Friday, September 22, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Experts laud GDPR at five year milestone

Researcher by Researcher
May 28, 2023
in Cybersecurity
0
Experts laud GDPR at five year milestone
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The GDPR, in effect for five years on May 25, has influenced the U.S. data privacy laws and is likely to exert itself when AI creates a new set of privacy challenges.

The word GDPR and data protection symbols on an abstract background.
Image: Lucadp/Adobe Stock

Fundamentally, the General Data Protection Regulation’s right-to-privacy focus — giving people provenance over their data — allows individuals to dictate how companies, including data brokers, use their personally identifiable information.

GDPR — a set of data privacy regulations throughout the European Union — has extra-territorial scope, meaning platforms and websites outside of the EU that traffic in the PII of those inside the EU must also comply with its directives.

Related articles

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023

The largest consequence of this provision to date in monetary terms was this week’s $1.3 billion fine on Meta and the order to stop processing European Union user data in the U.S.

As consent management platform Cookiebot explains it, GDPR laws stipulate that a website engaging with visitors from inside the EU, and before processing personally identifiable information must:

  • Obtain clear and unambiguous consent from its users.
  • Specify cookies and other tracking technology present and operating on its pages, in easy-to-understand ways that enable users to consent and to revoke consent on each specific category of cookies.
  • Be able to safely and confidentially document each user’s consent and be able to ask for renewed consent regularly.

Experts laud GDPR but say more is needed

Several experts weighed in on the virtues of the GDPR at WithSecure’s Sphere23 event in Helsinki, Finland.

“The European Commission is criticized for many things, but GDPR is the one thing where it can hold its head up high and say, ‘We’ve led the world in this.’ As regulatory milestones go, it’s the equivalent of climbing Everest. And it seems to be working as other jurisdictions are following suit,” said Paul Brucciani, cybersecurity adviser at WithSecure.

He noted that internet fragmentation, driven by the quest for digital power, created complexity that the EU addressed with the GDPR, and which it is also applying to new technologies. “For example, AI is the next big field that will need regulating, and the EU has again made a head start on this with its proposed AI Act, a legal framework that is intended to be innovation-friendly, future-proof and resilient to disruption,” he said.

Sylvain Cortes, the VP of strategy at Hackuity, said it’s a good start, but not enough.

“Compliance is essential, but we urge organizations to take the opportunity to think beyond baseline requirements to develop a culture of continuous cyber improvement,” he said. “It’s important to remember that achieving compliance shouldn’t be treated like ‘exam-cramming’ with last-ditch efforts to achieve annual or quarterly audits. The goal is to achieve more than the minimum requirements and move away from the tick-box mindset. GDPR compliance is necessary, but it is far from sufficient for modern organizations,” he added.

Ripples of influence beyond Europe (in the U.S.)

While the U.S. lacks national data privacy laws, eight states so far have enacted either comprehensive privacy legislation or more limited or tailored legislation giving consumers power over how their personal data is trafficked. Among them are:

Maine, Colorado, Utah, Iowa, Indiana and Connecticut are also on the growing list of states with comprehensive or tailored privacy laws. Montana, Texas and Florida also have similar bills awaiting governors’ signatures.

Jeff Reich, executive director at the Identity Defined Security Alliance, said these laws and others coming owe their provenance to the GDPR.

“The rock in the pond that is the GDPR continues to cause ripples that affect everything in the vicinity,” he said. “Seven years after the GDPR was adopted, five years after enforcement began, it is difficult to not see the results of the regulation, to date. Merchants and vendors know what they need to do, even when they do not know how to do it yet. The best behavior change is with consumers.”

He said the biggest long-term benefit may be consumers’ ability to see the value of their identity and the security that protects their personal data.



Source link

Tags: expertsGDPRlaudMilestoneyear
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
0

Northern Ireland’s top police officer apologized Thursday for what he described as an “industrial scale” data breach in which the...

Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
0

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed...

Decipher Podcast: Katelyn Bowden and TC Johnson

Decipher Podcast: Katelyn Bowden and TC Johnson

August 12, 2023
0

Veilid main site: https://veilid.com/ Cult of the Dead Cow site: https://cultdeadcow.com/ Source link

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

August 12, 2023
0

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...

Used Correctly, Generative AI is a Boon for Cybersecurity

Used Correctly, Generative AI is a Boon for Cybersecurity

August 12, 2023
0

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Same ol’ rig, new drill pipes

Same ol’ rig, new drill pipes

September 22, 2023
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023

Recent Posts

Same ol’ rig, new drill pipes

Same ol’ rig, new drill pipes

September 22, 2023
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved