EU General Data Protection: A Milestone Of The Digital Age

The conventional wisdom is that the recently agreed-upon EU General Data Protection Regulation (GDPR) is the most-lobbied piece of legislation in the history of the European Union.

This law will likely go down as a milestone of the Digital Age, similar to industry-changing laws like the Clean Water Act or the Clean Air Act in the United States.

Just as new laws and regulations were needed to address the consequences of the Industrial Revolution, the European Union has responded to the privacy concerns presented by the Digital Revolution with a law that attempts to apply new order to the complexity of data in society.

Like most laws born of intense compromise, everyone will likely find fault with it. Privacy advocates will say it doesn’t go far enough in its risk-based approach to protect human rights. Industry voices will say it stands to cripple innovation and will consign Europe to a digital island.

Despite these differing opinions, the message to the global information economy is clear: It is time to get to work on the tough tasks of understanding and, eventually, complying with the GDPR.

Virtually every company doing business in the European Union has some challenging months ahead. Companies will need to figure out how to create a data breach response plan that both evaluates the risk of harm to consumers and still allows for regulators to be notified within 72 hours of discovery if that risk is deemed to be great.

Social media and other companies serving teen audiences will need to decide on a good way to acquire parental permission to gather the data of children. Every company will need to create systems for the demonstration of compliance with the law upon demand by regulators.

Much of this work will fall to the privacy profession. The GDPR mandates the appointment of a “data protection officer” (a DPO), a term that might be foreign to US ears. These DPOs are privacy professionals, and they’ve been proliferating around the world lately.

The new regulation requires DPOs for many companies, particularly those that handle sensitive data like biometrics or health information, but also those that make building profiles of their customers integral to their business plans. The good news is that you’ll have three years from this spring to put one in place — but the work of compliance will likely require a privacy professional in your organization far ahead of that deadline.

The potentially more challenging news is that privacy professionals are already in high demand, and will likely be even harder to find in the coming years. Training from within may be the most viable solution as companies struggle to find staff for these functions.

Without question, we will continue to see a public policy debate over many of the provisions of the GDPR. European regulators will create reams of analysis and guidance on the new regulation. Businesses will define best practices within industries and negotiate the new, risk-filled terrain of compliance. Customers will continue to demand innovative technologies that improve their lives, while at the same time expecting even greater respect for their privacy.

In this manner, the GDPR represents not a destination, but an important milestone — a marker that indicates how far we have come and how far we still have to go. Or perhaps the GDPR is more like another type of road sign: “Caution, Work Ahead.”

TechCrunch

 

« Drone Market Worth $14.9 Billion by 2020
Amazon’s Data Centers Are Located in US Spy Country »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

CoGuard

CoGuard

CoGuard is a patented solution that uses AI driven automation to provide fast, cost effective white-box penetration testing, infrastructure audits and infrastructure design services.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.