About the Author

John Kyriazoglou

Read More
Share this book

GDPR and Travel Industry

no ratings

Buy this eBook or start a free 30-day trial

Bookboon Premium subscription gives access to 800+ educational ebooks

This guide contains a 7-step methodology and a set of specific measures and controls to support senior managers of travel and tourist companies in protecting the personal data processed and complying with the privacy compliance requirements of the new European General Data Protection Regulation (GDPR).  

About the author

John Kyriazoglou obtained a B.A. (Honours) from the University of Toronto, Canada, also earning a Scholastic award for Academic Excellence in Computer Science. John has worked in Canada, England, Greece and other countries for over 35 years, as a Senior IT manager, Managing Director, IT auditor and consultant, in a variety of clients and projects, in both the private and the public sectors. He has published several books and articles in professional publications, has served in numerous scientific committees and is a member of several professional and cultural associations.

He is currently the Editor-in-Chief for the Internal Controls Magazine (U.S.A.).

John can be contacted at: jkyriazoglou@hotmail.com.

Learn more about John by clicking on the following links:

SSRN at: http://ssrn.com/author=1315434

LinkedIn Profile: http://www.linkedin.com/pub/john-kyriazoglou/0/9b/919

Facebook: https://www.facebook.com/john.kyriazoglou.9

Twitter: https://twitter.com/jkyriazoglou

Slideshare: http://www.slideshare.net/jkyriazoglou

  • Preface: GDPR, Travel and Tourism
  1. Create Personal Data Inventory 
  2. Manage User Consent 
  3. Keep Users Informed 
  4. Upgrade Information Technology and Systems 
  5. Satisfy Personal Data Requests 
  6. Implement Data Protection Policies 
  7. Appoint Controller, Processor and DPO 
  • Appendix: Plans, Policies and Strategies 
  • Appendix 1: Travel and GDPR Definitions 
  • Appendix 2: Data Protection Team Improvement Plan 
  • Appendix 3: Technical and Organizational Data Protection Measures 
  • Appendix 4: Controller – Processor Agreement 
  • Appendix 5: Personal Data Breach Incident Response Plan 
  • Appendix 6: Data Protection Technology Strategy 
  • Appendix 7: IT Security Strategy 
  • Appendix 8: Data Protection Policy 
  • Bibliography 
  • About the author 

Similar Books