GDPR

Third Party Assurance gets new baseball bat

This initial investigation was triggered by guidance that was released by the ICO in the UK, that insists that processors must allow audit and inspection rights to their controllers in their contractual terms. In the GDPR , Article 28.3.h states: That contract or other legal act shall stipulate, in particular, that the processor: makes available …

Third Party Assurance gets new baseball bat Read More »

Understanding ISO 27701 – Missing GDPR Controls Part 2

In my previous post, we left the GDPR review at Clause 74. This was quite a deliberate breakpoint, as Clause 75 and 76 take us straight into the meat of the DPIA (Data Protection Impact Assessment). Privacy Impact Assessment The ISO 27701 Standard refers to a Privacy Impact Assessment as a method to determine the …

Understanding ISO 27701 – Missing GDPR Controls Part 2 Read More »

GDPR – One year on, busting the myths and exploring the new realities

Cast your minds back to the beginning of 2018, the General Data Protection Regulation (GDPR) was on the horizon. Depending on your point of view, it promised to give citizens back control over their data or herald the end of some types of businesses focused on dubious uses of personal data. “The new legislation will …

GDPR – One year on, busting the myths and exploring the new realities Read More »

Implementing ISO 27701 – Privacy for ISO 27001

When the GDPR came into force on the 25th May 2018, a number of Articles referred to the creation of certification schemes that could be approved by Authorities, to make it easier for data subjects to understand whether an organisation had appropriate privacy controls. Implementing ISO 27701 looks like the easiest route currently to this …

Implementing ISO 27701 – Privacy for ISO 27001 Read More »

Effective Communications during a Cyber Breach

We can generally gauge the level of preparation and understanding a company has about their own cyber security by the way they respond externally to a cyber incident. There have been some notable examples over the years where cyber security professionals have had to put palm to face on some of the media responses placed …

Effective Communications during a Cyber Breach Read More »