GDPR-timeline
.full-width-58dc53e84a7ab { min-height:100px; padding:10px 0 10px; margin-bottom:0px; background-color:#494948; } #background-layer--58dc53e84a7ab { background-position:left top; background-repeat:repeat; ; } .full-width-58dc53e84a7ab .mk-fancy-title.pattern-style span, .full-width-58dc53e84a7ab .mk-blog-view-all { background-color: #494948 !important; }
#mk-icon-box-58dc53e84ce94 .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84ce94 .mk-box-icon-2-icon:hover{ }

1. Awareness

The GDPR will have serious impact and all stakeholders and decision makers must be made aware to set things in motion.

#mk-icon-box-58dc53e84d5cb .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84d5cb .mk-box-icon-2-icon:hover{ }

2. Data Stream Map

Start building a Data Stream Map and document all (personal) data processed within your Data Infrastructure.

#mk-icon-box-58dc53e84dbff .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84dbff .mk-box-icon-2-icon:hover{ }

3. Communication

Use your Data Stream Map to update your privacy statement with all data processing and explain the legitimate basis for the data processing.

.full-width-58dc53e84c89a { min-height:100px; padding:30px 0 0px; margin-bottom:0px; } #background-layer--58dc53e84c89a { background-position:left top; background-repeat:repeat; ; }
#mk-icon-box-58dc53e84e6ee .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84e6ee .mk-box-icon-2-icon:hover{ }

4. Rights of the subject

Review if your organization is equipped to handle the rights of the subject. Start early, they propose a serious challenge for nearly all tools, systems and non-digital (dark) data.

#mk-icon-box-58dc53e84ede1 .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84ede1 .mk-box-icon-2-icon:hover{ }

5. Legal basis

Assess all personal data processing and document the legal basis for every operation; legal obligation, legitimate interest, explicit consent, etc.

#mk-icon-box-58dc53e84f403 .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84f403 .mk-box-icon-2-icon:hover{ }

6. Consent

Review and document the ways you ask, receive and registrate consent. As a result you should be able to demonstrate that the data subject has given consent.

.full-width-58dc53e84e1ec { min-height:100px; padding:10px 0 0px; margin-bottom:0px; } #background-layer--58dc53e84e1ec { background-position:left top; background-repeat:repeat; ; }
#mk-icon-box-58dc53e84fed8 .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e84fed8 .mk-box-icon-2-icon:hover{ }

7. Data Breaches

Make sure the processes and responsibilities are clear and everything  is in place to swiftly and correctly mitigate data breaches.

#mk-icon-box-58dc53e850528 .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e850528 .mk-box-icon-2-icon:hover{ }

8. Privacy by design and PIA’s

Get familiar with the principles of data protection by design, by default, and privacy impact assessments.

#mk-icon-box-58dc53e850baa .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e850baa .mk-box-icon-2-icon:hover{ }

9. Data Protection Officer

Appoint a Data Protection Officer, who will be responsible to uphold the GDPR within the organization and also acts a representative towards the authorities.

.full-width-58dc53e84f9ec { min-height:100px; padding:10px 0 0px; margin-bottom:0px; } #background-layer--58dc53e84f9ec { background-position:left top; background-repeat:repeat; ; }
#mk-icon-box-58dc53e85173f .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e85173f .mk-box-icon-2-icon:hover{ }

10. International

When your organization is internationally active you need to determine the leading authority.

#mk-icon-box-58dc53e851d4d .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e851d4d .mk-box-icon-2-icon:hover{ }

11. Contracts

Review all contracts and data processing agreements your organisation has with it’s processors and sub-processors and what amendments are required.

#mk-icon-box-58dc53e8523ea .mk-box-icon-2-icon { font-size:32px; color:#ffffff;background-color:#e73029; } #mk-icon-box-58dc53e8523ea .mk-box-icon-2-icon:hover{ }

12. Rule Book

Data governance is not a one time exercise. All eleven previous steps must be a continuous part of your data operations and the requirements, should be gathered in a Data Governance Rule book.

.full-width-58dc53e8511aa { min-height:100px; padding:10px 0 10px; margin-bottom:10px; } #background-layer--58dc53e8511aa { background-position:left top; background-repeat:repeat; ; }

Seems interesting, right? Don’t bother to contact us.

.button-58dc53e85473e { margin-bottom: 15px; margin-top: 0px; min-width: 0px !important; }
.button-58dc53e8550cf { margin-bottom: 15px; margin-top: 0px; min-width: 0px !important; }
.full-width-58dc53e852c7e { min-height:100px; padding:10px 0 10px; margin-bottom:0px; background-color:#a1d0d3; } #background-layer--58dc53e852c7e { background-position:left top; background-repeat:repeat; ; } .full-width-58dc53e852c7e .mk-fancy-title.pattern-style span, .full-width-58dc53e852c7e .mk-blog-view-all { background-color: #a1d0d3 !important; }
Contact Us

Want to turn data into reliable customer insights? Send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt