Playing Catch-Up With GDPR

After two years of waiting, Europe’s General Data Protection Regulation has officially taken effect. Beyond Europe, the regulation is expected to reshape how global organisations manage, share and protect their users’ personal data. 
 
Many organisations across the world have scrambled to be ready. But based on public statements from companies and client feedback, it is clear that many companies are still not in compliance. Still, with all the high-profile data breaches and misuses we have witnessed in the last few months; i.e. Equifax and Cambridge Analytica, global businesses are taking GDPR seriously. 
 
Not knowing the extent and depth to which the EU will enforce GDPR, the potential fines of up to 4 percent of global annual revenue or 20 million euros should still inspire an immediate need to review and subsequently adjust data privacy and protection programs. 
 
As a result, companies will have to restructure how they handle data, and, if they do not have a cyber infrastructure that is sound, they will have to rebuild from the ground up including their applications. Even if the GDPR does not directly affect your organisation, the requirements and guidelines contained within can help any organisation obtain resilient data privacy and protection.
 
Who is in Compliance?
The answer differs based on several factors. Over the past few weeks there have been at least four distinct studies with very different results. On May 21, a new GDPR study carried out by the Ponemon Institute found that 40 percent of the companies surveyed would not be ready.
 
A Crowd Research Partners report drawn from the Information Security Community on LinkedIn, says that only 40 percent of the organisations surveyed would be fully compliant by today’s GDPR deadline.
 
A World Federation of Advertisers (WFA) survey stated that 95 percent of respondents planned to be fully compliant by the deadline, of which 74 percent said they believe their company would likely be fully compliant by the deadline, with 42 percent of those respondents saying they would definitely be.
 
A Netsparker GDPR survey of 300 senior executives found that only 2 percent of those surveyed said that they do not expect to be compliant by today’s deadline.
 
The various survey results indicate that there is still much confusion around GDPR. For those organisations that are playing catch-up with GDPR, the first step is to realise that they will need their customer’s permission to collect and process their data. This includes internal tools used to share or analyse the data internally, exclusive of tools that encrypt the data end to end. 
 
The steps should be prioritised by risk and execution complexity within your organisation.
 
1. Revise your procedures that define how you are going to handle an individual's request for erasing or rectifying inaccurate data. Executing this process will take the longest time so it should be prioritized.
2. Review your contracts with third parties. Their compliance is your risk exposure so you need to make sure you ensure their compliance. 
3. Review and understand how you process your customer data mapping the data processing activities across the business processes. This activity, previously put on the back burner, needs to be moved up. It is a compliance activity not a systems analysis activity. It simply isn’t an option anymore.
4. Revise your data security practices and systems to be in compliance with GDPR. The core initiative for meeting EU GDPR compliance is to protect user data. If you have not already, you need to take inventory of your data and map your data to protected EU GDPR categories. 
5. Most importantly once you have the knowledge of where your data is and how is it being used a prudent step would be to also implement a data leak prevention tool and policy to enforce GDPR systematically. 
6. It is equally important to remember why GDPR was created in the first place. The main goal of the regulation was to protect the misuse of personal data by organisations for intrusive marketing and influencing activities. 
 
Moving forward, GDPR compliance will emphasise transparency of the data. The retention and processing of our data has to be with our permission and easily auditable. 
 
Complying with GDPR will be a significant challenge to all businesses. 
However, knowing what you have to do to be in compliance is the first and most important step. This will help you quickly get to a point where you demonstrate to the regulators that you can both identify and audit your data so that you can create a practical roadmap to GDPR compliance.
 
To contact the GDPR Advisory Board please visit:  www.gdpr-board.co.uk
 
Information-Management
 
You Might Also Read: 
 
What Your Board Needs To Know About GDPR:
 
Cybersecurity Advice For SMEs:
 
 
« Demand For Indian Cybersecurity Skills Rising Fast
Cybercrime: Law Enforcement Must Get Serious »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Data Privacy Office (DPO) - Belarus

Data Privacy Office (DPO) - Belarus

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.

Vivid Computing Solutions

Vivid Computing Solutions

At Vivid Computing Solutions we provide comprehensive solutions that keep your business running efficiently and securely.