312-253-4321    Get SUPPORT

Alchetec Blog

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.

The GDPR

Before the introduction of the GDPR, individual data privacy was largely an individual’s responsibility. To be fair, in non EU-affiliated circles, it largely still is, but the launch of the GDPR brought to light a lot of issues that people have been talking about for some time: mainly the use of their personal information for corporate financial gain. The GDPR was a response to concerns that some organizations were playing fast and loose with individual’s data that included personal information like names, addresses, email addresses, as well as medical and financial information. In profiting off the capture and sales of this information, the largest corporate tech companies created revenue off the backs of people, creating situations that were simply unfair to consumers and users of these services.

For years leading up to the ratification of the GDPR, EU member states had been legislating their own data protection laws. This trend has been roundly rejected in the United States, but with the implementation of the GDPR, corporations that see themselves as members of the global economy had strict new guidelines to meet in order to be able to use individuals’ data in the same manner as it had been. The GDPR was an amalgamation of these laws and firmly required all businesses to report certain types of personal data breaches within 72 hours to a supervisory authority mandated by EU member nations.

Not only did it give the consumer a voice in the ongoing data collection and distribution scheme, it made businesses cognizant just how important their data management is for the people they depend on. Before the GDPR was in the news, not many organizations were thinking about how a failure to protect customer, staff, and vendor information could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole.

One Year In

Now that the GDPR has been in place for a year, the results have been mixed. Over 59,000 personal data breaches have been identified by companies that have resulted in notifying regulators. Since sanctions for failing to comply with GDPR mandates carry fines up to €20 million, or up to 4 percent of total revenue from the previous year (whichever is larger), you are seeing a more targeted and strategic approach to keeping data secure, and reporting it quickly when a data breach does happen. To take a look at the results the GDPR had in its first eight months, download the DLA Piper GDPR data breach survey, here.

The takeaway is twofold. Firstly, the GDPR has resulted in a major improvement in data breach reporting speed. Since the mandate gives companies up to 72 hours to notify breached parties, it sets a strict deadline. You likely won’t see situations like the Yahoo! breach where they sat on the information for a year before letting anyone that was affected know they had been breached. The GDPR has also resulted in nearly doubling the amount of reported incidents, not an insignificant number.

On the other hand, fines adding up to €55,955,871 have been levied against the companies responsible for the 59,000 reported incidents, a modest amount for the first year when you consider that about 90 percent of that sum was a single fine levied against U.S. tech giant Google. A French GDPR regulator suggested that this be marked down to more of a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law with be if regulators aren’t actively enforcing it.

Effects Abroad

Many U.S. companies do business in mainland Europe and fall under the GDPR regulator's jurisdiction, but domestically, there has been a major change in the way data privacy is viewed. Over the past year, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit the fire of legislators, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”.

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. The state of California, not long after the GDPR went into effect, passed its own sweeping (and some would say hastily thrown together) data privacy law, the California Consumer Privacy Act, to protect the residents of the Golden State. Colorado, Massachusetts, and Ohio followed suit with privacy laws shortly after California’s CPA was ratified.

This is good news for individual privacy in the U.S. It’s a far cry from only a few short years ago that resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regards to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at 312-253-4321.

You Can Benefit from Productivity Consultations
Tip of the Week: Keyboard Shortcuts for Slack
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 16 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Network Security IT Services Malware Data Backup Hosted Solutions Hackers Privacy Data Software Outsourced IT Internet Email IT Support Computer Microsoft Data Recovery Innovation Managed IT Services Productivity Business Ransomware User Tips Tech Term Hardware Cloud Computing Business Continuity Small Business Efficiency Windows 10 Backup Managed IT Services Mobile Devices Collaboration IT Support Google Paperless Office Business Management Upgrade Remote Monitoring Android Phishing VoIP Communication Workplace Tips Managed Service Provider Office 365 Cybersecurity Managed IT Smartphone Smartphones Disaster Recovery Server Save Money Internet of Things Data Management Browser Encryption Mobile Device Help Desk Artificial Intelligence Passwords Communications Managed Service BYOD Saving Money Social Media Windows 10 Holiday Wi-Fi Quick Tips Document Management Windows Applications Microsoft Office Training Business Technology Facebook Employer-Employee Relationship Automation BDR Healthcare Compliance Risk Management Laptops Government Information Infrastructure SaaS Tip of the week Telephone Systems Bandwidth Unified Threat Management File Sharing Password Virtualization Antivirus Recovery Processor Going Green Network Vendor Management Vulnerability IT Management Scam Analytics Project Management Blockchain Chrome Work/Life Balance Bring Your Own Device IT Service Office Data Security Hosted Solution Customer Relationship Management Firewall Robot Data loss Storage Avoiding Downtime Gmail Website Tablet Miscellaneous App Files Wireless Mobility Mobile Device Management Maintenance Money Router RMM Two-factor Authentication Word Regulations Windows 7 Data Storage Politics VPN Access Control Virtual Reality Apps Downtime Electronic Medical Records Cooperation Virtual Private Network The Internet of Things Gadgets Mobile Security Outlook Digital Payment Upgrades Identity Theft Computers Licensing Monitoring Company Culture Big Data Users Recycling Software as a Service Computing Assessment Alert Customer Service Display Dark Web How To Patch Management Consultation Samsung Unified Communications Uninterrupted Power Supply How To Monitors Proactive Employees Redundancy Network Management Management Smart Technology Remote Monitoring and Management Net Neutrality Chromebook Professional Services Server Management HIPAA Settings Twitter Remote Workers Health Flexibility Operating System Networking Social Internet Exlporer Machine Learning Remote Computing IoT Printing Managed IT Service Cookies Remote Worker Data Breach Managed Services Hacker Mobile Computer Care WannaCry Office Tips Finance Hard Disk Drives Specifications Automobile Proactive Maintenance Fleet Tracking Tech Terms Google Drive User Management Cache Taxes Hard Disk Drive Bookmarks Emoji Social Networking IT Solutions Processors Current Events Permissions Star Wars Features Wasting Time Statistics SharePoint Mirgation High-Speed Internet Spyware Human Error Firefox Break Fix Nanotechnology ROI Technology Laws Legal Law Enforcement Vendor Staff Authentication Mail Merge USB Database Management Asset Tracking Theft Techology Personal Information Batteries Hotspot Unsupported Software Favorites Teamwork Shortcut Private Cloud Solid State Drives Black Friday Motherboard Lenovo Projects Fraud Utility Computing Disaster 3D Printing Electronic Health Records Database Bluetooth Downloads Update Migration Development MSP Permission GDPR Screen Reader Software Tips Consulting Notes Heating/Cooling Unified Threat Management Gadget Operations Managing Stress WiFi VoIP Dark Data Authorization Address Social Engineering OneNote Financial Time Management Disaster Resistance Virus Remote Work Language eWaste Mobile Data Conferencing Shared resources Technology Tips Options Cyber Monday Mobile Computing Apple Superfish Return on Investment Spam Cybercrime Cyberattacks Voice over Internet Protocol Multi-Factor Security Chatbots Cables Test Data Warehousing Smart Tech Managed Services Provider PowerPoint Servers User Error Wearable Technology Enterprise Content Management GPS YouTube Black Market Google Maps Search Employee-Employer Relationship Procurement Proactive IT Computer Repair Crowdsourcing File Management Computing Infrastructure Information Technology Meetings OneDrive Mouse Wireless Internet Notifications Active Directory Cost Management Travel Read Only Hacking Google Calendar Botnet Identity Supercomputer Microsoft Excel Connectivity Content Filtering History Point of Sale Printer Sports Vulnerabilities Tracking Network Congestion Wires Zero-Day Threat Physical Security Security Cameras Touchscreen IT Consulting Value of Managed Services Alerts Enterprise Resource Planning Corporate Profile Humor Instant Messaging Manufacturing Comparison Business Growth Employer/Employee Relationships Augmented Reality Distributed Denial of Service Modem WPA3 Windows Server Tech Support Hard Drive Solid State Drive Cortana Transportation Trending Legislation Wireless Technology 5G IT Budget End of Support Bitcoin IBM G Suite Cabling E-Commerce Virtual Assistant Websites Telephony Safety IT Technicians Geography Digital Education Backup and Disaster Recovery Marketing Budget Students Relocation Hiring/Firing Competition Regulation Sync IP Address Staffing Fun IT Consultant CrashOverride Mobile Device Managment Smart Devices Mobile Office Error Domains Administrator Hard Drives Sensors Public Cloud Public Speaking Presentation Lithium-ion battery Cleaning Hacks Motion Sickness Printers Emergency