• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  General Data Protection Regulation
General Data Protection Regulation
29 June 2017

General Data Protection Regulation

Written by Rohit Srivastwa
Rohit Srivastwa
Security

Regulation is the innovation

Any data protection law is mostly drafted with a certain amount of jargon and the General Data Protection Regulation (GDPR) is no different. Many of us can hear the clock tick as the European Union is set to implement a set of data protection regulations designed to protect

European citizens’ personal data. This regulation will affect anyone and everyone who will deal with EU citizens’ personal data, meaning that, yes, even if you are a non-EU-based company you will still need to comply.

Arguably the GDPR appears to be one of the biggest changes to the regulatory landscape of data privacy, the strength of which only time will be able to tell. As of now, the GDPR is set to be implemented in coming May 2018.

So, what has changed?

  • Consent from a client for the processing of their personal data now should be done in an unambiguous manner, through a statement or a clear affirmative action.
  • Reporting of a data breach to the Supervisory Authority must be done within 72 hours after becoming aware of a personal data breach.
  • Data portability of one’s personal data from one electronic processing system to and into another, will not be prevented by the data controller.
  • Data Protection Officers (DPOs) must be appointed in the case of public authorities or organizations that engage in large scale systematic monitoring and processing of sensitive personal data.
  • An administrative fine of up to 10 million EURO or 2% of the annual global turnover (whichever is higher) can be charged for non-compliance with the obligations of a data controller or a data processor.
  • Parental consent will be required to process the personal data of children under the age of 16.
  • Privacy by design and default should be considered adequate to meet the principles of data protection.
  • A Right to be forgotten may be obtained from the controller without undue delay and the controller shall have the obligation to erase the said personal data.

Rules of the game will be applicable to you if:

  • You process personal data of subjects residing in the EU.
  • You monitor behavior of EU residents.
  • You have an ‘establishment’ in the EU.
  • You sell goods or services to users over the internet including to the users in the EU.

How do you begin?

  • Revisit the design of your processing operations, such that by default; personal data are only processed where necessary.
  • Deploy regular checks on your data management system wherein third party suppliers have access to personal data.
  • Conduct periodic privacy impact assessments.

What can Quick Heal Academy do for you?

  • Conduct a six-week sprint to assess readiness of your data & define a remediation program in line with your risk appetite.
  • Create organization wide awareness thereby helping relevant stakeholders to integrate GDPR solutions into their operational environments.
  • Streamline your breach notification plan there by strengthening and unifying the safety and security of relevant data.
  • Design and implement a sustainable privacy and data protection in accordance with ISO 27001.

A thought paper by Quick Heal Academy.

 Previous PostDOs and DON’Ts to stay safe from Ransomware (infographic)
Next Post  A technical analysis of the recent Petya ransomware attack
Rohit Srivastwa

About Rohit Srivastwa

Rohit Srivastwa is Senior Director, Cyber Education and Services at Quick Heal Technologies Ltd. He is a security evangelist and specialist in IT infrastructure,...

Articles by Rohit Srivastwa »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies