CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Protection
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Protection

Certain types of personal data are very valuable to criminals, and can be very damaging to an individual or business if it falls into the wrong hands. As the world becomes more digital and more connected, more of this sort of data is generated and passed between various sources on a regular basis.

 

Government regulations and supervisory authorities aren’t just about keeping irresponsible parties in line. They also provide vital security guidance to every type of organization that handles sensitive personal, business or government information.

 

Data protection regulations also ensure that the end user has a transparent view of and a say in the processing of personal data. These safeguards play a significant role in everything from the preservation of civil rights to ensuring that democratic institutions function properly.

 

Some types of personal data are clear candidates for regulation: medical records, banking information, national ID numbers and so on. But some of these regulations also cover items that might seem relatively innocuous at first glance: home addresses, email addresses, website profile information and so on. For example, the European Union General Data Protection Regulation (GDPR) has stipulations about anything that is unique to an individual to include phone numbers and social media accounts. People have varying levels of privacy preference with these items, but they are often protected by regulation because they can be used for targeted scams and attempts at identity theft.

 

Given that regulations often take the size and customer count of businesses into consideration in terms of penalties and the scope of protection of personal data, compliance is particularly important for enterprise-scale organizations. You do not necessarily have to have an active business presence in a country or region; simply storing data on or moving it through servers there may subject you to their data protection rules.

 

Image of man jumping over a crevice against moutain backdrop signifying how privacy professionals and CPO needs to bridge the gap and become security savvy as a CISO
Data ProtectionInsights

CPO to CISO: Four Steps for Privacy Professionals to Get Security Savvy

October 30, 2017
As more CPOs need to interact with security, they need the right skills to integrate security into the privacy strategy and compliance with regulations.
Read More
Image of man using calculator for doing accounts representing the GDPR compliance costs for the Global 500
Data ProtectionNews

Global 500 Faces GDPR Compliance Costs of $7.8 Billion

December 1, 2017
According to a new survey conducted by the IAPP and EY, Global 500 companies will spend a combined $7.8 billion over the next year on GDPR compliance. Those escalating compliance costs will mostly result from new hiring, as corporations race to catch up with changes to privacy laws.
Read More
Image of busy street with people holding umbrellas in the rain representing identity protection
Data ProtectionInsights

Why Identity Protection Is Needed Before You Are a Victim

December 3, 2017
Identity theft is a frighteningly real concern during the holiday season as consumers shop more and cyber criminals get busy. Companies that proactively offer identity protection to cushion the full impact of a data breach on customers that are victimized will reap benefits of trust and loyalty from their customers.
Read More
Image of European Union building representing considerations of EU GDPR for political parties, NGOs and community organizations
Data ProtectionInsights

GDPR – Key Facts for Political Parties, NGOs and Community Organizations

December 12, 2017
The GDPR legislation, which is being implemented across the European Union next May, will have far-reaching implications for how political parties, NGOs and any community organization interfacing with the general public operates. Here’s a nine step checklist to help your community-facing organization get into shape.
Read More
Image of businessman with hands resting on thick files representing protecting data subject rights for acccess, erasure and portability
Data ProtectionInsights

Access, Erasure and Portability: Examining Data Subject Rights Under the GDPR

December 29, 2017
Data subject rights are being expanded under the EU General Data Protection Regulation (GDPR), impacting the business processes of data controllers and processors. With the increased complexities that lie in within each distinct right, a variety of new issues will need to be considered.
Read More
Image of European Union flag in front of a building signifying the consideration of consent under the EU GDPR and the requirements and recommendations for data controllers
Data ProtectionInsights

Consent Under the GDPR: Requirements and Recommendations for Data Controllers

January 26, 2018
The concept of consent has had a long history in privacy and data protection. Privacy consent has been evolving, especially under the GDPR. What are the expanded requirements for consent and what actions must organizations begin taking today to prepare for the coming of the GDPR on 25 May 2018?
Read More
Image of country flags of European Union signifying countries getting prepared for GDPR
Data ProtectionNews

GDPR Amber Alert: Only Two Countries Fully Prepared

February 21, 2018
Less than 100 days to go, and so far only two European countries have adapted their laws to be ready for GDPR. While the GDPR aims to harmonize rules across the European Union and to benefit companies to deal with just one law, many member states are eyeing possible exemptions as they change their national laws.
Read More
Image of man holding a tablet and an electronic brain projected above showing the concerns of AI and algorithms for EU GDPR compliance
BlogsData ProtectionSecurity Demystified

From GDPR to GIPR to GPPR to GAPR

March 1, 2018
Every business that collects data will have the Insights, Prediction, Action dilemma it confronts. And for that we need a regulatory framework to set boundaries. Am I allowed to dream on? Let’s not wait for regulations. An industry sponsored consortium putting consumer rights and privacy front and center.
Read More
Image of group of people at negotiation and shaking hands to agree on trade deals and signifying the need for EU data protection
Data ProtectionNews

EU Wants Data Protection to Go Hand in Hand with Trade Deals

March 12, 2018
Personal data protection is a fundamental EU right and is not negotiable in trade deals, The European Commission has provided four conditions for international data flows to comply with the GDPR. Yet, there is a “get out of jail free card,” allowing restrictions to be reviewed and accorded "sympathetic" consideration.
Read More
Image of man standing in front of wall with the words compliance and regulations to signify need for buying privacy software
Data ProtectionResources

The Ultimate Guide to Buying Privacy Software

March 18, 2018
Nymity's 2018 Privacy Compliance Software Buyer's Guide helps a Privacy Office to navigate the different types of privacy compliance software and to best decide where to invest in order to mitigate risk, build accountability, and achieve ongoing compliance. Get the ultimate guide to buying privacy software.
Read More
1 2 3 4 5 6 … 36

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results