article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

You might be surprised to learn that CCTV footage is subject to the GDPR (General Data Protection Regulation). Let’s take a look at the steps you should follow to ensure your video surveillance methods are GDPR-compliant. Let’s take a look at the steps you should follow to ensure your video surveillance methods are GDPR-compliant.

GDPR 110
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR, the EU’s flagship data privacy and “right to be forgotten” regulation, has made the stakes of a data breach higher than ever. GDPR-style data privacy laws came to the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

The most effective way to ensure data security is through encryption and proper key management. Key Management as a Service (KMaaS) allows companies to manage encryption keys more effectively through a cloud-based solution instead of running the service on physical, on-premises hardware.

article thumbnail

What UK charities need to know about GDPR compliance

IT Governance

If you think that charities might be shown lenience under the GDPR (General Data Protection Regulation) , you’re wrong. The breach was reported to the ICO (Information Commissioner’s Office), which oversees GDPR compliance in the UK, and Mermaids is now subject to disciplinary action. What are charities’ GDPR requirements?

GDPR 56
article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Top 8 IaaS Security Risks & Issues Each of these IaaS security risks and issues highlights the importance of a comprehensive security strategy, including ongoing monitoring, regular audits, and user education to mitigate potential threats and vulnerabilities in the cloud environment.

Security 113
article thumbnail

The state of European cybersecurity and lessons to learn

Thales Cloud Protection & Licensing

Encryption, encryption, encryption. Encryption is one clear example of how organisations can be doing more with those fundamentals: as this recap of the event highlights, encryption remains core to building cyber-resilience and a core weakness in cyber-security efforts across the board. The GDPR effect.

article thumbnail

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords

Thales Cloud Protection & Licensing

As cyber threats and risks to technology and sensitive data proliferate widespread, the dissemination of cybersecurity information and best practices through educational awareness activities is critical for organizations and citizens on a worldwide scale to make informed decisions in their daily lives and protect themselves online.