SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Quick guide to the EU General
Data Protection Regulation
2016 sees the 1995 Data Protection Directive bought
up to date with new, EU-wide Regulation
Quick guide to the EU General Data Protection Regulation
The General Data Protection Regulation (GDPR) is a comprehensive reform
of the EU’s 1995 data protection regulation, being developed to strengthen
and unify online privacy rights and data protection for individuals within the
European Union (EU) while streamlining the data protection obligations of
businesses serving EU citizens through a single Regulation instead of 28 dif-
ferent National laws.
The initial proposal for GDPR was released on 25 January 2012 with the aim of
formal adoption in early 2016.
The European Parliament’s Committee on Civil Liberties, Justice and Home Af-
fairs (LIBE) voted positively on the outcome of the negotiations between the
European Parliament, the European Commission and the European Council
with adoption expected in Spring 2016. Unlike a Directive, a Regulation does
not require any additional legislation from National Governments and en-
forcement of the GDPR is timetabled to start in the first half of 2018.
The 28 EU Member States have implemented the 1995 rules differently, mak-
ing it difficult and costly for EU businesses to operate across internal borders
and with gross differences in enforcement. It is estimated that the elimination
of this fragmentation will lead to savings for businesses of around €2.3 billion
a year across the European Union.
WHAT ARE THE CHANGES?
Key changes in the reform include1
:
•	 The right to know when one’s data has been hacked: Companies and or-
ganisations must notify the national supervisory authority of data breaches
which put individuals at risk and communicate to the data subject all high risk
breaches as soon as possible so that users can take appropriate measures.
•	 Stronger enforcement of the rules: data protection authorities will be able
to fine companies who do not comply with EU rules up to 4% of their global
annual turnover.
1	 Press Release Summary: http://europa.eu/rapid/press-release_MEMO-15-6385_en.htm
•	 One continent, one law: a single, Pan-European law for data protection, re-
placing the current patchwork of national laws. Companies will deal with
one law, not 28. The benefits are estimated at €2.3 billion per year.
•	 Organisations must notify the national authority of serious data breaches as
soon as possible (if feasible within 24 hours).
•	 EU rules must apply if personal data is handled abroad by companies that
are active in the EU market and offer their services to EU citizens.
•	 Data protection by design and by default: ‘Data protection by design’ and
‘Data protection by default’ are now essential elements in EU data protec-
tion rules. Data protection safeguards will be built into products and ser-
vices from the earliest stage of development, and privacy-friendly default
settings will be the norm.
By making Data Protection an essential, key element of the regulation The EU
is making it mandatory for businesses to adequately protect sensitive person-
al data, defined as:
“any information relating to an identified or identifiable natural person hereinafter re-
ferred to as ‘data subject’; an identifiable person is one who can be identified, directly
or indirectly, in particular by reference to an identification number or to one or more
factors specific to his or her physical, physiological, mental, economic, cultural or social
identity;”2
This broad definition of personal data easily covers the simplest records re-
lating, even indirectly, to customers, clients, staff, pupils and any other record
relating to an individual.
2	REGULATION (EC) No 45/2001: http://eur-lex.europa.eu/legal-content/EN/
TXT/?uri=uriserv%3AOJ.L_.2001.008.01.0001.01.ENG
Quick guide to the EU General Data Protection Regulation
WHAT DOES THE REGULATION SAY
ABOUT PROTECTING DATA?
Section 2, Data Security, Article 30: Security of Processing states3
:
1. Having regard to the state of the art and the costs of implementation and
taking into account the nature, scope, context and purposes of the process-
ing as well as the risk of varying likelihood and severity for the rights and
freedoms of individuals, the controller and the processor shall implement ap-
propriate technical and organisational measures, to ensure a level of security
appropriate to the risk, including inter alia, as appropriate:
a)	 the pseudonymisation and encryption of personal data;
b)	 the ability to ensure the ongoing confidentiality, integrity, availability and
resilience of systems and services processing personal data;
c)	 the ability to restore the availability and access to data in a timely manner
in the event of a physical or technical incident;
d)	 a process for regularly testing, assessing and evaluating the effectiveness
of technical and organisational measures for ensuring the security of the
processing
Article 30 removes any doubt as to whether systems and storage which leave
secure premises should be encrypted. The technology is an established well-
known means of protecting information which is vulnerable to theft or loss. It
also makes the case for effective disaster recovery plans, password recovery
and key management systems.
Article 28 of the Regulation3
requires that records must be kept including a
general description of the technical and organisational security measures tak-
en, as referred to in Article 30, meaning that organisations need records and
proof that systems are secure and that encrypted data is recoverable after a
technical incident.
 
3	Text of the Regulation: http://ec.europa.eu/justice/data-protection/document/review2012/
com_2012_11_en.pdf
WHAT ARE THE DATA
BREACH-NOTIFICATION RULES?
Article 313
details Notification of a personal data breach to the supervisory
authority and requires that in the case of a personal data breach, notify the
Supervisory Authority where feasible, not later than 72 hours after having be-
come aware of it. Any notification beyond 72 hours must be accompanied by
a reasoned justification for the delay.
Article 32³ refers to the communication of a personal data breach to the data
subject and states that:
When the personal data breach is likely to result in a high risk the rights and
freedoms of individuals the controller shall communicate the personal data
breach to the data subject without undue delay.
However, it goes on to state that:
The communication to the data subject referred to in paragraph 1 shall not be
required if:
a)	 the controller has implemented appropriate technical and organisational
protection measures, and that those measures were applied to the data
affected by the personal data breach, in particular those that render the
data unintelligible to any person who is not authorised to access it, such as
encryption; or
b)	 the controller has taken subsequent measures which ensure that the high
risk for the rights and freedoms of data subjects referred to in paragraph 1
is no longer likely to materialise; or
c)	 it would involve disproportionate effort. In such case, there shall instead be
a public communication or similar measure whereby the data subjects are
informed in an equally effective manner.
Studies have shown that the earlier a data breach is reported the more dam-
aging are the consequences to the organisation in question. Again, it is clear
that encryption is considered a sufficient safeguard to preclude this and the
consequences for corporate reputation.
Quick guide to the EU General Data Protection Regulation
HOW DOES THE REGULATION
DISCOURAGE OFFENDERS?
Point six of Article 794
, Administrative sanctions states:
The supervisory authority shall impose a fine up to 1,000,000 EUR or, in case
of an enterprise, up to 2% of its annual worldwide turnover, to anyone who,
intentionally or negligently:
Note (e) does not adopt internal policies or does not implement appro-
priate measures for ensuring and demonstrating compliance pursuant to
Articles 22, 23 and 30;
Note (h) does not alert on or notify a personal data breach or does not
timely or completely notify the data breach to the supervisory authority or
to the data subject pursuant to Articles 31 and 32;
This clear intent to penalise and discourage offenders will come into force
over the next two years so it’s time to act now.
Some countries have already started work; The Dutch senate passed a bill in
May 2015 to amend their Data Protection Act in anticipation of and pre-empt-
ing the GDPR, moving the Netherlands from one of the most weakly enforced
of Europe’s nations to one of the strongest. The regulation will be enforced
throughout all 28 member states by mid 2018.
4	Text of the Regulation: http://ec.europa.eu/justice/data-protection/document/review2012/
com_2012_11_en.pdf
WHAT MEASURES SHOULD BE
TAKEN NOW?
The Regulation requires organisations of all sizes to adopt a new set of pro-
cesses and policies aimed at giving Individuals greater control over their per-
sonal records. Much of this will involve writing new processes and manuals,
retraining staff and updating systems to accommodate these new procedures.
Other steps involve practical measures, such as employing encryption where
data is exposed to risk.
A lost or stolen laptop or USB stick need not lead to a penalty if it has been
encrypted with a validated product. DESlock software has been helping or-
ganisations of all sizes to encrypt laptops, removable media, email and files for
many years. Our products cover all Windows platforms from XP to Windows
10 and iOS from Version 7 and up. Our software is built upon a FIPS 140-2 level
1 validated cryptographic subsystem and our key management system and
unique management server are the subject of worldwide patents.
Contact ESET in your region or your ESET Reseller for more information, to
arrange a product demo or for trial software.
 
One of the key requirements of the EU GDPR is that Personal Data is encrypt-
ed; where encryption is used as a technical measure it must be possible to
restore it promptly after an incident and records must be kept to prove that
systems are both secure and recoverable.
DESlock is designed to tackle these requirements in a simple and effective
manner.
Quick guide to the EU General Data Protection Regulation
Objective DESlock+
Secure data at rest within
the organisation
All commercial versions of DESlock+ include
file, folder and removable media encryption
as standard to secure data at the endpoint.
Secure data in transit DESlock+ Pro includes full-disk and
removable media encryption for USB drives
and optical media to secure data on the
move
Secure data for mobile /
home working practices
Commercial DESlock+ licences extend to a
second installation on a privately-owned
PC. Beyond this, DESlock+ Go adds portable
encryption to any USB storage device.
Secure transfer of data
between locations
All versions of DESlock+ include an Outlook
plug-in, clipboard encryption compatible
with all mail clients including webmail, and
attachment encryption for any system.
optical media encryption allows the safe
transfer of data stored on CD or DVD.
Block / Limit access to
certain data
Unique, patented key-sharing technology
make it simple to deploy and manage
complex, multi-layered teams and
workgroups.
Allow access to secure
data when requested.
The DESlock+ Enterprise Server is designed
for remote user management via a secure
internet connection. Keys may be centrally
distributed and withdrawn rapidly.
Secure safe storage of
personal data
DESlock+ is FIPS-140-2 validated and uses
reliable, approved and secure industry
standard encryption algorithms and
methods.
Secure destruction of
redundant data
The DESlock+ Desktop Shredder tool
securely deletes data to the DoD-5220.22-M
standard ensuring that it is completely
unrecoverable.
Further Information
General Information
https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/
Documents/EDPS/Publications/Speeches/2015/15-12-08_Truste_speech
_EN.pdf
Details of the Regulation
http://www.statewatch.org/news/2015/dec/eu-council-dp-reg-draft-final-
compromise-15039-15.pdf
Draft Compromise
http://www.statewatch.org/news/2015/dec/eu-council-dp-dir-leas-draft-
final-compromise-15174-15.pdf
DESlock Limited
3 Heron Gate Office Park, Hankridge Way, Taunton, UK. TA1 2LR
Telephone +44 (0) 1823 444447
Fax +44 (0) 1823 444823
Email sales@deslock.com
www.deslock.com
Registered in England No 7875689

Más contenido relacionado

La actualidad más candente

EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection RegulationSabrina Kirrane
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016John Greenwood
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr3GDR
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance Tom Haynes
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsPECB
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPRPavol Balaj
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORIKarel Holst
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIKarel Holst
 

La actualidad más candente (20)

EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPR
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORI
 

Destacado

Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection RegulationAxon Lawyers
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)Maria Duni
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findwise
 
Trends in Interventional Clinical Trials: Medical Devices
Trends in Interventional Clinical Trials: Medical Devices Trends in Interventional Clinical Trials: Medical Devices
Trends in Interventional Clinical Trials: Medical Devices Arete-Zoe, LLC
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EUArete-Zoe, LLC
 
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...CA Technologies
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPRTripwire
 
Effective Records Management Introduction
Effective Records Management   IntroductionEffective Records Management   Introduction
Effective Records Management IntroductionFe Angela Verzosa
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 

Destacado (10)

Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection Regulation
 
Rykande färsk GDPR (PuL)
Rykande färsk GDPR (PuL)Rykande färsk GDPR (PuL)
Rykande färsk GDPR (PuL)
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
 
Trends in Interventional Clinical Trials: Medical Devices
Trends in Interventional Clinical Trials: Medical Devices Trends in Interventional Clinical Trials: Medical Devices
Trends in Interventional Clinical Trials: Medical Devices
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
Effective Records Management Introduction
Effective Records Management   IntroductionEffective Records Management   Introduction
Effective Records Management Introduction
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 

Similar a ESET Quick Guide to the EU General Data Protection Regulation

The new data privacy regulation framework
The new data privacy regulation framework The new data privacy regulation framework
The new data privacy regulation framework Thiebaut Devergranne
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
GDPR A Privacy Regime
GDPR A Privacy RegimeGDPR A Privacy Regime
GDPR A Privacy Regimeijtsrd
 
No Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyNo Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyKate Chan
 
2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docxjesusamckone
 
2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docxRAJU852744
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paperGraeme Cross
 
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security PrinciplesLisa Catanzaro
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018TRA - Tax Representative Alliance
 
Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"William Nyikuli
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India SadanandGahivare
 
20131009 aon security breach legislation
20131009 aon security breach legislation20131009 aon security breach legislation
20131009 aon security breach legislationJos Dumortier
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...John Nas
 

Similar a ESET Quick Guide to the EU General Data Protection Regulation (20)

Quick guide gdpr
Quick guide gdprQuick guide gdpr
Quick guide gdpr
 
EU Data Protection Regulation Skyhigh Networks
EU Data Protection Regulation Skyhigh NetworksEU Data Protection Regulation Skyhigh Networks
EU Data Protection Regulation Skyhigh Networks
 
The new data privacy regulation framework
The new data privacy regulation framework The new data privacy regulation framework
The new data privacy regulation framework
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
GDPR A Privacy Regime
GDPR A Privacy RegimeGDPR A Privacy Regime
GDPR A Privacy Regime
 
No Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyNo Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data Privacy
 
2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx
 
2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
 
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
 
1st draft
1st draft1st draft
1st draft
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
 
Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India
 
20131009 aon security breach legislation
20131009 aon security breach legislation20131009 aon security breach legislation
20131009 aon security breach legislation
 
GDPR 101
GDPR 101 GDPR 101
GDPR 101
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
 

Más de ESET

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity studentsESET
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity trainingESET
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?ESET
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...ESET
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear DenESET
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...ESET
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015ESET
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent ThreatsESET
 
Shopping Online
Shopping OnlineShopping Online
Shopping OnlineESET
 
Banking Online
Banking OnlineBanking Online
Banking OnlineESET
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?ESET
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? ESET
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresESET
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESETESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsESET
 

Más de ESET (20)

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity students
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity training
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Shopping Online
Shopping OnlineShopping Online
Shopping Online
 
Banking Online
Banking OnlineBanking Online
Banking Online
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct?
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasures
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 

Último

如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 

Último (20)

如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 

ESET Quick Guide to the EU General Data Protection Regulation

  • 1. Quick guide to the EU General Data Protection Regulation 2016 sees the 1995 Data Protection Directive bought up to date with new, EU-wide Regulation
  • 2. Quick guide to the EU General Data Protection Regulation The General Data Protection Regulation (GDPR) is a comprehensive reform of the EU’s 1995 data protection regulation, being developed to strengthen and unify online privacy rights and data protection for individuals within the European Union (EU) while streamlining the data protection obligations of businesses serving EU citizens through a single Regulation instead of 28 dif- ferent National laws. The initial proposal for GDPR was released on 25 January 2012 with the aim of formal adoption in early 2016. The European Parliament’s Committee on Civil Liberties, Justice and Home Af- fairs (LIBE) voted positively on the outcome of the negotiations between the European Parliament, the European Commission and the European Council with adoption expected in Spring 2016. Unlike a Directive, a Regulation does not require any additional legislation from National Governments and en- forcement of the GDPR is timetabled to start in the first half of 2018. The 28 EU Member States have implemented the 1995 rules differently, mak- ing it difficult and costly for EU businesses to operate across internal borders and with gross differences in enforcement. It is estimated that the elimination of this fragmentation will lead to savings for businesses of around €2.3 billion a year across the European Union. WHAT ARE THE CHANGES? Key changes in the reform include1 : • The right to know when one’s data has been hacked: Companies and or- ganisations must notify the national supervisory authority of data breaches which put individuals at risk and communicate to the data subject all high risk breaches as soon as possible so that users can take appropriate measures. • Stronger enforcement of the rules: data protection authorities will be able to fine companies who do not comply with EU rules up to 4% of their global annual turnover. 1 Press Release Summary: http://europa.eu/rapid/press-release_MEMO-15-6385_en.htm • One continent, one law: a single, Pan-European law for data protection, re- placing the current patchwork of national laws. Companies will deal with one law, not 28. The benefits are estimated at €2.3 billion per year. • Organisations must notify the national authority of serious data breaches as soon as possible (if feasible within 24 hours). • EU rules must apply if personal data is handled abroad by companies that are active in the EU market and offer their services to EU citizens. • Data protection by design and by default: ‘Data protection by design’ and ‘Data protection by default’ are now essential elements in EU data protec- tion rules. Data protection safeguards will be built into products and ser- vices from the earliest stage of development, and privacy-friendly default settings will be the norm. By making Data Protection an essential, key element of the regulation The EU is making it mandatory for businesses to adequately protect sensitive person- al data, defined as: “any information relating to an identified or identifiable natural person hereinafter re- ferred to as ‘data subject’; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his or her physical, physiological, mental, economic, cultural or social identity;”2 This broad definition of personal data easily covers the simplest records re- lating, even indirectly, to customers, clients, staff, pupils and any other record relating to an individual. 2 REGULATION (EC) No 45/2001: http://eur-lex.europa.eu/legal-content/EN/ TXT/?uri=uriserv%3AOJ.L_.2001.008.01.0001.01.ENG
  • 3. Quick guide to the EU General Data Protection Regulation WHAT DOES THE REGULATION SAY ABOUT PROTECTING DATA? Section 2, Data Security, Article 30: Security of Processing states3 : 1. Having regard to the state of the art and the costs of implementation and taking into account the nature, scope, context and purposes of the process- ing as well as the risk of varying likelihood and severity for the rights and freedoms of individuals, the controller and the processor shall implement ap- propriate technical and organisational measures, to ensure a level of security appropriate to the risk, including inter alia, as appropriate: a) the pseudonymisation and encryption of personal data; b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of systems and services processing personal data; c) the ability to restore the availability and access to data in a timely manner in the event of a physical or technical incident; d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing Article 30 removes any doubt as to whether systems and storage which leave secure premises should be encrypted. The technology is an established well- known means of protecting information which is vulnerable to theft or loss. It also makes the case for effective disaster recovery plans, password recovery and key management systems. Article 28 of the Regulation3 requires that records must be kept including a general description of the technical and organisational security measures tak- en, as referred to in Article 30, meaning that organisations need records and proof that systems are secure and that encrypted data is recoverable after a technical incident.   3 Text of the Regulation: http://ec.europa.eu/justice/data-protection/document/review2012/ com_2012_11_en.pdf WHAT ARE THE DATA BREACH-NOTIFICATION RULES? Article 313 details Notification of a personal data breach to the supervisory authority and requires that in the case of a personal data breach, notify the Supervisory Authority where feasible, not later than 72 hours after having be- come aware of it. Any notification beyond 72 hours must be accompanied by a reasoned justification for the delay. Article 32³ refers to the communication of a personal data breach to the data subject and states that: When the personal data breach is likely to result in a high risk the rights and freedoms of individuals the controller shall communicate the personal data breach to the data subject without undue delay. However, it goes on to state that: The communication to the data subject referred to in paragraph 1 shall not be required if: a) the controller has implemented appropriate technical and organisational protection measures, and that those measures were applied to the data affected by the personal data breach, in particular those that render the data unintelligible to any person who is not authorised to access it, such as encryption; or b) the controller has taken subsequent measures which ensure that the high risk for the rights and freedoms of data subjects referred to in paragraph 1 is no longer likely to materialise; or c) it would involve disproportionate effort. In such case, there shall instead be a public communication or similar measure whereby the data subjects are informed in an equally effective manner. Studies have shown that the earlier a data breach is reported the more dam- aging are the consequences to the organisation in question. Again, it is clear that encryption is considered a sufficient safeguard to preclude this and the consequences for corporate reputation.
  • 4. Quick guide to the EU General Data Protection Regulation HOW DOES THE REGULATION DISCOURAGE OFFENDERS? Point six of Article 794 , Administrative sanctions states: The supervisory authority shall impose a fine up to 1,000,000 EUR or, in case of an enterprise, up to 2% of its annual worldwide turnover, to anyone who, intentionally or negligently: Note (e) does not adopt internal policies or does not implement appro- priate measures for ensuring and demonstrating compliance pursuant to Articles 22, 23 and 30; Note (h) does not alert on or notify a personal data breach or does not timely or completely notify the data breach to the supervisory authority or to the data subject pursuant to Articles 31 and 32; This clear intent to penalise and discourage offenders will come into force over the next two years so it’s time to act now. Some countries have already started work; The Dutch senate passed a bill in May 2015 to amend their Data Protection Act in anticipation of and pre-empt- ing the GDPR, moving the Netherlands from one of the most weakly enforced of Europe’s nations to one of the strongest. The regulation will be enforced throughout all 28 member states by mid 2018. 4 Text of the Regulation: http://ec.europa.eu/justice/data-protection/document/review2012/ com_2012_11_en.pdf WHAT MEASURES SHOULD BE TAKEN NOW? The Regulation requires organisations of all sizes to adopt a new set of pro- cesses and policies aimed at giving Individuals greater control over their per- sonal records. Much of this will involve writing new processes and manuals, retraining staff and updating systems to accommodate these new procedures. Other steps involve practical measures, such as employing encryption where data is exposed to risk. A lost or stolen laptop or USB stick need not lead to a penalty if it has been encrypted with a validated product. DESlock software has been helping or- ganisations of all sizes to encrypt laptops, removable media, email and files for many years. Our products cover all Windows platforms from XP to Windows 10 and iOS from Version 7 and up. Our software is built upon a FIPS 140-2 level 1 validated cryptographic subsystem and our key management system and unique management server are the subject of worldwide patents. Contact ESET in your region or your ESET Reseller for more information, to arrange a product demo or for trial software.   One of the key requirements of the EU GDPR is that Personal Data is encrypt- ed; where encryption is used as a technical measure it must be possible to restore it promptly after an incident and records must be kept to prove that systems are both secure and recoverable. DESlock is designed to tackle these requirements in a simple and effective manner.
  • 5. Quick guide to the EU General Data Protection Regulation Objective DESlock+ Secure data at rest within the organisation All commercial versions of DESlock+ include file, folder and removable media encryption as standard to secure data at the endpoint. Secure data in transit DESlock+ Pro includes full-disk and removable media encryption for USB drives and optical media to secure data on the move Secure data for mobile / home working practices Commercial DESlock+ licences extend to a second installation on a privately-owned PC. Beyond this, DESlock+ Go adds portable encryption to any USB storage device. Secure transfer of data between locations All versions of DESlock+ include an Outlook plug-in, clipboard encryption compatible with all mail clients including webmail, and attachment encryption for any system. optical media encryption allows the safe transfer of data stored on CD or DVD. Block / Limit access to certain data Unique, patented key-sharing technology make it simple to deploy and manage complex, multi-layered teams and workgroups. Allow access to secure data when requested. The DESlock+ Enterprise Server is designed for remote user management via a secure internet connection. Keys may be centrally distributed and withdrawn rapidly. Secure safe storage of personal data DESlock+ is FIPS-140-2 validated and uses reliable, approved and secure industry standard encryption algorithms and methods. Secure destruction of redundant data The DESlock+ Desktop Shredder tool securely deletes data to the DoD-5220.22-M standard ensuring that it is completely unrecoverable. Further Information General Information https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/ Documents/EDPS/Publications/Speeches/2015/15-12-08_Truste_speech _EN.pdf Details of the Regulation http://www.statewatch.org/news/2015/dec/eu-council-dp-reg-draft-final- compromise-15039-15.pdf Draft Compromise http://www.statewatch.org/news/2015/dec/eu-council-dp-dir-leas-draft- final-compromise-15174-15.pdf DESlock Limited 3 Heron Gate Office Park, Hankridge Way, Taunton, UK. TA1 2LR Telephone +44 (0) 1823 444447 Fax +44 (0) 1823 444823 Email sales@deslock.com www.deslock.com Registered in England No 7875689