(a) the processing is carried out by a public authority or body, except for courts acting in their judicial capacity; (b) the core activities of the controller or the processor consist of processing operations which, by virtue of their nature, their scope and/or their purposes, require regular and systematic monitoring of data subjects on a large scale; or EU General Data Protection Regulation Official Journal of the European Union 4 May 2016 Page 30 of 68
(c) the core activities of the controller or the processor consist of processing on a large scale of special categories of data pursuant to Article 9 and personal data relating to criminal convictions and offences referred to in Article 10.
In absence of those conditions, I suppose that the appointment of a DPO is NOT obligatory?
2. If we do need a consent, how should that be obtained? What must it contain?
Answers:
1. Usually I advise against using employees consent as a basis for processing their personal data. It was considered and it is still considered that consent from employees in not a genuinely “freely given” since there is an imbalance between the employer and the employee and the latter tends to agree to whatever the employer wants. Also, consider that consent can be withdrawn at any time and while doing so the employee would basically make the processing activity impossible for the company.
Regarding keeping copies of documents such as drivers license or other similar documents I would use as the legal basis for processing the legitimate interest since is first of all the interest of the company in some cases if an employee has a diver`s license in certain cases for example an employee who would be driving a company car.
2. In terms of consent the EU GDPR is stricter then the Directive. Consent has to be freely given, specific, informed and unambiguous indication of the individual’s wishes. The controller must keep records so it can demonstrate that consent has been given by the relevant data subject.
Here are some conditions regarding the consent that you should consider:
1. Plain language - A request for consent must be in an intelligible and accessible form in clear and plain language and in accordance with the Directive on unfair terms in consumer contracts. Separate - where the request for consent is part of a written form, it must be clearly distinguishable from other matters.
2. Affirmative action - The consent must consist of a clear affirmative action. Inactivity or silence is not enough and the use of “pre-ticked boxes” is not permitted. However, consent through a course of conduct remains valid.
3. Consent to all purposes - If the relevant processing has multiple purposes, consent must be given for all of them. The meaning of this provision is not clear. At one extreme it might prevent mixed justifications for different activities. For example, it would not be possible to rely on performance of a contract when providing services to an individual and obtain a separate ancillary consent for direct marketing. You would need a (valid) consent for them all.
4. Unbundled consent - You cannot “bundle consent”. Where different processing activities are taking place, consent is presumed not valid unless the individual can consent to them separately. Not tied to contract - Consent is presumed not valid if it is a condition of performance of a contract.
5. Withdrawable - The individual can withdraw consent at any time and must be told of that right prior to giving consent. It should be as easy to withdraw consent as it is to give it.
The changes you've mentioned cannot be considered as versions of software. If you are changing the parameters of the production process or the part you are producing, you only need to document those changes so you can ensure traceability to the parts being produced under this conditions. These information are usually already present in the working order, drawings or some other record.
Difference between continual and continuous improvement
Answer:
“Continuous improvement” and “Continual improvement” are often used interchangeably and shouldn't be used in that manner. Continuous indicates duration without interruption. Continual indicates d uration that continues over a long period of time, but with intervals of interruption.
Continuous improvement means that organizations are in a constant state of driving process improvements. This involves a focus on linear and incremental improvement within existing processes. Continual improvements means that organizations go through process improvements in stages and these stages are separated by a period of time. This period of time might be necessary to understand if the improvements did actually help the bottom line. In some cases, the results might take a while to come to realization.
Continual and continuous improvement have nothing t o do with how the organization achieves the improvements but rather with whether the improvement is linear or not.
Scope definition
This is how i did it:
I made a list of items that the company uses, like routers firewall switches etc.
I made a list of software that they use that inputs and outputs sensitive information.
And I made a list of external parties that inputs and outputs sensitive information.
My questions are:
1 - Do i need to descibe which department in the company makes use of this software?
Answer: First it is important to note that an ISO 27001 scope is defined in terms of locations, organizational units and/or information the ISMS is supposed to protect. Considering that, your first two lists refer to assets that are included in your scope, and your last list presents elements that interface with your ISMS. These are important things, but they do not define your scope, so it is necessary for you to define at least the department in the company that uses these software and the i nformation that is handled.
2 - Do I have to mention all external parties that are out of scope in the chapter out of scope?
Answer: Following the first answer, external parties do not need to be included in the scope statement, either if they interface with the ISMS or not.
3 - Did I miss something in the chapter interfaces?
Answer: Maybe you should consider the identification of the processes that make use of the software you identified and are used by the external parties to input and output information.
1 - Compliance organization structure in accordance to best practice for that comprises 3 pillars of ISO : ISO 27001, ISO 22301 & ISO 20000
Answer: ISO management standards now have a common framework and set of requirements that makes easier to work with them in a integrated manner. Since each organization is unique in its requirements, there is no definitive structure that can be applied to all organizations, but I suggest you to read these article about integrated systems:
2 - Who should be the key members for Governance Risk Compliance committee : ie : Risk Management
a. ISMS Committee
b. BCMS Committee
c. ITSM Committee
Answer: Besides experts in each field you mentioned (i.e, information security, business continuity and information technology) and top management, you should consider personnel from Legal and Financial areas, as w ell as representatives of critical areas of the organization.
3. Who should be the expert within the organization to orchestrate and responsible for establishing and maintaining the security strategy to ensure the information assets. Ensure it is adequately protected; including identifying, developing, implementing and maintaining processes across organization.
Answer: For this role you should consider personnel with high competence (i.e., knowledge and experience) in risk management or information security (generally this person is designated as the CISO - Chief Information Security Officer)
Information about Human resources security in our ISO 27001 Foundations Course can be found on module 2 - The planning phase (units Awareness and Competence) and 6 - Annex A – Control objectives and controls.
Becoming GDPR compliant
Answer:
Where consent has been given under the Data Protection Directive, it will continue to be valid under the Regulation only if it meets the requirements of the Regulation. This may be difficult given the new and stringent requirements for consent. Thus, some businesses should therefore consider approaching their existing customers to obtain a fresh consent that is valid under the Regulation. However, this is likely to be an onerous exercise and in many cases will not lead to a fresh consent.
The ePrivacy Directive imposes additional constraints if you market by telephone, email or fax. For example, you can only send direct marketing to someone by email if:
- they have given you consent; or
- you have an existing relationship with them and fall within the so-called similar products and services exemption.
The ePrivacy Directive currently defines consent by reference to the Data Protection Directive. This will automatically be superseded by a reference to the Regulation from May 2018 onward. In other words, obtaining consent to market by email will become a whole lot harder as well.
So, my advice would be to assess if the consents you got are compliant with the new EU GDPR requirements. If they do you should be fine if they don’t you need to get new compliant consents.
I would strongly advise you against using employees consent as a basis for processing their personal data. It was considered and it is still considered that consent from employees in not a genuinely “freely given” since there is an imbalance between the employer and the employee and the latter tends to agree to whatever the employer wants. Also, consider that consent can be withdraw n at any time and while doing so the employee would basically make the processing activity impossible for the company.
With regards to employees data you can use contractual obligation as a legal basis for all the activities related to the labor agreement (contract) for example payroll activities.
You can also rely on legitimate interest for activities such as video monitoring, fleet GPS monitoring or monitoring of employees using DLP solutions.
The Article 29 Working Party’s rOpinion 2/2017 (on data processing at work, WP249, 8 June 2017) provides some helpful examples of the likely limits of this legal basis. For example, if an employer deploys a data loss prevention tool to monitor employees’ outgoing emails automatically to prevent unauthorized transmission of proprietary data, in order to rely on legitimate interests it will need to ensure, among other things, that the rules that the system follows to characterize an email as a potential data breach are fully transparent to employees and that employees are warned in advance if the tool recognizes an email that is to be sent as a possible data breach, so as to give the sender the option to cancel this transmission.
Answer: The definition of RTO and RPO for critical systems is generally done by the person responsible for the application (e.g. by the HR Department Head for a HR system, by the Financial Department Head for an accounting system, etc.), considering the inputs of interested parties impacted by a disruption on application operation (e.g., IT staff, organization's users, customers, regulators, etc.), but these must be approved by top management.
2 - Can the RTO and RPO be the same for a system? Which does the business provide? RTO or RPO?
Answer: RTO and RPO are completely different concepts, so they can be the same for a system. The RTO refers to a recovery time to be achieved, while the RPO refers to a point in time on which the system must be recovered with stability (any information in the period shorter than that will be lost or not considered).
For example, if an application has an RTO of 1 day and a RPO of 4 hours, it means that this application can be recovered ( resume normal operation) in one day, but the information from the last 4 hours before the interruption occurred will be lost.