{"id":33219,"date":"2021-05-06T09:51:30","date_gmt":"2021-05-06T07:51:30","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=33219"},"modified":"2021-05-06T10:07:20","modified_gmt":"2021-05-06T08:07:20","slug":"optimization-of-personal-data-processing","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-dpo\/optimizacion-del-tratamiento-de-datos-personales\/","title":{"rendered":"Optimization of personal data processing"},"content":{"rendered":"<p>With this idea, we refer to a&nbsp;<strong>fundamental activity <\/strong>in any entity whose purpose is to continually improve the <strong>effectiveness and efficiency in data protection<\/strong>, focusing in this post on those of a personal nature. <\/p>\n\n\n\n<p>Being essential for the admission of any measure of dynamic responsibility, <strong>analyze the activity <\/strong>of the treatment, <strong>divide <\/strong>in its phases, determine the <strong>treatment operations<\/strong> carried out in each of them, know the<strong> particularities of each phase and optimize it<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-1024x683.jpg\" alt=\"optimization of personal data processing\" class=\"wp-image-33223\" width=\"563\" height=\"375\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-1024x683.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-300x200.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-768x513.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-1536x1025.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-2048x1367.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-247x165.jpg 247w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-190x126.jpg 190w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/optimizacio\u0301n-del-tratamiento-de-datos-personales-scaled.jpg 1920w\" sizes=\"(max-width: 563px) 100vw, 563px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Tasks to do<\/h2>\n\n\n\n<p>For the <strong>optimization of personal data processing<\/strong>, a series of activities must be carried out, which in some way will be carried out in parallel:<\/p>\n\n\n\n<p>\u2219&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>TREATMENT ANALYSIS:&nbsp;<\/strong>The person responsible must<strong> review treatment<\/strong> which aims to be carried out extensively, not just considering the treatment as a black box.<\/p>\n\n\n\n<p>Therefore, it will be necessary<strong> identify <\/strong>within it, those <strong>particular operations<\/strong> that are carried out and <strong>relationship between them<\/strong>. These operations may form part of a treatment, and be of interest for data protection, since they are defined in a non-exhaustive manner, in the <strong>article 4.2 of the General Data Protection Regulation.<\/strong><\/p>\n\n\n\n<p>Treatment activities <strong>are organized into phases that implement operations<\/strong>. However, there is the possibility that in a processing, there may be phases that do not process personal data so that, in principle, these phases would be transparent from a security point of view.<\/p>\n\n\n\n<p><strong>The implementation of operations in each phase <\/strong>in which the treatment is structured can be carried out with organizational measures and\/or technical elements, inserted through<strong> developed components<\/strong> for that treatment or through <strong>adaptations of ad-hoc developments<\/strong> of other treatments.&nbsp;<\/p>\n\n\n\n<p>Therefore, it will be unavoidable to critically review each phase and its objective to implement one of the fundamental principles of data protection and security, the <strong>\u201c<em>data minimization principle<\/em>\u201d.<\/strong><\/p>\n\n\n\n<p>\u2219&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>USE CASES<\/strong>: We must keep in mind that, just as we can find simple and linear treatments, in which the default adjustment options are very limited, we must also<strong> we can find complex treatments<\/strong> that can provide different functionalities to adapt to users of different profiles with specific needs. <\/p>\n\n\n\n<p>Therefore, the configuration of the service can be subject to different circumstances: <strong>normal or Premium services, adaptation to a minor, adult or senior public...<\/strong><\/p>\n\n\n\n<p>In this sense, by virtue of the <strong>type of service <\/strong>that the user requires or that the person responsible intends to offer, it will be necessary to collect and process both personal information and information that is not personal. <\/p>\n\n\n\n<p>Likewise, it should be said that, in no case can it be<strong> deny access to a service<\/strong> simply because the user has opted for a restrictive setting in relation to the amount of data processed or the extent of the processing.<\/p>\n\n\n\n<p>\u2219&nbsp;&nbsp;&nbsp;&nbsp;<strong>RELATIONSHIPS BETWEEN TREATMENTS:<\/strong>&nbsp;In relation to this aspect, in an entity there may be <strong>various treatments <\/strong>with access to the same data sets and make use of common data collection, processing or communication services. <\/p>\n\n\n\n<p>This can either be produced by components that implement <strong>shared operations<\/strong> between treatments that in many cases are inherited; or by the implementation of apps on mobile systems.<\/p>\n\n\n\n<p>Therefore, the person responsible must<strong> examine each treatment <\/strong>within the framework of the corresponding organization to recognize the adjustment needs on the common services applicable to the different treatments: <strong>determine the minimum data<\/strong> necessary for each treatment, regardless of those available, perform a <strong>logical and\/or physical separation of personal data <\/strong>used in each treatment or manage access rights according to each treatment, among others.<\/p>\n\n\n\n<p>\u2219&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>TREATMENT ADAPTATION<\/strong>: Like the previous activities, it is equally important to mention the <strong>study of the stages of treatment<\/strong>, for each of the use cases defined by the person responsible, and determine the<strong> need for phase<\/strong>, in order to be able to deduce whether it would be avoidable from the point of view of the processing of personal data, the applicable minimization, the conservation period during which it is necessary to retain personal data, as well as other aspects of equal magnitude.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does studying a Master in Data Protection benefit?<\/strong><\/h2>\n\n\n\n<p>To carry out this purpose, the new approach proposed by the<strong> General Data Protection Regulation,<\/strong> proposes to study the entire life cycle of a data:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/kKKfl5x9y2ay-txZK8ddcg-Bqlm9HBHytBTSntVEOoKZpVtN6N6uiFWqG0P08Ce18thazHFjJxirLz-dUTje2fohf4hBorfUB2apLnljg4htpQKxJy2Ht3W8xW8DP6QNb9O2VOUq9mdkeaqC-Q\" alt=\"\" title=\"\"><\/figure>\n\n\n\n<p>This approach further ensures that <strong>Personal data will begin to be studied and protected from its initial phase<\/strong>, beginning to study not only the data, but also its different treatments, which is done through a risk analysis.<\/p>\n\n\n\n<p>The study of<strong> data life cycle <\/strong>It is not easy, studying a<a href=\"https:\/\/eiposgrados.com\/eng\/master-direccion-compliance-y-proteccion-de-datos\/\" class=\"rank-math-link\"> Master in Data Protection<\/a>, will give you the <strong>necessary knowledge<\/strong> to understand each of the phases and thus guarantee that the proposed security measures cover the data from capture\/creation to its destruction or blocking.<\/p>","protected":false},"excerpt":{"rendered":"<p>We tell you about the activities necessary to optimize the processing of personal data, a very important topic today. Check it out! <\/p>","protected":false},"author":60,"featured_media":33223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[368,330],"tags":[],"class_list":["post-33219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","category-blog-dpo"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/33219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=33219"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/33219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/33223"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=33219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=33219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=33219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}