preview

What Is Gpr Regulations & What It Means For Cyber Security

Satisfactory Essays

Understanding GDPR Regulations & What it Means for Cyber Security
On May 25, 2018 the European Union will begin enforcing the new General Data Protection Regulations (GDPR) that will create one data protection standard throughout the EU. These regulations were designed to create one standard for personal data privacy and to simplify the enforcement of data privacy laws throughout all the EU countries. What some organizations were surprised to learn, is that these regulations go beyond the physical confines of the EU and apply to any organization that collects or holds information on EU citizens. Fines for non-compliance are steep. There is a sliding scale of fines, depending on the offense, that reach a maximum of 4% of global turnover or …show more content…

• Right to be forgotten: Covered data subjects have the right to have the organization in control of his/her personal data erase and stop using that data if they withdraw consent. When this happens, the organization’s data controller must weigh the subjects’ rights vs. “the public interest in the availability of the data.”
As you can see, GDPR creates a lot of new regulations surrounding data use. This is a short list of examples, and includes rules for data portability, legitimate use of data for direct marketing, data profiling and more.
How does this effect an organization’s cyber security approach?
While every company should always be considering the safety and security of information, GDPR is looking to ensure that organizations are taking data security seriously and incorporating it into the initial design of any new systems and securing all existing systems. Many large companies collecting data on EU citizens will be required to hire Data Protection Officers to ensure compliance and reporting.
Similar to US HIPAA requirements, GDPR calls for organizations to limit personal data access to only those users that requires the specific data to perform their job. Organizations must also prove that appropriate network safeguards are in place to protect the privacy of the data. With the prominence of BYOD and mobile devices, combined with IoT devices moving into the mainstream, endpoint devices represent a large risk for GDPR compliance. Malware can be

Get Access