CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Data Protection
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Data Protection

Certain types of personal data are very valuable to criminals, and can be very damaging to an individual or business if it falls into the wrong hands. As the world becomes more digital and more connected, more of this sort of data is generated and passed between various sources on a regular basis.

 

Government regulations and supervisory authorities aren’t just about keeping irresponsible parties in line. They also provide vital security guidance to every type of organization that handles sensitive personal, business or government information.

 

Data protection regulations also ensure that the end user has a transparent view of and a say in the processing of personal data. These safeguards play a significant role in everything from the preservation of civil rights to ensuring that democratic institutions function properly.

 

Some types of personal data are clear candidates for regulation: medical records, banking information, national ID numbers and so on. But some of these regulations also cover items that might seem relatively innocuous at first glance: home addresses, email addresses, website profile information and so on. For example, the European Union General Data Protection Regulation (GDPR) has stipulations about anything that is unique to an individual to include phone numbers and social media accounts. People have varying levels of privacy preference with these items, but they are often protected by regulation because they can be used for targeted scams and attempts at identity theft.

 

Given that regulations often take the size and customer count of businesses into consideration in terms of penalties and the scope of protection of personal data, compliance is particularly important for enterprise-scale organizations. You do not necessarily have to have an active business presence in a country or region; simply storing data on or moving it through servers there may subject you to their data protection rules.

 

View of Microsoft office showing support behind #CCPA and tougher privacy laws
Data ProtectionGeneralNews

Microsoft Throws Its Support Behind CCPA and Tougher Privacy Laws

November 20, 2019
Microsoft is now the first major tech company that says it plans to abide by the new CCPA not just in California, but also to honor California’s digital privacy law in every state where it operates in the United States. Read More
Compliance icon on top of a book showing the technology considerations for CCPA compliance
Data ProtectionInsights

Technology Considerations for CCPA Compliance

December 26, 2019
Companies should have an automated, accurate and scalable technology solution to handle a potential mountain of Subject Rights Requests (SRRs) when CCPA comes into effect. Read More
Flags of U.S. and European Union showing the difference in approach towards GDPR compliance by U.S. and Europe
Data ProtectionInsights

The U.S. and Europe Are Approaching GDPR and Data Privacy Much Differently

May 8, 2019
U.S. is addressing GDPR compliance and data privacy through technologies whereas Europe is taking the litigation route, will Europe wake up at some point and realize they’re behind the technology curve? Read More
Man touching GDPR icon on virtual screen showing the future of data breach fines
Data ProtectionInsights

GDPR’s Big Moment Has Just Arrived – With a $228 Million Data Breach Fine

September 12, 2019
The size of today's GDPR penalties has set the level against which all future data breach fines will be judged as global data breaches are pursued by multiple regulatory authorities and private citizens alike. Read More
Businessman using a magnifying glass showing the effectiveness of data discovery and mapping tools to meet Brazil’s LGPD requirements
Data ProtectionInsights

Data Discovery and Data Mapping: Are These Automated Software Technologies Effective for LGPD Compliance?

May 11, 2020
Companies are searching for data discovery and mapping tools to meet Brazil’s LGPD requirements but it will take more than technology to identify all the gaps. Read More
Giant multimedia video and image walls showing the ad tech ecosystem and the impact of GDPR consent string fraud
Data ProtectionInsights

Could GDPR Consent String Fraud Bring Down the Whole Ad Tech Ecosystem?

December 5, 2018
Some ad tech vendors appear to be engaging in a form GDPR consent string fraud by knowingly tampering with the consent information found in a publisher’s consent string, in order to give them the ability to deliver personalized ads. Read More
Data flowing through cyberspace showing how distributed SaaS solution can help with global data regulations
Data ProtectionInsights

Implementing a Distributed SaaS Solution While Keeping Up with Global Data Regulations

August 19, 2020
Distributed SaaS platform can help enterprises expand their business, comply with global data regulations, and avoid hefty cyber losses and cybersecurity spending. Read More
Hammer and gavel on Euros showing privacy complaints targeting data transfers
Data ProtectionNews

Flood of Privacy Complaints Following Schrems II Decision Target Data Transfers to US

August 27, 2020
Max Schrems, chairperson of noyb, has directed his organization to file over 100 privacy complaints against major businesses engaging in data transfers with the US. Read More
Lawyer working on document for analysis of proposed Data Care Act
Data ProtectionNews

The Data Care Act: Early Analysis as a New Congress Convenes

January 10, 2019
While the proposed Data Care Act isn't quite a full-on EU GDPR equivalent, the bill still aims to bring the tech industry's practices more in line with current approaches for handling sensitive personal information. Read More
Image of checklist on a clipboard and pen representing the need to demonstrate compliance using an accountability approach
Data ProtectionInsights

An Accountability Approach to Demonstrating Compliance

September 21, 2016
In this final instalment of an ongoing series on the issues that affect compliance in an ever more complex world Teresa Troester-Falklooks at how organisations can demonstrate compliance using an accountability approach. Read More
Load More

Latest

Clubhouse application on mobile phone screen showing threat of data scraping

Clubhouse Joins Facebook and LinkedIn as Target of Data Scraping; Cumulative One Billion User Profiles Have Been Leaked

Three men in bar with smartphones in hands showing challenges with DevSecOps

Developers, Security and Operations Walk into a Bar…

SAP system on virtual screen showing cyber attack on security vulnerabilities

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Engineer checking intelligent factory showing state of IoT security

New Tripwire Survey: IoT Security Still in Shambles, Most Security Pros Struggling To Make Devices Fit Safely Into Business Networks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results