• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  GDPR  /  How are Governments implementing data protection laws?
More-Governments-are-getting-involved-in-consumer-data-protection
31 October 2019

How are Governments implementing data protection laws?

Written by Seqrite
Seqrite
GDPR
Estimated reading time: 3 minutes

Data is the currency of this generation. No longer is this truth more evident than in the fact that countries all over the world are instituting data protection laws to prevent unsolicited disclosure or misuse of information about individuals. While incremental progress was made on data protection in the new millennium, it was the European Union’s General Data Protection Regulation (GDPR) in 2018 that proved a significant event in the history of data protection laws in the world.

Most of the legislation around data protection is derived from the following universal principles for privacy and protection of consumer and citizen data, developed by Willis H Ware in a report in 1973 –

  • For all data collected there should be a stated purpose
  • Information collected by an individual cannot be disclosed to other organizations or individuals unless specifically authorized by law or by consent of the individual
  • Records kept on an individual should be accurate and up to date
  • There should be mechanisms for individuals to review data about them, to ensure accuracy
  • Data should be deleted when it is no longer needed for the stated purpose

Here are some of the most well-known data protection laws that different countries have instituted or are in the process of establishing:

General Data Protection Regulation (GDPR) – European Union

The General Data Protection Regulation (GDPR) is a significant, wide-ranging piece of legislation, passed by the European Union (EU), which came into effect in 2018. GDPR updated the rules and regulations around data privacy for EU citizens while increasing its territorial scope, establishing stiff penalties for misuse and formulating data consent. It is a detailed legislation with many different stipulations which can be checked in detail on this link. Breach of GDPR regulations could invite sanctions, ranging from a warning for a first-time, non-intentional violation to fines of up to a massive 20 million Euros or 4% of the annual turnover of an organization, whichever is higher.

Personal Data Protection Bill – India

While not a law as yet, India’s Personal Data Protection Bill which is currently in the draft stage may be passed as early as winter this year. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge B.N Srikrishna and appointed by the Indian government in August 2017 to ‘identify key data protection’ issues submitted a report and a draft bill providing a legal framework for data privacy in the country in the month of July in 2018. When passed, this legislation will have jurisdiction for any data processed in India and calls for various different mechanisms like a Data Protection Authority (DPA) and categorization of data fiduciaries on different lines.

Protection of Personal Information Act – South Africa

The Protection of Personal Information (POPI) Act was passed in South Africa in 2013 and will soon come into effect in the entire country. The act intends to regulate how South African businesses collect, store, process and share personal information. The act outlines its definition of ‘personal information’ with businesses having to classify what information they collect about data subjects. The penalty for non-compliance could involve imprisonment for a period of up to 10 years or a fine of up to R10 million (rand), or in some cases, both.

Various laws – United States

While the United States does not have any overarching data protection laws, there are still various specific laws pertaining to different industries such as:

  • Health Industry Portability and Accountability Act (HIPAA) – A regulatory compliance for the healthcare industry which ensures safeguards are provided for patient information.
  • Payment Card Industry Security Council’s Data Security Standards (PCI DSS) – These are security standards which are required to be followed by all retail organizations that use card payment methods
  • Children’s Online Privacy Protection Act (COPPA) – A US federal law that regulates the usage of personal information of children under the age of 13 in the country.

The above are just a few examples and various different sectors in the US have to comply with regulations pertaining to their industry.

Seqrite helps organizations keep up with the compliance requirements by offering robust security products and solutions for all industries.  Seqrite’s Endpoint Security and Unified Threat Management solutions ensure that both data and assets are kept under strict vigil so that compliance is strictly adhered to.

 Previous PostThe benefits of an AI-based approach towards cyber protection
Next Post  Renewed interests in excelling Security Operation Centres?
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • GDPR has arrived: Check your preparedness

    May 25, 2018
  • How cybersecurity laws play an important role in securing your organization

    May 10, 2018
  • What is Personally Identifiable Information (PII)? How to protect it under GDPR?

    March 5, 2018

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.