preview

Cyber Security Case Study

Decent Essays

SEO: GDPR, cyber security
Understanding GDPR Regulations & What it Means for Cyber Security
On May 25, 2018 the European Union will begin enforcing the new General Data Protection Regulations (GDPR) that will create one data protection standard throughout the EU. These regulations were designed to create a unified standard for personal data privacy and to simplify the enforcement of data privacy laws throughout all EU countries. What some organizations are surprised to learn, is that these regulations go beyond the physical confines of the EU and apply to any organization that collects or holds information on EU citizens. This means that companies throughout the world need to understand and ensure compliance with GDRP guidelines if they …show more content…

Organizations in control of the data must provide a free electronic copy of the data.
• Right to be forgotten: Covered data subjects have the right to have the organization in control of his/her personal data erase and stop using that data if they withdraw consent. When this happens, the organization’s data controller must weigh the subjects’ rights vs. “the public interest in the availability of the data.”
As you can see, GDPR creates a lot of new regulations surrounding data use. This is a short list of examples, but GDPR also includes rules for data portability, legitimate use of data for direct marketing, data profiling and more.
How does this impact an organization’s cyber security approach?
While every company should always be considering the safety and security of information, GDPR is looking to ensure that organizations are taking data security seriously and incorporating it into the initial design of any new systems, as well as securing all existing systems. Many large companies collecting data on EU citizens will be required to employ a Data Protection Officer to ensure compliance and proper reporting.
Similar to US HIPAA requirements, GDPR calls for organizations to limit personal data access to only those users that requires the specific data to perform his/her job. Organizations must also prove that appropriate network safeguards are in place to protect the privacy of the data. With the

Get Access