EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE
Our GDPR training course is aimed at IT Professionals, including Software Development teams, who need to understand the impact of new EU legistlation and how to navigate the software development life cycle under the GDPR
The GDPR’s text contains both explicit and implicit systems’ functional and technical requirements that both affect and influence the SDLC of organizations that plan on rolling out systems into the EU. The impact of the GDPR on the software development begins at the data architecture and data transport layers and progresses well up into the portal and presentation layers.
The underlying key to IT development success is planning for these requirements during the initial SDLC phases; while they may add some complexity during the SDLC initial planning and design phases, the overall development costs will be greatly minimized if considered as early as possible in IT systems’ build process.
Our course will address the following inventory of 16 areas of pertinent GDPR Recitals and Articles that influence the SDLC’s Functional and Technical Planning and Requirements for IT departments. This list will be helpful to general counsels, CIOs and leaders of IT as they compile their system’s requirements for their EU groups:
1.) Implementing data protection in the system and the organization, by design and by default, is a legal requirement:
Recital 78 and Article 25
2.) Data is secured, and integrity and confidentiality are maintained, using technical and organizational means under the management of the controller:
Recital 49 and Articles 5-1(f), 32-1(b-d)
3.) Data encryption shall be used, when possible:
Recitals 83 and Articles 6-4(e), 32-1(a)
4.) Data pseudonymization shall be used, when possible:
Recitals 26, 28, 29, 78 and Articles 6-4(e), 25-1, 32-1(a)
5.) Data shall be anonymized, when possible:
6.) Processing attributes and (the processing) steps shall be provided to the data subject in an easy to understand form at the time of data collection, electronically or in writing:
Recitals 39, 58 and Articles 12-1, 13-2(a-f)
7.) Data subjects shall have the right to access and review the processing of their data at any time:
Recitals 58, 61, 63 and Articles 12, 15-1(a, d)
8.) Disparate data elements that could be considered personal data or considred personal profiling if processed or combined separately or together resulting in illegal activities:
9.) Data regarding a data subject shall be portable to another provider (or perhaps even your competitor):
Recital 68 and Articles 13-2(b), 14-2(c), 20
10.) The data subject shall have a right to a copy of their data in a commonly used format:
11.) The data subject shall have the right to have their data updated, free of charge, if there is an error:
Recitals 59, 65 and Article 16, and, the data subject shall have the right to request this update electronically, Recital 59
12.) The data subject shall have the right to have their data erased without undue delay:
Recitals 59, 65 and Articles 13-2(b), 14-2(b), 17, and, the data subject shall have the right to request this deletion electronically, Recital 59 (Note: There are special exceptions to this right provided in the GDPR.)
13.) The data controller must notify other IT organiazations that hold the data subject’s data that the data subject has requested data erasure:
Recital 66 and Article 19 (Therefore, the IT department must know where all the data subjects’ data is being stored by third parties so that these third parties can be notified of erasure request. Up-to-date internal and external data inventories are critical.)
14.) The data subject shall have the right to object to processing, withdraw consent to processing and opt-out of processing. And the data subject can object to or withdraw their consent is these processing matters electronically:
Recitals 59, 63 and Articles 7-3, 18, 21 (And with technical recommendation from the EU Council: Recital 67)
15.) Data is stored only for the time necessary to meet the objectives of the data subject. Out-of-date personal data shall not be stored. (Part of an Electronic Records Management strategy). And the data subject shall be notified of this time period or its calculation approach at the time of the data capture:
Recitals 39, 45 and Articles 13-2(a), 14-2(a), 25-2
16.) A determination must be made, almost immediately, whether a data breach is likely to have been a “high risk to the rights and freedoms of the natural person” as such a technical environment must be in place to identify, track and assess such breaches:
Recitals 85, 86 (regarding notification obligations), 87 (Note: Many articles, e.g. 33, 34) in the GDPR addressing the reporting obligations to the data subject and the authorities on this matter.
Data protectionData Security
Data encryptionData pseudonymization
Data shall be anonymized
Processing attributesData subjects
Disparate dataData portability
Copying dataUpdating data
Erasing dataObject/Consent and opt-out of processing
Data storageData breach actions
See why people choose JBI
Call our Tech Team : 0800 028 6400 request info
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
Get in touch
0800 028 6400
The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
A leading Financial Services organisation was keen to get several of its teams working consistently in an "Agile" way. Agile is an...
This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which...
Our inspiring and up-to-date courses gain exceptional feedback
"great tips to help reduce build times"
"we got access to exclusive content"
"intensive course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Traditionally Cyber security has been associated mainly with penetrating networks and infrastructure. Now a more subtle level of attack needs...
Back in March 2014, the Angular team dropped a bomb by announcing Angular 2 and everyone started yelling. Instead of an evolutionary step forward,...
MVC The Model View Controller (MVC) architectural pattern has a long history (together with its variants) and has been used in many languages...