• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  General Data Protection Regulation
GDPR
29 June 2017

General Data Protection Regulation

Written by Rohit Srivastwa
Rohit Srivastwa
Security
Estimated reading time: 2 minutes

Regulation is the innovation

Any data protection law is mostly drafted with a certain amount of jargon and the General Data Protection Regulation (GDPR) is no different. Many of us can hear the clock tick as the European Union is set to implement a set of data protection regulations designed to protect

European citizens’ personal data. This regulation will affect anyone and everyone who will deal with EU citizens’ personal data, meaning that, yes, even if you are a non-EU-based company you will still need to comply.

Arguably the GDPR appears to be one of the biggest changes to the regulatory landscape of data privacy, the strength of which only time will be able to tell. As of now, the GDPR is set to be implemented in coming May 2018.

So, what has changed?

  • Consent from a client for the processing of their personal data now should be done in an unambiguous manner, through a statement or a clear affirmative action.
  • Reporting of a data breach to the Supervisory Authority must be done within 72 hours after becoming aware of a personal data breach.
  • Data portability of one’s personal data from one electronic processing system to and into another, will not be prevented by the data controller.
  • Data Protection Officers (DPOs) must be appointed in the case of public authorities or organizations that engage in large scale systematic monitoring and processing of sensitive personal data.
  • An administrative fine of up to 10 million EURO or 2% of the annual global turnover (whichever is higher) can be charged for non-compliance with the obligations of a data controller or a data processor.
  • Parental consent will be required to process the personal data of children under the age of 16.
  • Privacy by design and default should be considered adequate to meet the principles of data protection.
  • A Right to be forgotten may be obtained from the controller without undue delay and the controller shall have the obligation to erase the said personal data.

Rules of the game will be applicable to you if:

  • You process personal data of subjects residing in the EU.
  • You monitor behavior of EU residents.
  • You have an ‘establishment’ in the EU.
  • You sell goods or services to users over the internet including to the users in the EU.

How do you begin?

  • Revisit the design of your processing operations, such that by default; personal data are only processed where necessary.
  • Deploy regular checks on your data management system wherein third party suppliers have access to personal data.
  • Conduct periodic privacy impact assessments.

What can Quick Heal Academy do for you?

  • Conduct a six-week sprint to assess readiness of your data & define a remediation program in line with your risk appetite.
  • Create organization wide awareness thereby helping relevant stakeholders to integrate GDPR solutions into their operational environments.
  • Streamline your breach notification plan there by strengthening and unifying the safety and security of relevant data.
  • Design and implement a sustainable privacy and data protection in accordance with ISO 27001.

A thought paper by Quick Heal Academy.

 Previous PostDOs and DON’Ts to stay safe from Ransomware (infographic)
Next Post  A technical analysis of the recent Petya ransomware attack
Rohit Srivastwa
About Rohit Srivastwa

Rohit Srivastwa is Senior Director, Cyber Education and Services at Quick Heal Technologies Ltd. He is a security evangelist and specialist in IT infrastructure,...

Articles by Rohit Srivastwa »

Related Posts

  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020
  • APT harbingers are using Honey Traps to attack Indian Defence.

    Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

    July 8, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.