University Name: GDPR Risk-Based Approach Analysis Report

Verified

Added on  2020/05/16

|3
|677
|47
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RISK BASED APPROACH TO GENERAL DATA REGULATION 1
RISK-BASED APPROACH TO GENERAL DATA
PROTECTION REGULATION
By (Name)
Course
Professor's name
University name
City, State
Date of submission
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RISK BASED APPROACH TO GENERAL DATA REGULATION 2
General Risk Protection Regulation is considered as the most crucial inventory as long as
personal privacy is concerned. Risk management entails all the practices that tend to protect the
financial and capital status of an organization by countering the possible threats faced in the
project. It's essential as it analyses the future risks that are expectant and precautionary steps
taken to avoid any damages in future. It is crystal clear that before identifying the likelihood that
a project may face, the magnitude of the risk should also be analyzed to some levels. Different
survey techniques are used to measure the scope of a risk occurring.( Maldoff 2017)Risk
management is crucial as it enhances the reliability of the results, it improves better
communication concerning any risk casualties and finally stabilizing an organization to
understand any risks involved in activity thus confidence is installed.
Data breaches. Research as evident in the project scenario. An employer may be corrupted to an
extend of compromising the project's data be it through blackmails or being neglect. Stuff who
has worked with the previous programme might be compromised to leak the data related to the
project. A per the case study the technology is new, but there is some staff who knows a previous
programme, this gives way to the risk occurring. With the available information concerning the
technology, I can conclude that the risk will result in high operational costs and hacking cases.
Various management practices of risk management have been put in place. Analysis of the
identified risk is crucial before treatment of that particular risk as it has to be evaluated keenly to
know the nest step be it treatment or other actions. Personally, identifiable information should be
kept secured to avoid this. ( Chassang 2017). Expressed how GDPR does this. The content
should be personalized to the management using security means such as passwords which will
deter unauthorized access to the Personally identifiable information. Data breaching thus leading
to rights and freedom risk is countered within 72 hours by a breach notification. This is done as
quickly as possible by the data processors.
Continuous and repetitive errors. This often occurs when invalid recipients are sent messages.
Sending an email or fax message to wrong people is a significant concern towards the loss of
data essential to the personally identifiable information. The loosing of some of the
organization's equipment such as hard disks and memory papers leads to the loss of PII. Thus
personal information leaks to unauthorized personnel
The remedy towards this is to accurately identify the place where you store your data. ( Albrecht
2016) Stated that risk management is crucial in restoring the reputation of an organization. It's
vital to know you access your data and come up with objective plans for dealing with data. This
will help in controlling the availability of your personally identifiable information. Enhancing
Document Page
RISK BASED APPROACH TO GENERAL DATA REGULATION 3
classes where the staff is professionally trained to manage data is beneficial management
practice.
Bibliography
Maldoff, G., 2017. The risk-based approach in the GDPR: interpretation and implications. IAPP
https://iapp. org/media/pdf/resource_center/GDPR_Study_Maldoff. Pdf. Accessed, 12.
Kushner, C., Cate, F.H., Millard, C., Svantesson, D.J.B. and Lynskey, O., 2015. Risk
management in data protection. Albrecht, J.P., 2016.
How the GDPR Will Change the World. Eur. Data Prot. L. Rev., 2, p.287.
Chassang, G., 2017. The impact of the EU general data protection regulation on scientific
research. ecancermedicalscience, 11.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]