Remove category
article thumbnail

China Releases National Standard on Personal Information Security

Hunton Privacy

On January 25, 2018, the Standardization Administration of China published the full text of the Information Security Technology – Personal Information Security Specification (the “Specification”). The use of personal information must not go beyond the purpose stated when collecting it.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The GDPR puts forth a litany of rules for how organizations in and outside of Europe handle the personal data of EU residents. The details of any organization’s plan to become fully GDPR compliant will vary based on the data the organization collects and what it does with that data.

GDPR 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Releases Draft Regulations on Network Data Security Management

Hunton Privacy

The definition of “data handler” under the Draft Regulations is similar to that of “data controller” in other privacy laws, such as the EU General Data Protection Regulation (“GDPR”). Data Breach. Records Retention When Transferring Data to Third Parties. Cybersecurity Review.

Security 116
article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

Provide information and advice. The CNIL provides practical advice to the management and the operational staff who process personal data, in order to ensure that such processing is carried out in compliance with the applicable data protections laws. The DPO is the key contact for the CNIL and data subjects.

GDPR 116
article thumbnail

Dutch DPA Updates Policy on Administrative Fines

Hunton Privacy

The Dutch DPA divided qualifying infringements into three or four categories. It assigned each category a specific penalty bandwidth ( i.e. , a range between a minimum fine and a maximum fine), as well as a basic fine. In certain cases, the Dutch DPA may also consider the financial situation of the data controller or processor.

GDPR 55
article thumbnail

Why risk assessments are essential for GDPR compliance

IT Governance

However, the GDPR is clear that data is also vulnerable to accidental or unlawful destruction, loss or disclosure. The ways in which these could happen need to be identified at every stage of the data handling process. GDPR: What’s the difference between personal data and sensitive data? Get started with vsRisk.

GDPR 71
article thumbnail

European Commission Proposes Revised Standard Contractual Clauses

Data Matters

The publication of the EC’s Draft comes just one day after the European Data Protection Board (EDPB) published its draft recommendations describing how controllers and processors transferring personal data outside the European Economic Area (EEA) may comply with the Schrems II ruling.