China’s new GDPR-style data protection law does almost nothing to curb the state's unfettered access to data stored within the country, but does sharply limit the ways in which tech firms can handle and share it.
Data Protection
Certain types of personal data are very valuable to criminals, and can be very damaging to an individual or business if it falls into the wrong hands. As the world becomes more digital and more connected, more of this sort of data is generated and passed between various sources on a regular basis.
Government regulations and supervisory authorities aren’t just about keeping irresponsible parties in line. They also provide vital security guidance to every type of organization that handles sensitive personal, business or government information.
Data protection regulations also ensure that the end user has a transparent view of and a say in the processing of personal data. These safeguards play a significant role in everything from the preservation of civil rights to ensuring that democratic institutions function properly.
Some types of personal data are clear candidates for regulation: medical records, banking information, national ID numbers and so on. But some of these regulations also cover items that might seem relatively innocuous at first glance: home addresses, email addresses, website profile information and so on. For example, the European Union General Data Protection Regulation (GDPR) has stipulations about anything that is unique to an individual to include phone numbers and social media accounts. People have varying levels of privacy preference with these items, but they are often protected by regulation because they can be used for targeted scams and attempts at identity theft.
Given that regulations often take the size and customer count of businesses into consideration in terms of penalties and the scope of protection of personal data, compliance is particularly important for enterprise-scale organizations. You do not necessarily have to have an active business presence in a country or region; simply storing data on or moving it through servers there may subject you to their data protection rules.
Advocate General (AG) of Europe’s highest court said that indiscriminate data retention by telecommunications providers is disproportionate and may breach fundamental rights and enable mass snooping.
How could companies best prepare themselves to face potential CCPA litigation following a data security incident and protect against data breach claims seeking exorbitant statutory penalties?
New study suggests that many websites are navigating around GDPR by tailoring the design of their cookie consent tools and using dark patterns to provide a misleading veneer of a consent agreement.
Italy’s data protection authority has ruled that Google's data transfers to servers in the United States fall afoul of the rules of the GDPR, with the company not anonymizing IP addresses sufficiently.
Equifax breach demonstrates how data breaches are getting bigger and more frequent. Is identity theft protection no longer optional in the digital age?
Regulatory reporting for GDPR compliance requires effectively operationalising the use of appropriate technical and organisational measures to allow for reporting at the enterprise and project level.
The passage of a national privacy law is gaining momentum as more state laws like CCPA are adding to the scheme of divergent U.S. data protection laws that companies are struggling to reconcile.
The GDPR has been in effect for a few months now, and it’s safe to say most businesses are familiar with it by now. It’s also likely a safe bet that at least a few view it as an inconvenience. Truth is, it’s anything but. From a business perspective, privacy regulations are one of the best things that could possibly exist - here’s why.
While the legitimate interests ground for processing under the GDPR can be lawfully applied in many cases, a provisional balance should be established by data controllers with more safeguards for the protection of data subjects.










