• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  GDPR  /  How are Governments implementing data protection laws?
How are Governments implementing data protection laws?
31 October 2019

How are Governments implementing data protection laws?

Written by Seqrite
Seqrite
GDPR

Data is the currency of this generation. No longer is this truth more evident than in the fact that countries all over the world are instituting data protection laws to prevent unsolicited disclosure or misuse of information about individuals. While incremental progress was made on data protection in the new millennium, it was the European Union’s General Data Protection Regulation (GDPR) in 2018 that proved a significant event in the history of data protection laws in the world.

Most of the legislation around data protection is derived from the following universal principles for privacy and protection of consumer and citizen data, developed by Willis H Ware in a report in 1973 –

  • For all data collected there should be a stated purpose
  • Information collected by an individual cannot be disclosed to other organizations or individuals unless specifically authorized by law or by consent of the individual
  • Records kept on an individual should be accurate and up to date
  • There should be mechanisms for individuals to review data about them, to ensure accuracy
  • Data should be deleted when it is no longer needed for the stated purpose

Here are some of the most well-known data protection laws that different countries have instituted or are in the process of establishing:

General Data Protection Regulation (GDPR) – European Union

The General Data Protection Regulation (GDPR) is a significant, wide-ranging piece of legislation, passed by the European Union (EU), which came into effect in 2018. GDPR updated the rules and regulations around data privacy for EU citizens while increasing its territorial scope, establishing stiff penalties for misuse and formulating data consent. It is a detailed legislation with many different stipulations which can be checked in detail on this link. Breach of GDPR regulations could invite sanctions, ranging from a warning for a first-time, non-intentional violation to fines of up to a massive 20 million Euros or 4% of the annual turnover of an organization, whichever is higher.

Personal Data Protection Bill – India

While not a law as yet, India’s Personal Data Protection Bill which is currently in the draft stage may be passed as early as winter this year. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge B.N Srikrishna and appointed by the Indian government in August 2017 to ‘identify key data protection’ issues submitted a report and a draft bill providing a legal framework for data privacy in the country in the month of July in 2018. When passed, this legislation will have jurisdiction for any data processed in India and calls for various different mechanisms like a Data Protection Authority (DPA) and categorization of data fiduciaries on different lines.

Protection of Personal Information Act – South Africa

The Protection of Personal Information (POPI) Act was passed in South Africa in 2013 and will soon come into effect in the entire country. The act intends to regulate how South African businesses collect, store, process and share personal information. The act outlines its definition of ‘personal information’ with businesses having to classify what information they collect about data subjects. The penalty for non-compliance could involve imprisonment for a period of up to 10 years or a fine of up to R10 million (rand), or in some cases, both.

Various laws – United States

While the United States does not have any overarching data protection laws, there are still various specific laws pertaining to different industries such as:

  • Health Industry Portability and Accountability Act (HIPAA) – A regulatory compliance for the healthcare industry which ensures safeguards are provided for patient information.
  • Payment Card Industry Security Council’s Data Security Standards (PCI DSS) – These are security standards which are required to be followed by all retail organizations that use card payment methods
  • Children’s Online Privacy Protection Act (COPPA) – A US federal law that regulates the usage of personal information of children under the age of 13 in the country.

The above are just a few examples and various different sectors in the US have to comply with regulations pertaining to their industry.

Seqrite helps organizations keep up with the compliance requirements by offering robust security products and solutions for all industries.  Seqrite’s Endpoint Security and Unified Threat Management solutions ensure that both data and assets are kept under strict vigil so that compliance is strictly adhered to.

 Previous PostThe benefits of an AI-based approach towards cyber protection
Next Post  Renewed interests in excelling Security Operation Centres?
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • GDPR vs. DPDP: A Guide for Businesses Navigating Global Data Privacy

    May 7, 2025
  • DPDPA

    Data Breach Penalties Under the DPDPA: What Businesses Need to Know

    March 18, 2025
  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies