GDPR Is Now 1-Year Old

GDPR came into force a year ago and it is a good time for organisations to carry out a review of their compliance with the new regulation.

Clayden Law is an Oxford law company which has completed a thorough review of GDPR breaches and sanctions. Although GDPR enforcement actionhas been relatively low so far, this is not likely to continue and national watchdogs are using new tools to monitor the situation.

The UK had over 14 thousand breaches notified in the year between May 2018 and 2019 making the UK one of the top three countries notifying breaches. Some of the lowest to notify were Iceland, Cyprus and Liechtenstein.

The highest GDPR fine so far has been the €50 million fine imposed by the French data authority, CNIL, in relation to Google’s use of personal data for the purposes of personalising advertisements. 

Despite the increase in the number of disclosed breaches and taking into account the maximum fines regulators now have the power to impose, the number of fines and their value (excluding the €50 million fine against Google) have been low so far, lower than many expected but this is probably because regulators in some countries are still building their monitoring techniques.

Does your company have everything in place to meet the GDPR’s requirements when a data breach happens? 

With new guidance from the regulators and enforcement action to date, it’s a good time for organisations to audit their GDPR compliance. 

Contact Cyber Security Intelligence for a free assessment and training recommendations.

Under the GDPR you must be able to demonstrate your compliance and detailed records may help you mitigate enforcement action.

GDPR Training
All business and organisations need a refresher GDPR training.  Data protection experts emphasise that staff training is an essential part of GDPR compliance. If you were to experience a data breach, having a documented staff training may be used as evidence to prove that you had taken the appropriate steps to prevent a data breach.

For expert legal  advice on GDPR  please contact: Clayden Law  

Clayden Law

You Might Also Read:

Clayden Law's Guide TO GDPR

Now Is Definitely Time To Check You Are GDPR Compliant:

 
« US Attackers Target Iran's Defense Networks
Malboard Exploit Mimics A User’s Keystrokes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.