Remove category
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The General Data Protection Regulation (GDPR), the European Union’s landmark data privacy law, took effect in 2018. Even the world’s biggest businesses are not free from GDPR woes. Many businesses find it hard to implement GDPR requirements because the law is not only complex but also leaves a lot up to discretion.

GDPR 76
article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. alone, in fact, there are more than 5,000 cybersecurity vendors. They are responding to a trend of companies moving to meet rising compliance requirements, such as PCI-DSS and GDPR.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the SEC has drafted rules to require more formal cybersecurity reporting and disclosure. Also read: What is Cybersecurity Risk Management?

article thumbnail

China Releases Draft Regulations on Network Data Security Management

Hunton Privacy

The definition of “data handler” under the Draft Regulations is similar to that of “data controller” in other privacy laws, such as the EU General Data Protection Regulation (“GDPR”). Cybersecurity Review. The Draft Regulations clarify the conditions that trigger a cybersecurity review required by the CSL. Data Breach.

Security 116
article thumbnail

What is the NIS2 Directive and How Does It Affect You?

Thales Cloud Protection & Licensing

With the NIS Directive, the EU aimed to direct its members to develop national and cross-border cybersecurity norms and regulations. In 2020, the European Commission revised the Directive, to “further strengthen overall cybersecurity in the Union” to address emerging cyber threats. Security in network and information systems.

IT 71
article thumbnail

California Privacy Law Overhaul – Proposition 24 Passes

Data Matters

Third, it creates a new category of businesses: those that voluntarily agree to be subject to the CCPA. Businesses familiar with GDPR will recognize the reference to automated decision-making, as Article 22 gives data subjects similar opt-out rights. The CPRA creates a new category of information called “sensitive personal information.”

Privacy 122
article thumbnail

How to Develop an Incident Response Plan

eSecurity Planet

An incident is an event that affects our scope of responsibility, and a response is how we deal with the incident. For cybersecurity personnel, our scope of responsibility may be limited to cyberattacks on IT systems, such as ransomware attacks, phishing attacks, and DDoS attacks. What is an Incident Response Plan?

Insurance 125