amex apple building-office-b cassette chat-collapse chat-uncollapse budicon-checkboxescheck-donecheck-uicom-bell-a-disabled com-bell-a com-check-box com-email-cross com-email-tick com-email com-group-bubble-b com-help-a com-help com-mic-mute com-mic conversationdoc-article doc-compose-a doc-documents-plus doc-documents doc-file-line-a ecommerce-tag-b editorial-brush editorial-compose editorial-trash-l emoticons eye-sightfacebook funnel google-drive google-plus google hamburger hubspot info-with-circle info integrations interface-arrow-left interface-arrow-right interface-bottom interface-box-plus interface-circle-cross interface-circle-minus interface-circle-tick interface-cloud-download interface-cloud-upload interface-cross interface-enlarge interface-fullscreen interface-left interface-logout-a interface-minimize interface-more interface-out-link interface-right interface-search interface-star interface-tick interface-top key location-pin-regular about-me logo-dropbox logo-githublogo-linkedin logo-twitter mastercard media-video-clip media-video-mute media-video music-play music-shuffle-a music-stop-filled network outlook pipedrive play present-media profile-picture setting-gear-a signup-analyze signup-export signup-organize sport-badge-b ecommerce-tag-b thunder time-calendar-a time-clock time-stopwatch user-alt-group user-alt-group2 user-alt-plus user-alt user-favorite-b user-lock-u user-lock user-single-round visa volume-medium volume-mute warning web-browser web-code web-internet web-url yahoo zapier
Gemserv Ltd invites you to its webinar

GemTALK - How to achieve privacy by design and conduct DPIAs

About this webinar

Over the last few months, the GDPR’s focus on Privacy by Design has encouraged the development of various proactive measures – including designing operations to minimise the use of personal data, building-in consent mechanisms into online services, and facilitating user-centric applications and interfaces.

In the second of our new webinar series looking at the information security landscape, we focus on this topic, as requested from our last webinar – How to achieve Privacy by Design and conduct Data Protection Impact Assessments (DPIAs). This aims to unpack how risk-based methods for Privacy by Design can be deployed, and will aim to provide you with a deeper understanding of the following topics:

Privacy by Design: Key Features

  • When to consider Privacy by Design
  • Designing consent mechanisms
  • Tools to enhance data subject rights
  • Key minimisation considerations
  • Deploying privacy enhancing technologies (PETs)

DPIAs: Method and Guidance

  • In what circumstances are DPIAs required?
  • Key aspects of a risk-based DPIA assessment
  • Analysing risks around data flows
  • Considering necessity and proportionality

Ongoing Monitoring

  • How to mitigate privacy risks
  • Prioritising and implementing DPIA recommendations
  • Ongoing review and future assessments


Hosted by

  • Guest speaker
    G
    Ivana Bartoletti Head of Privacy & Data Protection @ Gemserv Limited

    Ivana is the Head of Privacy & Data Protection at Gemserv. She leads on AI ethics & digital rights and is the co-founder of Women Leading in AI Network. She speaks at conferences in the UK and overseas and is a commentator on privacy in the age of big data and algorithms on the BBC and in the Gua...

  • Guest speaker
    G
    Beatriz Ruiz-Beato Data Protection Officer @ NEC Europe

    Beatriz has been a qualified lawyer since 1999, with more than ten years in the legal business. She provides legal advice to different companies mainly focused on Data Privacy and IT & Commercial and Contract Law. Beatriz has broad experience on Data Privacy (CIPP/E), with extensive international...

Gemserv Ltd

We make markets work.

We are an expert provider of professional services enabling the energy market transformation and data revolution. Our vision is to ensure that complex markets work for everyone's benefit.