6
GDPR Information Sheet GDPR Understand the impact on your business Discover how we can help you. [email protected] www.wanstor.com 0333 123 0360 Call us on: Email us at: Visit us at: Page 1 27001 ISO CERTIFIED INFORMATION SECURITY MANAGEMENT

GDPR - Wanstor IT Services · PDF filetemplates and consultants to help you capture data for GDPR and other regulatory ... data use, consent activities ... modify, delete, transfer

Embed Size (px)

Citation preview

GDPRInformation Sheet

GDPRUnderstand the impact on your business

Discover how we can help you.

[email protected] www.wanstor.com0333 123 0360Call us on: Email us at: Visit us at:

Page 1

27001ISO

CERTIFIED

INFORMATION SECURITYMANAGEMENT

Finally, the same user might want to copy it to a USB stick, at which point the system can block it. Wanstor provides a range of interfaces and dashboards to build polices to discover and protect the information which is subject to GDPR.

Wanstor can also provide your business with templates and consultants to help you capture data for GDPR and other regulatory compliance measures including:

Data Intelligent Policy Enforcement

Social network and cloud collaboration: Inbound threat protection Inbound compliance violation protection Outbound data leak protection Adaptive Security

PII & PCI: National Insurance and ID numbers IP addresses Credit card numbers Social security numbers International Bank Account Number (IBAN)

Editable Compliance Dictionaries: Personally Identifiable Information (PII) Health Insurance Portability and Accountability Act (HIPAA) Gramm-Leach-Bliley Act (GLBA) Securities and Equities Commission (SEC) Sarbanes Oxley (SOX)

Wanstor’s GDPR solutions are all designed to protect your business assets. Whenever we undertake a data storage, management or retrieval project our customers data security is our number 1 concern. We can help your business protect information storage and outlet points, personal data from losses or leaks through accidents, stop malicious insiders and help to prevent external attacks. Wanstor’s data security solutions are all applied in real time and are fully GDPR compliant across automated redaction, encryption, blocking, moving or deletion of data.

Security

The EU General Data Protection Regulation (GDPR) is rapidly approaching. It will strengthen EU citizens’ digital rights and simplify protection rules across the EU, wherever a business is located or the different types of data processed. Businesses of all sizes will be required to manage their customers, suppliers and partners data at a different level to today. Wanstor can help your business to discover where data is stored, detect when it’s shared, understand its regulatory context and apply relevant compliance and security measures.

Complying with GDPR effectively without costly disruptions to your business is key and will require:

Data VisibilityWanstor can help your business discover personal data distributed and hidden throughout your business, while monitoring information before it leaves through email, web, and social media. Gaining such visibility into your businesses data can be used as part of a privacy audit, assessing how great the problem of control might be, or at a later point in time, as part of a Data Protection Impact Assessment. Our data visibility services and solutions can also help your business with ‘right to be forgotten’ requests and enable the discovery of the information held in unstructured files on endpoints and file servers. The action of deletion can then be carried out automatically or manually.

GDPRInformation Sheet

Discover how we can help you.

[email protected] www.wanstor.com0333 123 0360Call us on: Email us at: Visit us at:

Page 2

27001ISO

CERTIFIED

INFORMATION SECURITYMANAGEMENT

Not all data, access and sharing rights are created equal. Intelligent polices need to be applied consistently across all channels and based on GDPR geography, data type, purpose, and security. Wanstor can provide intelligent data policy enforcement processes which uses both context as well as content in making both inbound and outbound policy decisions. This ensures your business is compliant with GDPR.

The context is the sender and the recipient as well as the communication mechanism, for example email, web or endpoint. A single shared policy creates consistency as well as ease of deployment and use. A document might be sent by corporate email and the policy action would be to encrypt the communication. However the same file might be uploaded to a cloud collaboration site, in which case the action could be to redact the sensitive information.

Whether you are the Data Protection Officer (DPO), compliance manager or IT security professional, you will need complete visibility into reports, policy violations, quarantined data, logs. Wanstor’s GDPR Governance team can help you track and trace data, enable real-time policy enforcement and provide agile data security management to help your business identify loss of personal data, and exposure required for notifications.

Additionally, Wanstor can provide granular tracking of information at a file and a sub-file level to help GDPR to monitor information across the business perimeter to 3rd parties. Information source reports can be used to determine which information has been sent to which 3rd party, so the correct businesses can be contacted in the event of a ‘right to be forgotten’ request by one of your customers.

Governance

GDPRInformation Sheet

Discover how we can help you.

[email protected] www.wanstor.com0333 123 0360Call us on: Email us at: Visit us at:

Page 3

27001ISO

CERTIFIED

INFORMATION SECURITYMANAGEMENT

How Wanstor’s GDPR Assessment Service Works

Wanstor’s Solutions for GDPR ComplianceWanstor has a strong track record of protecting critical information for businesses across the UK. Businesses across various sectors and all sizes rely on Wanstor to protect critical information. We offer the following services to help businesses become GDPR compliant by May 2018:

Discover how we can help you.

[email protected] www.wanstor.com0333 123 0360Call us on: Email us at: Visit us at:

Assessments Design

Data Privacy Services

What we provide

GDPR Compliance Assessments Documentation for GDPR related policies Assessment of data subject rights

What we provide

GDPR remediation and implementation plan

Outcome for your business

Discovery and classification of personal data assets and affected systems Identify access risks Background to Privacy by Design

Outcome for your business

GDPR data design policies, business processes and supporting technologies Creation of GDPR reference architecture

Data Security Services

What we provide

Assessments of current security state Identification of security gaps Benchmarking of IT security maturity Identify data and security vulnerabilities

What we provide Security remediation and implementation plan

Outcome for your business

Discovery of personal data assets and affected systems to design security controls

Outcome for your business Creation of security reference architecture Design technical and business security to mitigate risks such as encryption, access control and monitoring

Transformation Operations In Life Management

What we provide Policies, processes and technologies to equip your business for GDPR by May 2018 Automated data subject access requests

What we provide Management of GDPR data governance practices Management of GDPR enterprise compliance programmes including data use, consent activities, data subject requests

What we provide Record personal data access audit trail including data subject rights to access, modify, delete, transfer data Run data processor/controller governance roles including providing processor guidance Track data processing activities Provide audit trails to regulatory authorities Enable data subject access requests Document and manage compliance program - Ongoing monitoring, assessment, evaluation and reporting of GDPR activities

Outcome for your business Implementation plan Skilled staff deployed Training programmes for your staff

Outcome for your business Monitor personal data access Govern roles and identities across the business

Outcome for your business

Respond to and manage any compliance breaches Put in place a CSI plan so your business remains in control of data in the future

What we provide Implementation of privacy enhancing controls such as encryption, tokenisation, and dynamic masking. Implementation of security controls; Access risks and security vulnerabilities

What we provide Managed security practice covering risk assessment, roles and responsibilities, and security effectiveness

What we provide Technical measures to ensure security appropriate to processing risk Document security program: Ongoing monitoring, assessment, evaluation and reporting of security controls and activities

Outcome for your business Skilled staff deployed Improved security processes Implementation plan

Outcome for your business Monitoring of security operations Improved security intelligence - monitor, detect, respond to and mitigate threats Improved data governance Better security incident response and forensics practices

Outcome for your business Respond to and manage breaches Design technical and business security to mitigate risks such as encryption, access control and monitoring

GDPRInformation Sheet

Page 4 & 5

27001ISO

CERTIFIED

INFORMATION SECURITYMANAGEMENT

Assessments Design

Data Privacy Services

What we provide

GDPR Compliance Assessments Documentation for GDPR related policies Assessment of data subject rights

What we provide

GDPR remediation and implementation plan

Outcome for your business

Discovery and classification of personal data assets and affected systems Identify access risks Background to Privacy by Design

Outcome for your business

GDPR data design policies, business processes and supporting technologies Creation of GDPR reference architecture

Data Security Services

What we provide

Assessments of current security state Identification of security gaps Benchmarking of IT security maturity Identify data and security vulnerabilities

What we provide Security remediation and implementation plan

Outcome for your business

Discovery of personal data assets and affected systems to design security controls

Outcome for your business Creation of security reference architecture Design technical and business security to mitigate risks such as encryption, access control and monitoring

Transformation Operations In Life Management

What we provide Policies, processes and technologies to equip your business for GDPR by May 2018 Automated data subject access requests

What we provide Management of GDPR data governance practices Management of GDPR enterprise compliance programmes including data use, consent activities, data subject requests

What we provide Record personal data access audit trail including data subject rights to access, modify, delete, transfer data Run data processor/controller governance roles including providing processor guidance Track data processing activities Provide audit trails to regulatory authorities Enable data subject access requests Document and manage compliance program - Ongoing monitoring, assessment, evaluation and reporting of GDPR activities

Outcome for your business Implementation plan Skilled staff deployed Training programmes for your staff

Outcome for your business Monitor personal data access Govern roles and identities across the business

Outcome for your business

Respond to and manage any compliance breaches Put in place a CSI plan so your business remains in control of data in the future

What we provide Implementation of privacy enhancing controls such as encryption, tokenisation, and dynamic masking. Implementation of security controls; Access risks and security vulnerabilities

What we provide Managed security practice covering risk assessment, roles and responsibilities, and security effectiveness

What we provide Technical measures to ensure security appropriate to processing risk Document security program: Ongoing monitoring, assessment, evaluation and reporting of security controls and activities

Outcome for your business Skilled staff deployed Improved security processes Implementation plan

Outcome for your business Monitoring of security operations Improved security intelligence - monitor, detect, respond to and mitigate threats Improved data governance Better security incident response and forensics practices

Outcome for your business Respond to and manage breaches Design technical and business security to mitigate risks such as encryption, access control and monitoring

For more information about Wanstor’s GDPR services please contact us on 0333 123 0360 or email us at [email protected] and one of our data management experts will give you a call back.

GDPRInformation Sheet

Discover how we can help you.

[email protected] www.wanstor.com0333 123 0360Call us on: Email us at: Visit us at:

Page 6

27001ISO

CERTIFIED

INFORMATION SECURITYMANAGEMENT

About WanstorEstablished in 2002, Wanstor are a trusted IT Services company that supports businesses across a number of industries, throughout the United Kingdom.

We provide our customers with IT infrastructure services and solutions which help CIO’s, IT Directors and their departments to optimise IT strategy, decrease IT costs and reduce IT complexity across their IT and business operations.