Remove category general
article thumbnail

What Is Data Minimisation? Definition & Examples

IT Governance

Data minimisation is a key part of information security and the GDPR (General Data Protection Regulation) in particular. Its principles are at the heart of effective data protection practices, and are intended to prevent privacy breaches and minimise the damage when security incidents occur. What is data minimisation?

GDPR 132
article thumbnail

GDPR compliance checklist

IBM Big Data Hub

The General Data Protection Regulation (GDPR) is a European Union (EU) law that governs how organizations collect and use personal data. Any company operating in the EU or handling EU residents’ data must adhere to GDPR requirements. However, GDPR compliance is not necessarily a straightforward matter.

GDPR 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The General Data Protection Regulation (GDPR), the European Union’s landmark data privacy law, took effect in 2018. Even the world’s biggest businesses are not free from GDPR woes. Many businesses find it hard to implement GDPR requirements because the law is not only complex but also leaves a lot up to discretion.

GDPR 78
article thumbnail

GDPR: lawful bases for processing, with examples

IT Governance

Under the EU GDPR (General Data Protection Regulation) , you need to identify a lawful basis before processing personal data. Except for special categories of personal data (sensitive data) , which you cannot process except under certain circumstances, there are six lawful bases for processing. First published June 2018.

GDPR 92
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S.

article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

Insider threats are one of the most difficult security challenges that organisations face. Preventing this from happening requires a nuanced approach to information security, and it’s one that organisations are increasingly struggling with. Insider threats fall into two categories: malicious or negligent.

article thumbnail

GDPR: lawful bases for processing, with examples

IT Governance

What is a lawful basis for processing under the GDPR? Like the Data Protection Act 1998 (DPA 1998) that it superseded, the General Data Protection Regulation (GDPR) sets out six lawful bases for processing personal data. Lawful processing under the GDPR. Do you always need individuals’ consent to process their data?

GDPR 70