Maintaining GDPR Compliance

Though the much anticipated General Data Protection Regulation implementation date has come and gone, compliance efforts undertaken by security and compliance groups within many global organisations are far from achieved.

In fact, in many cases, the work is just beginning. As a risk-based regulation, the GDPR requires organisations to determine and implement data security best practices. These best practices apply differently depending on the circumstances of specific organisations.

As most organisations have learned by now, the GDPR applies to any organisation that processes the personal data of European Union citizens and residents or provides services to EU residents.

Organisations in any industry or sector, including profit and nonprofit, operating in the EU or selling goods and services to EU residents are in scope for this regulation.

One of the main goals of the GDPR is to address the lack of accountability seen under previous data protection regulations such as the EU Data Protection Directive.

To increase data-related protections given to data subjects requires organisations to define what best practices should be implemented and, perhaps more importantly, to create a plan to continually monitor and adjust these best practices as technologies used by organisations and cyber-criminals evolve.

GDPR and Data Security

With organisations relying more heavily on big data and the resulting business intelligence derived from such information, personal and corporate data is now more valuable than ever. At the same time, this business intelligence is more at risk.

Given that accountability and enforcement are two of the key aspects of GDPR, organisations must look closely at operational behaviors and evaluate how those behaviors tie into their current and future approaches to information security.

Furthermore, because Article 30 of GDPR requires records of processing, it is imperative for organisations to know how and why data is being collected, stored and processed.

Specifically, organisations need to establish information security best practices to ensure that data is:

  • Collected for specific purposes.
  • Processed securely, limiting risk of compromise.
  • Stored for a defined amount of time.
  • Wiped to remove personally identifiable data when necessary.

In addition to the records criteria touched upon in Article 30, GDPR also requires full disclosure of processing activities through privacy notices (Article 13) and identification of legal basis for data processing (Article 6), and it also lays out conditions for obtaining data subject consent (Article 7).

All these requirements mandate that organisations establish ongoing, risk-based due diligence internally, and for any third party that might access or process their data.

While data controllers and processors have different roles under the GDPR, the potential of large fines and associated reputational damage for noncompliance means that all involved parties must take exceptional care with information security practices.

Establish Best Practices

As organisations continue honing their approaches to information security to address GDPR-related requirements, they will need to fill the historic gaps typically found with out-of-date and often antiquated practices.

Organisations can begin to shift focus from detection and remediation efforts to more proactive measures by embracing current security-related best practices including:

  • Establishment of more robust data protection policies for current and forward-looking privacy principles.
  • Creation and enforcement of appropriate mobile device management policies and standards, including operating system policies, passwords, encryption, remote wipe, bring-your-own device criteria, lost or stolen device policies, and apps policies and management.
  • Development and effective maintenance of up-to-date encryption standards for servers, systems, laptops and mobile devices.
  • Establishment of a formal, physical, and logical security training program for all personnel and a well-planned and rehearsed approach to incident response.

Security-related best practices can address critical components of GDPR compliance. However, by establishing such robust practices, organisations can also begin to realise a significant return on investment.

Consumers want to know their information is safe, properly secured, and handled appropriately, which is increasingly reflected in their spending habits.
 
Employees also want to trust employers’ handling of their personal data, so organisations interested in securing the best talent should take GDPR compliance seriously.

Organisations that understand the importance of GDPR compliance can better attract and serve consumers and engage talented employees.

Get Proactive

Data is the most valuable asset for organisations today. The related information security practices put in place to secure that data are not only critical for compliance and governance issues, but for aspects of operational, reputational, and fiscal concerns as well.

As organisations move deeper into 21st-century technology and data requirements, they can use increasingly stricter regulatory requirements to help propel business forward.

Though it might seem an onerous task, the GDPR and efforts to maintain compliance could bring improved efficiencies, savings, and cost benefits to organisations that embrace it.

Even more, consumers and employees might be more likely to gravitate toward companies that prioritise maintaining privacy rights and strong information security.

Information- Management
 
You Might Also Read: 

Get Ready For ePrivacy Regulation:

Playing Catch-Up With GDPR:

 

« Help The Aged: Indian Cops Give Cybersecurity Tips
What is Digital Twin Technology? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

Center for Technology Training (CTT)

Center for Technology Training (CTT)

CTT is a distinguished Computer Training School in Tampa. We specialize in offering comprehensive IT certification programs, including Cyber Security.