 So hi everyone, good morning. So today we should be talking about getting you and your business GDPR ready. So what is GDPR? It simply means JTA data protection regulation. So a lot of businesses store and use data for information, increase revenue, gain competition, advantage. But today we shall be discussing on how you can protect this data. Now what is data protection? Data protection is a process of safeguarding important information from either compromise or corruption or loss. Now data protection increases as the amount of data created and stored continues to grow at unprecedented rates. Now there's a little tolerance to downtime that can make it impossible to assess important information. So why is data protection important? Now consequently a large part of a data protection strategy is ensuring that data can be restored quickly after any corruption or loss. Now protecting data from compromise and ensuring data privacy are other key components of data protection. Why is data protection important to companies? Protecting data is not a choice. It is a legal obligation. You have to employ good data protection practices and thoroughly train your staff members about data protection. And this should be standard conducts for organization which will help them protect them legally in the event of something like a breach. You understand? So why is data protection important to individuals now? It is important to individuals because the information is kept safe and it offers individuals protection wherever they are asked to disclose personal data. So at least the information is kept for explicit purposes. Now what is data processing now? Data processing can be defined very widely. So it has different explanations because it has to do with obtaining and collecting data, recording data, how data operations are being carried out and how the alteration of data. Now who is a data controller or what is a data controller now? This is a person or it could be a company, it could be a firm that determines the purpose for which the personal data is to be processed and the manner in which this personal data is being processed. So that's where data controller is and who is a data processor? He is an entity that possesses the personal data on the data controller's behalf. Now the data processor is usually a third party external to the company. It might be the data controller himself or a separate third party engaged by the data controller. Now we have some principles of data privacy. Data privacy is always an approach taken when creating new technologies and systems. This is when privacy is incorporated into tech and systems by default. It means your product is designed with privacy as a priority along with whatever other purposes the system serves. Now another principle is proactive, not reactive, preventive, not remedial. This approach anticipates and prevents privacy breaches before they happen. Now because privacy has been integrated into the product, security is a priority from the beginning of the design process. So privacy by design protects organization from compromise or loss. Now privacy as the default, this ensures that personal data are automatically protected in any system or business practices. Individuals don't have to protect their own privacy because the system was created already to be secure. So if people want to take step to secure their own data, they can. Privacy embedded into the design. Now by embedding privacy into the design rather than trying to add it on later, the system will run better. So it's advisable you embed. You once you're building the system, it should be integrated. This privacy should be integrated in a holistic and creative way so that this privacy should, you know, does not diminish so that the functionality does not diminish. Now have the full functionality, positive sum, not zero sum. Now data privacy 6 to accommodate all legitimate interest and objectives in the positive sum win-win manner, not through a dated zero sum approach where unnecessary trade-offs are made and trade-offs shouldn't be made to accommodate either privacy or functionality and to end security, life cycle protection. Now this considers security from the start to the finish. So this means that information is secure and protected when it enters a system, it is retained safely. And if there is any compromise or if there is any breach or loss, it is properly destroyed. Visibility and transparency. So these allow, so by allowing users and other involved parties to see how information moves through your system and how the system improves. So accountability, openness, compliance are required for an effective and secure system. So being clear about your system and the level of security we provide, Christ trust and hold your organization accountable. Now, do you need one, data protection officer? Yes, you do because he's an enterprise security and his role is he oversees all the company data protection strategy and its implementation to ensure that the companies has to comply with all GDPR requirements. So this is an example of GDPR of who data protection officer is. So I would like us to tell us what we've learned today and so I'll be expecting your feedback. Alright, so thank you and I guess it was a lovely presentation and I wish you all productive and fantastic day. Thank you.