- Dedication
- Overview and Contents
- Preface: Implementing GDPR
- Establishing Plans, Policies and Procedures
- Description of the PD Processing Environment
- GDPR Data Protection Principles and Requirements
- Commitment of the Company
- General PD Protection Policy, Strategic Guidelines and Applicability
- Specific PD Protection Operational Procedures and Practices
- Collecting Personal Data
- Description of the PD Collection Environment
- GDPR PD Collection Requirements
- General PD Collection Strategic Guidelines
- Specific PD Collection Operational Procedures and Practices
- Using Personal Data
- Description of the PD Usage Environment
- GDPR PD Usage Requirements
- General PD Usage Strategic Guidelines
- Specific PD Usage Operational Procedures and Practices
- Storing Personal Data
- Description of the PD Storage Environment
- GDPR PD Storage Requirements
- General PD Storage Strategic Guidelines
- Specific PD Storage Operational Procedures and Practices
- Maintaining Personal Data
- Description of the PD Maintenance Environment
- GDPR PD Maintenance Requirements
- General PD Maintenance Strategic Guidelines (SG)
- Specific PD Maintenance Operational Procedures and Practices
- Sharing Personal Data
- Description of the PD Sharing Environment
- GDPR PD Sharing Requirements
- General PD Sharing Strategic Guidelines (SG)
- Specific PD Sharing Operational Procedures and Practices
- Retaining Personal Data
- Description of the PD Retaining Environment
- GDPR PD Retaining Requirements
- General PD Retention Strategic Guidelines (SG)
- Specific PD Retention Operational Procedures and Practices
- Securing Personal Data
- Description of the PD Security Environment
- GDPR PD Security Requirements
- General PD Security Strategic Guidelines (SG)
- Specific PD Security Operational Procedures and Practices
- Satisfying Data Subjects’ Requests
- GDPR requirements on satisfaction of requests of Data Subjects
- General Data Subjects Rights Strategic Guidelines (SG)
- Managing PD Breaches
- GDPR PD Breach Requirements
- General PD Breach Strategic Guidelines (SG)
- Appendix 1: How to create Data Protection Policies
- Appendix 2: Consent Guidelines
- Bibliography
- Disclaimer