GDPR Is Now 1-Year Old

GDPR came into force a year ago and it is a good time for organisations to carry out a review of their compliance with the new regulation.

Clayden Law is an Oxford law company which has completed a thorough review of GDPR breaches and sanctions. Although GDPR enforcement actionhas been relatively low so far, this is not likely to continue and national watchdogs are using new tools to monitor the situation.

The UK had over 14 thousand breaches notified in the year between May 2018 and 2019 making the UK one of the top three countries notifying breaches. Some of the lowest to notify were Iceland, Cyprus and Liechtenstein.

The highest GDPR fine so far has been the €50 million fine imposed by the French data authority, CNIL, in relation to Google’s use of personal data for the purposes of personalising advertisements. 

Despite the increase in the number of disclosed breaches and taking into account the maximum fines regulators now have the power to impose, the number of fines and their value (excluding the €50 million fine against Google) have been low so far, lower than many expected but this is probably because regulators in some countries are still building their monitoring techniques.

Does your company have everything in place to meet the GDPR’s requirements when a data breach happens? 

With new guidance from the regulators and enforcement action to date, it’s a good time for organisations to audit their GDPR compliance. 

Contact Cyber Security Intelligence for a free assessment and training recommendations.

Under the GDPR you must be able to demonstrate your compliance and detailed records may help you mitigate enforcement action.

GDPR Training
All business and organisations need a refresher GDPR training.  Data protection experts emphasise that staff training is an essential part of GDPR compliance. If you were to experience a data breach, having a documented staff training may be used as evidence to prove that you had taken the appropriate steps to prevent a data breach.

For expert legal  advice on GDPR  please contact: Clayden Law  

Clayden Law

You Might Also Read:

Clayden Law's Guide TO GDPR

Now Is Definitely Time To Check You Are GDPR Compliant:

 
« US Attackers Target Iran's Defense Networks
Malboard Exploit Mimics A User’s Keystrokes »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Emerging Payments Association (EPA)

Emerging Payments Association (EPA)

The Emerging Payments Association (EPA) is a commercial membership association of payments industry influencers.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Cyan AG

Cyan AG

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.