GDPR's Impact In The US And Globally

GDPR enforcement began in May of 2018, but if you are doing business in the US or elsewhere, you may think that it doesn’t apply to your organisation, but that would be mistaken. GDPR affects organisations and businesses worldwide.
 
GDPR stands for the General Data Protection Regulation and over a year after it came into effect still almost 30% of EU businesses are not compliantWhat GDPR means is that citizens of the EU and EEA now have greater control over their personal data. And GDPR gives assurances that their information is being securely protected across Europe and the law explains that non-compliant businesses will be taken to court and heavily fined.
 
According to the GDPR directive, all personal data, that is any information related to a person such as a name, a photo, an email address, bank details, updates on social networking websites, location details, medical information, or a computer IP address must be secure and used legally.
 
There is no distinction between personal data about individuals in their private, public or work roles, the person is the person. Also in a B2B setting, everything is about individuals interacting and sharing information with and about each other. 
The GDPR is a relatively new data privacy law that has been added to a number of other compliance requirements.  These  other Laws include GDPR joins Sarbanes-Oxley (SOX), the Payment Card Industry (PCI) compliance, the Health Insurance Portability and Accountability Act (HIPAA), and the Family Educational Rights and Privacy Act (FERPA) as one more piece of the data and compliance puzzle that we have to solve. 
 
The GDPR itself was written and made law by the EU. This immediately raises the question, what does the GDPR have to do with the United States of America? 
 
There are short, medium, and long answers to this question, and you need all three. Since the application of the EU law is to people within the EU, it probably seems that it doesn’t have immediate application within the US. However, there are a couple of “buts” associated with that short answer. These “buts” constitute the medium and long answers.
 
What If Your Business Collects EU Data?
The law is clear and written in easy to understand language (unlike a lot of other laws). The application of the law is written in the first line of the first Article of the first Chapter: This Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.
 
What they’ve done is to define the law as applying only to “natural persons.” Why this particular term of art? Because they are intentionally creating a law that applies to human beings and not the legal construct of a person. In short, it eliminates the inclusion of corporations.
 
The next thing to define is, what data is included under the law. This is a little less clear.Look at Chapter 1, Article 3, we get the answer: This Regulation applies to the processing of personal data in the context of the activities of an establishment of a controller or a processor in the Union, regardless of whether the processing takes place in the Union or not.
 
Processing and collection are different. If the data is collected within the EU, as opposed to say, when someone from the EU is visiting the US, and they submit information to a non-EU based org, then it’s applicable. However, processing the data after it has been collected, applies regardless of where the processing occurs.
They clarify and expand this further in the second part of Article 3:
 
This Regulation applies to the processing of personal data of data subjects who are in the Union by a controller or processor not established in the Union, where the processing activities are related to:  
  •  the offering of goods or services, irrespective of whether a payment of the data subject is required, to such data subjects in the Union; or
  • the monitoring of their behaviour as far as their behaviour takes place within the Union.
When we take these together, we can say that the law applies to the collection of personal information from people currently residing within the EU. This makes it applicable to US entities. If your organization is collecting information from any people within the EU, then that information falls under all the regulations and laws of the GDPR.
 
Not only do we already have a GDPR-influenced law in effect, but not yet in enforcement  acroos the United States, but there are  several that are being actively brought forward. 
 
The California Privacy and Protection law (CPP)
 
The CPP was passed last year and took effect on January 1, 2020. Since the law was closely modeled on the GDPR, it mirrors a lot of the language. In California however , legislators have gone even further. They have passed the standard definitions within the GDPR of such things as the right to be forgotten, a requirement to opt-in for communication and data collection, the requirement that you publish how the data is being processed and have a mechanism for accessing the data you collect on an individual. They’ve also expanded what constitutes personal information and added things to the definitions that many of us who follow the GDPR expect to become standard: IP address, geolocation, browsing history, search history and more. You also have to provide a straight-up “opt-out” option to the data you collect and to any data you share with third parties. 
 
There is another piece of legislation being brought forward in California that will make the CPP even stronger, including allowing individuals to bring suit against companies that violate the CPP in addition to anything the state itself does.
 
There are at least 10 other states that are currently working on some version of a new privacy compliance law; all of them are modeled on the GDPR. The ones I’ve read about so far include: New York, Hawaii, New Jersey, Maryland, Massachusetts, New Mexico, Rhode Island, Mississippi, and North Dakota.
 
Other countries are now passing GDPR-style laws. If you deal with data from the following countries, you will need to understand how their GDPR-style compliance regime applies: Argentina, Brazil, China, Iceland, Malaysia, Switzerland and Uruguay.
 
The Benefits of GDPR
 
  • Consent Is Paramount: The good thing about GDPR is that it provides maximum importance to consumer consent. Companies cannot use long contracts to sneak in clauses which customers do not read. The companies are expected to get explicit consent about the type of data that they will collect as well as how they will process it. It does not matter whether the data processing happens within the European Union or not. As long as the data belongs to an EU citizen, the General Data Protection Regulation (GDPR) is applicable.
  •  Right to Be Forgotten: Another big achievement of the General Data Protection Regulation (GDPR) is that it provides consumers with the right to be forgotten. This means that even if we agree to share certain data today, we can change our minds later. For instance, if we agreed to share our credit card information with a company today, we can later ask them to delete our credit card information or our entire account. For the first time in the history of data protection laws, the right to be forgotten has been provided to consumers. Digital companies can no longer show backdated contracts signed by customers and hold them hostage.  If the customers want the data to be deleted now, this instruction supersedes the previous ones, and the digital companies are legally bound to delete all data that has been requested by the customer. 
 
Disadvantages of GDPR.
 
  • Has Caused Spam: The biggest problem with the GDPR is that it has caused spam on a massive scale. This is strange given the fact that the purpose of GDPR is to stop spam. Millions of e-mails have been triggered asking users whether they offer their consent for the use of data. Since several companies are sending these e-mails simultaneously, consumers are not able to differentiate the details. Many of them are just blindly clicking on “I agree.” This ends up defeating the whole purpose of the GDPR exercise.
  • Helps Bigger Companies: The GDPR increases a huge amount of complexity in online business. Every business needs to be compliant regardless of their turnover. Compliance is expensive for the small businesses. Larger businesses find it easier and cheaper to comply with these norms. This is the reason why Google and Facebook, which were supposed to be the most affected by the General Data Protection Regulation (GDPR) are actually the biggest beneficiaries. This regulation makes it difficult for smaller companies to compete with the larger ones.
  • Marketing Efforts Redesigned: E-mail marketing has become a lot more expensive and time-consuming. Data lists now have to be General Data Protection Regulation (GDPR) compliant. Also, the information collected on social media websites has to be stored, shared and used carefully. The entire process of digital marketing is likely to take a huge hit.
In summary, the GDPR has some pros and cons. However, the benefits largely accrue to the consumers and the big businesses. The small businesses are the ones who have to bear the cost of this increased regulation.
 
Conclusion
 
There’s no longer any valid reason left to argue that you don’t have to worry about the GDPR. One way or another, it is going to affect how you manage your data. It’s no longer an optional, “we’ll get around to it” issue either. With over 59,000 instances of breaches reported since May of 2018, a large number of those under investigation, and an equally large number of warnings and fines already levied, this is an immediate issue. 
 
The next step within your organisation is  to ensure that you are going through a risk assessment. The general outline of this is defined within the GDPR in Article 35.  If a data protection impact assessment has not yet been done within your organisation, start that now.  
 
Contact Cyber Security Intelligence for more  information about opportunities and security assessmnets  relating to your organisation.
 
Red-Gate:       SuperOffice:     TechRepublic:       Management Study Guide:      Consultancy.uk
 
You Might Also Read: 
 
On Trend: Business Data Protection Laws:
 
GDPR For Dummies
 
 
« The Human Effect On AI Security
Some Expert Predictions For Industrial Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Sectra Communications

Sectra Communications

Sectra successfully develops and sells cutting-edge solutions in the expanding niche segments of medical IT and cybersecurity.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.