What Your Board Needs To Know About GDPR

Executives in businesses around the globe have been tracking The European Union's (EU) General Data Protection Regulation (GDPR), which goes into effect 25 May 2018. Those who operate primarily in the EU have had plenty of time to focus on this and no excuses for not paying attention. 
 
Those who operate primarily elsewhere also have no excuse to not be aware of the GDPR and should have already assessed how things should change because of these new rules. 
 
We have found, however, that many firms in the EU and the US and elsewhere are still not paying enough attention to these very serious rules. 
 
The objective of these new rules is to improve privacy and security of critical personal information. The rules are also designed to harmonise many different rules active across Europe and this should make overall compliance easier. 
But still, for most, compliance will require changes be put into place for how data is stored and also changes put in place for how people can be put in control of their own data. 
 
Remember, the GDPR is not just about firms that operate in the EU. It applies to firms that have data on EU citizens. 
The GDPR requires that to collect info on EU citizens, the citizens must give their consent and the citizen also has the right to be forgotten. The data it applies to is broad, including even IP addresses.
 
At this point, just 20 days away from the compliance deadline, we recommend all firms do three things:
 
1. Read the rules yourself. They are not that hard to read and think about
 
2. Consult outside counsel. Pick a law firm you know and trust and ensure they have knowledge of the GDPR. Ask us if you need some recommendations.
 
3. Seek an external review of your technical architectures for compliance. Our firm, Crucial Point, is a good place to start here.
We recommend that Boards (including Audit Committees for those that have them) should evaluate their company's data retention activities and policies to see if they are in need of modification to comply. 
Boards should ask CEOs and the management team to assess where exposure to GDPR non-compliance is greatest and prioritise actions to fix. 
 
Boards should ask questions to determine if line of business leaders realise they are responsible for compliance vice just assuming this is an IT function. And boards should know who the Data Protection Officer (DPO) is for the firm.
 
Here is more on the GDPR:
 
• Fines for non-compliance are up to 4% of annual revenues.
• Customers must consent for processing of their data
• Personal data must be protected. This includes anything related to a natural person or anything that can be used to indirectly identify the person. This includes names, photos, email addresses, bank details, addresses, posts on social media sites, medical info, IP addresses
• The rule describes a new position, a Data Protection Officer (DPO), which will be required for firms that do large scale monitoring or processing of sensitive data
• Consent of users is required and it must be asked for and granted in specific ways before collecting and processing data.
• Citizens are given new authorities over their data including right to have it removed (a right to be forgotten)
• Data protections are expected to be designed into systems
• If there is a breach of personal information, the citizen will be notified and impact assessments done
• Transfer of data to other countries and organizations is regulated
• Companies are expected to maintain a state of the art cybersecurity architecture and posture
 
We can accelerate your compliance with GDPR and do so in a way that helps your security posture. 
 
CTO Vision
 
To contact the GDPR Advisory Board please click HERE:  
 
You mIght Also Read: 

The Pitfalls Of GDPR & Cyber Security For Micro Organisations:
 
Cybersecurity Advice For SMEs:
 
« A Guide To Preventing Charity Cybercrime
Meet Tess: The Mental Health Chatbot »

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Maddrix

Maddrix

Maddrix is a network security company focused on helping government, critical infrastructure, and private sector organizations protect their mission critical information.