312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.

The GDPR

Before the introduction of the GDPR, individual data privacy was largely an individual’s responsibility. To be fair, in non EU-affiliated circles, it largely still is, but the launch of the GDPR brought to light a lot of issues that people have been talking about for some time: mainly the use of their personal information for corporate financial gain. The GDPR was a response to concerns that some organizations were playing fast and loose with individual’s data that included personal information like names, addresses, email addresses, as well as medical and financial information. In profiting off the capture and sales of this information, the largest corporate tech companies created revenue off the backs of people, creating situations that were simply unfair to consumers and users of these services.

For years leading up to the ratification of the GDPR, EU member states had been legislating their own data protection laws. This trend has been roundly rejected in the United States, but with the implementation of the GDPR, corporations that see themselves as members of the global economy had strict new guidelines to meet in order to be able to use individuals’ data in the same manner as it had been. The GDPR was an amalgamation of these laws and firmly required all businesses to report certain types of personal data breaches within 72 hours to a supervisory authority mandated by EU member nations.

Not only did it give the consumer a voice in the ongoing data collection and distribution scheme, it made businesses cognizant just how important their data management is for the people they depend on. Before the GDPR was in the news, not many organizations were thinking about how a failure to protect customer, staff, and vendor information could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole.

One Year In

Now that the GDPR has been in place for a year, the results have been mixed. Over 59,000 personal data breaches have been identified by companies that have resulted in notifying regulators. Since sanctions for failing to comply with GDPR mandates carry fines up to €20 million, or up to 4 percent of total revenue from the previous year (whichever is larger), you are seeing a more targeted and strategic approach to keeping data secure, and reporting it quickly when a data breach does happen. To take a look at the results the GDPR had in its first eight months, download the DLA Piper GDPR data breach survey, here.

The takeaway is twofold. Firstly, the GDPR has resulted in a major improvement in data breach reporting speed. Since the mandate gives companies up to 72 hours to notify breached parties, it sets a strict deadline. You likely won’t see situations like the Yahoo! breach where they sat on the information for a year before letting anyone that was affected know they had been breached. The GDPR has also resulted in nearly doubling the amount of reported incidents, not an insignificant number.

On the other hand, fines adding up to €55,955,871 have been levied against the companies responsible for the 59,000 reported incidents, a modest amount for the first year when you consider that about 90 percent of that sum was a single fine levied against U.S. tech giant Google. A French GDPR regulator suggested that this be marked down to more of a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law with be if regulators aren’t actively enforcing it.

Effects Abroad

Many U.S. companies do business in mainland Europe and fall under the GDPR regulator's jurisdiction, but domestically, there has been a major change in the way data privacy is viewed. Over the past year, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit the fire of legislators, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”.

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. The state of California, not long after the GDPR went into effect, passed its own sweeping (and some would say hastily thrown together) data privacy law, the California Consumer Privacy Act, to protect the residents of the Golden State. Colorado, Massachusetts, and Ohio followed suit with privacy laws shortly after California’s CPA was ratified.

This is good news for individual privacy in the U.S. It’s a far cry from only a few short years ago that resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regards to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at 312-253-4321.

You Can Benefit from Productivity Consultations
Tip of the Week: Keyboard Shortcuts for Slack
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, June 03 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Data Data Backup Network Security IT Services Privacy Hosted Solutions IT Support Software Malware Internet Email Hackers Efficiency Outsourced IT Microsoft Innovation Data Recovery Computer Business Business Continuity Hardware Small Business Cloud Computing Cybersecurity Mobile Devices Managed IT Services Productivity Managed IT Services Google Ransomware Collaboration Tech Term Backup User Tips Upgrade Communication Phishing Business Management Windows 10 VoIP Workplace Tips IT Support Mobile Device Android Paperless Office Disaster Recovery Smartphones Remote Monitoring Data Management Managed Service Office 365 Managed Service Provider Managed IT Smartphone Server Communications Quick Tips Internet of Things Passwords Network Save Money Browser Social Media Facebook Encryption Wi-Fi BDR Virtualization Help Desk Holiday Artificial Intelligence Miscellaneous Saving Money Healthcare Compliance Windows 7 Health Government Document Management Business Technology BYOD Windows 10 Employer-Employee Relationship Automation Password Remote Work Vendor Management Risk Management Laptops Microsoft Office Windows Applications Training File Sharing Bandwidth Unified Threat Management Two-factor Authentication Recovery Mobility Antivirus Redundancy Processor Going Green Vulnerability Apps Maintenance IT Management Scam Analytics Project Management Chrome Users Blockchain Information Office Data Security Infrastructure SaaS Data loss Storage Tip of the week Avoiding Downtime Telephone Systems App Files Proactive Meetings OneDrive Money Router Data Storage RMM Word Regulations Gadgets Politics Flexibility VPN Customer Relationship Management Big Data Machine Learning IoT Website Access Control Virtual Reality Bring Your Own Device Virtual Private Network IT Service Work/Life Balance Hosted Solution Computers Robot Firewall Company Culture Wireless Software as a Service Computing Tablet Mobile Device Management Gmail Display Assessment Alert Utility Computing Electronic Health Records Dark Web How To Consulting Patch Management Apple Time Management Augmented Reality Social Network How To Monitors Consultation Samsung Unified Communications Uninterrupted Power Supply Employees Managed Services Provider Smart Technology Search Employee-Employer Relationship Network Management File Management Management The Internet of Things Chromebook Remote Monitoring and Management Net Neutrality Payment Cards HIPAA Settings Twitter Professional Services Server Management Remote Workers Co-Managed IT Operating System Networking Social Internet Exlporer Hard Drive Solid State Drive Remote Computing Printing Customer Service Downtime Electronic Medical Records Managed Services Cooperation Digital Payment Mobile Office Covid-19 Mobile Security Outlook Identity Theft Upgrades Licensing Monitoring Recycling Update Cyber security Migration Development MSP Permission Lenovo Projects Gamification Fraud Disaster 3D Printing Database Bluetooth Downloads Operations Managing Stress WiFi VoIP Dark Data Authorization Address GDPR Digitize Screen Reader Software Tips Notes Heating/Cooling Unified Threat Management Gadget Smart Devices Mobile Data Conferencing Shared resources Technology Tips Options Credit Cards Cyber Monday Mobile Computing Social Engineering OneNote Financial Disaster Resistance Virus Language eWaste Multi-Factor Security Chatbots Cables Test Superfish Return on Investment Outsource IT Cybercrime Cyberattacks Voice over Internet Protocol Wearable Technology Enterprise Content Management GPS YouTube Tech Support Black Market Shadow IT Data Warehousing Smart Tech PowerPoint Servers Wireless Technology User Error 5G Sensors IBM Mouse Wireless Internet Holidays Google Maps Procurement Proactive IT Safety Computer Repair Crowdsourcing Computing Infrastructure Information Technology Hacking Google Calendar Botnet Windows Server 2008 Identity Supercomputer Hacker Notifications Active Directory Laptop Cost Management Travel Read Only Vulnerabilities Tracking Network Congestion Wires Zero-Day Threat Budget Physical Security Outsourcing Microsoft Excel Connectivity Content Filtering History Point of Sale Printer Sports Corporate Profile Humor Instant Messaging Manufacturing Comparison Business Growth Employer/Employee Relationships IT Distributed Denial of Service Modem Security Cameras Touchscreen IT Consulting Value of Managed Services Alerts Enterprise Resource Planning Transportation Trending Legislation IT Budget End of Support WPA3 Windows Server Remote Working Cortana Telephone IT Technicians Geography Digital Education Backup and Disaster Recovery Bitcoin Video Conferencing G Suite Cabling E-Commerce Virtual Assistant Websites Telephony Computer Care WannaCry Office Tips Finance Hard Disk Drives Specifications Automobile Proactive Maintenance Business Telephone Managed IT Service Cookies Remote Worker Data Breach Mobile Bookmarks Emoji Optimization Social Networking Fleet Tracking Tech Terms Google Drive User Management Cache Taxes Hard Disk Drive Mobile VoIP Mirgation High-Speed Internet Spyware Human Error Firefox IT Solutions Processors Current Events Biometric Permissions Star Wars Features Wasting Time Statistics SharePoint Authentication Mail Merge Spam USB Database Management IT Assessment Break Fix Nanotechnology ROI Technology Laws Legal Law Enforcement Vendor Staff Favorites Teamwork Shortcut Private Cloud Solid State Drives Virtual Machines Black Friday Motherboard Asset Tracking Theft Techology Personal Information Batteries Hotspot Unsupported Software CrashOverride Public Speaking Mobile Device Managment Presentation Error Administrator Lithium-ion battery Hard Drives Public Cloud Marketing Competition Cleaning IP Address Hacks Motion Sickness Printers Emergency Students Relocation Regulation Hiring/Firing Domains Staffing Sync Fun IT Consultant