for processing personal data may consist of at least one of those legal grounds and will vary per personal data processing activity, scope and purpose. Data Subject provides consent to the processing. Legitimate interest of the controller provided that rights and freedoms of data subject are not violated. Performance of a contract to which the data subject is party. Compliance with a legal obligation. Protection of vital interests. Public interest or official authority.
  • 19. VIII. PERSONAL DATA BREACHES Destruction of personal data, where personal data no longer exits or no longer exits in a form that is of any use to the controller. Damage, where personal data has been altered, corrupted or is no longer complete. Loss of personal data, personal data may still exist but the controller has lost control or access to it or no longer has it in possession. Unauthorised or unlawful processing may include disclosure of personal data (or access by) recipients who are not authorised to receive (or access) the data, or any other form of processing which is not compliant with laws and regulations. A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed, whether by accidental or deliberate causes. © NEC Corporation 2019
  • 20. VIII. EXPLORING DATA BREACHES Visibly copying in all individual recipients to an email without permission to share their email address (assuming its personally identifiable). Sending personal data to an incorrect recipient. Access to personal data by an unauthorised third party. Alteration of personal data without permission. Devices/laptops containing personal data being lost or stolen. Deliberate or accidental action (or inaction) by a controller or processor. Insecure disposal of paperwork containing personal data. Inappropriate access controls allowing unauthorised use. ls to gain unauthorised access or make unauthorised changes to personal data or information systems. PERSONAL DATA BREACH is more than just about losing personal data. It is about the relative consequences to the individuals concerned. © NEC Corporation 2019
  • 21. VIII. PERSONAL DATA BREACHES PROCESS © NEC Corporation 2019 EMEA Personal data Breaches should be reported immediately upon discovery to incident@emea.nec.com. Be familiar and follow NEC internal Policies. Please check EMEA intranet If determined a personal data breach, NEC must perform an internal risk assessment to assess the likely risk to individuals as a result of a breach. If appropriate, NEC reports the personal data breach, if the threshold is met. Remediation plan for containing the data breach. Data Subjects Supervisory authority
  • 22. IX. ENFORCEMENT 22  Enforcement can be significant different in each country. However most EMEA Data Protection Supervisory Authorities are entitled to: carry out checks; consider complaints from data subjects; require the submission of necessary information about personal data processing by the data controller; require the undertaking of certain actions according to the law by the data processor, including discontinuance of the processing of personal data; file court actions; initiate criminal cases; and impose administrative liability.
  • 23. NEC in EMEA Data Protection Programs. Are you aware of it?  Data Protection Privacy Framework. Policies, protocols and instructions for EMEA NEC’s compliance approach to the requirements of Data Protection Laws. You can find the Data Protection Framework in the Intranet site. https://intra.emea.nec.com/legal.  Training and awareness. General and refreshing training for NEC employees around the requirements of Data Protection Laws, new compliance channel for data protection communications and layers regularly published for specific topics in the EMEA intranet.  Alignment with NEC Corporation. Alignment within NEC Group on projects where data protection applies or where NEC EMEA Affiliates are part of.  Data Protection Governance Structure. Reinforce the Privacy team within EMEA Region (i) Data Protection Officer(s) and, (ii) Privacy Collaborators. © NEC Corporation 2019 X. NEC EMPLOYEES’ RESPONSIBILITIES
  • 24. X. NEC EMPLOYEES’ RESPONSIBILITIES NEC Corporation • Global Chief Compliance Officer. • Compliance Division. NEC EMEA • EMEA Data Protection Officer. • Privacy Collaborators. NEC CA's • Data Protection Officer(s). • Privacy Collaborators. © NEC Corporation 2019
  • 25. X. NEC EMPLOYEES’ RESPONSIBILITIES All NEC employees are responsible towards Data Protection. Data Protection is for the entire Group. All employees have an important role in continuous compliance of Data Protection Laws. 25
  • 26. X. NEC EMPLOYEES’ RESPONSIBILITIES • Be aware of the importance of privacy: Follow and read NEC Policies. • Be careful in deciding about Data Protection Laws compliance without consultation. Always ask! • Only collect personal data that is reasonably necessary for the legitimate purposes for which you are collecting that personal data. • Do not share any individual’s information with any third parties unless you have received authorization from your Manager based on advice from Privacy team. • Choose the less intrusive privacy approach in your day to day activities including managing data, designing products, and services. • Follow closely the principles and obligations highlighted in this training. NEC collects and process personal data of its customers, employees, suppliers and any third parties. NEC is committed to respect the privacy rights and freedoms of the individuals whose personal data is collected and processed by complying with all applicable data protection laws. © NEC Corporation 2019 ATTENTION! • All NEC employees are responsible towards Data Protection compliance. • All employees, have an important role in continuous Data Protection compliance. Follow NEC internal rules
  • 27. XI. QUIZ © NEC Corporation 2019 1)Data protection laws generally set out rules and standards for: (a)Processing personal data; (b)About deceased persons; (c)Apply to private companies; (d)None of the above. Answer : a) Data protection laws generally set out rules and standards for the use and handling ('processing') of information ('personal data') about living identifiable individuals ('data subjects'). Laws apply to organizations in all sectors, both public and private.
  • 28. XI. QUIZ © NEC Corporation 2019 2) Under the sensitive personal data definition which of the following is not considered sensitive: : (e)Trade union membership; (f)Biometric data; (g)Financial data ( bank accounts) (h)Religion; Answer c) Financial data is considered personal data, however is not sensitive personal data.
  • 29. XI. QUIZ © NEC Corporation 2019 3)Data protection is guided by certain principles on how NEC should handle personal data. Which one of the following is not one of these principles? (a) Only collect what is necessary. (b) Ensure data is accurate and up to date. (c) Ensure data is not duplicated to minimise spread of data. (d) Don’t keep data longer than required and dispose of it properly. Answer c) Ensure data is not duplicated to minimise its spread. Although data should be as streamlined as possible, this is not one of the principles. EMEA intranet site is a good place to look at those.
  • 30. XI. QUIZ © NEC Corporation 2019 4) Data Protection Laws introduces a new data protection accountability concept, please select the correct a)It makes NEC responsible for complying with Data Protection Laws and says that NEC must be able to demonstrate compliance (b) Implement a privacy management framework this can help you embed your accountability measures and create a culture of privacy across NEC. (c) Being accountable can help NEC in EMEA to build trust with individuals and may help NEC mitigate enforcement action; (d)All the above Answer d)
  • 31. XI. QUIZ © NEC Corporation 2019 5)When a personal data breach occurs, what is the maximum time an NEC employee have to report it? (a) 12 hours. (b) Immediately upon discovery. (c) No need to report it internally I can manage by my own. (d) There isn’t a limit. Answer b) You should report a data breach as soon as you are aware. If you’re not sure what’s happened or whether what you’ve found is a data breach, the rule is: If in doubt, report – it’s better to over-report than under-report., NEC keeps a record of all actual and potential breaches.
  • 32. XI. QUIZ © NEC Corporation 2019 6) I sent an internal mail with personal data attached to an incorrect internal recipient. Which are following steps? (a) Nothing, that’s is not a data breach. It’s internal and I can handle the situation by my own. (b)Report it immediately upon discovery to incident@emea.nec.com. (c) I recall the message, data breach is closed. (d) all of the above. Answer b) Report it immediately upon discovery to incident@emea.nec.com
  • 33. XI. QUIZ © NEC Corporation 2019 7) If you have a general question about data protection, where should you go for more information? Choose as many options you consider. (a)Always go to your Supervisory Authority. (b)Check out the Data Protection EMEA intranet site. (c) Contact your Privacy Collaborator in your NEC CA. (d) Contact the Data Protection Officer(s). Answer: b, c and d) You can, of course, speak to your Supervisory Authority or anyone else, but our Data Protection EMEA intranet sire is a good place to look. If you can’t find an answer there, contact the Data Protection Collaborators in your CAs or to your Data Protection Officer (s)
  • 34. XI. QUIZ © NEC Corporation 2019 8) Staff management and payroll administration; access to/consultation of a contacts database containing personal data are examples of (a) Data Controller/Responsible Party/Operator; (b) Data Processor/Operator/party that process personal data under Operator’ instructions; (c) Processing of personal data; (d) None of the above; Answer : c) Processing of personal data;
  • 35. XI. QUIZ © NEC Corporation 2019 9) Be clear from the start about what are the purposes for processing is part of: (a) Lawfulness, fairness and transparency principle; (b) Data minimisation principle; (c) Purpose limitation principle; (d) Security principle. Answer : c) Purpose limitation.
  • 36. XI. QUIZ © NEC Corporation 2019 10) NEC collects and process personal data of its customers, employees, suppliers and any third parties. NEC is committed to respect the privacy rights and freedoms of the individuals whose personal data is collected and processed by complying with all applicable data protection laws (a)True (b)False Answer a)
  • 37. 37 Thank you very much for your collaboration