SlideShare a Scribd company logo
1 of 4
Download to read offline
How does GDPR Regulation
help in Data Protection and
Data Privacy?
© VISTA InfoSec ®
Data Protection and Data Privacy:
How are they different yet inter-related
General Data Protec on Regula on Act is a popular and widely accepted EU law that is concerned with
the data protec on and privacy of ci zens of the EU. It is said to be the most stringent data security and
privacy law enforced by the EU enforcement direc ves. Organiza ons that are subjected to the
Regula on need to understand the significance of the two broad categories of compliance, namely Data
Protec on and Data Privacy for its successful implementa on. Today’s ar cle covers details on how the
GDPR Regula on facilitates data protec on and data privacy of ci zens of the EU. The ar cle will briefly
shedalightontheregula onandexplainhowDataProtec onandDataPrivacyareinterrelated.
More than o en, organiza ons believe that by securing their sensi ve data they are also covered for the
data privacy regula on. But, that is not the case. Data Security and Data Privacy is o en interchangeably
used and has o en led to the ignorance of implemen ng necessary measures to cover both the essen al
aspects of the Regula on. It is cri cal that your business understands the difference and addresses the
two individually or it will have a significant impact on your business. Data Privacy is a part of the broader
spectrum of Data Protec on which is concerned with secure processing, storing, and management of
sensi ve data. So, while data protec on ensures securing of data from unauthorized access, data privacy
is about empowering individuals of their privacy rights. So, while Data Security protects sensi ve data
against external a ackers and malicious insiders, the Data Privacy governs how the data is collected,
shared, and used considering the individual’s consent for the same. The below-given table will precisely
outlinethedifferencesbetweenDataPrivacyandDataSecurity.
Data Security VS Data Privacy
Data Security Data Privacy
Data security focuses on protec ng sensi ve data against
unauthorizedaccessanduse.
It is more about protec ng the integrity of the data and ensuring
dataaccuracy,reliability,andavailabilitytoauthorizedpar es
Data security is for any kind of sensi ve data be it personal,
financial,oranyconfiden alinforma on.
Datasecurityistheresponsibilityoftheorganiza onshandlingand
usingthedata.
Dataprotec onaimsatsecuringinforma onfromhackers.
Data protec on is a mechanism to secure sensi ve data against
hackorthe .
Datasecuritymaynotnecessarilyincludedataprivacy
Data Privacy focuses on ensuring appropriate handling processing,
storage, and use of Personal Informa on and defines who has the
authorizedaccesspermission
It is about the rights of individuals with respect to their personal
informa on.
Datasecuritymaynotnecessarilyincludedataprivacy
Data privacy is more about securingthe personal informa on of an
individual.
The control of data privacy is in the hands of individuals who can
decideonhowtheirdatacanbeusedorshared
Data privacy aims at securing the data from being shared or sold
withouttheindividual'sconsent.
Data Privacy is a regula on comprising of policies and procedures
thathelpsgovernthedata.
© VISTA InfoSec ®
Basically, Data protec on is nothing but an amalgama on of security measures and privacy policies. Now
that we have covered the key differences between Data Security and Data privacy, let us move on to
understandtheGDPRRegula onandlearnhowithelpsindataprotec onanddataprivacy
GDPR Regulation
GeneralDataProtec onRegula onActisalawthataimsatsecuringthedataandprivacyofci zensofthe
EU. It is a Privacy law that has a direct impact on businesses around the world dealing with sensi ve data
of EU ci zens. GDPR mandates standards for companies that handle EU ci zens’ data to safeguard the
processingandmovementofci zens’personaldata.Theregula onclearlyoutlinescertainrequirements
pertaining to data protec on and data privacy for organiza ons to follow. All organiza ons falling in the
ambit of the regula on be it, small businesses to large enterprises, must be aware of all the data privacy
andsecurityrequirementsofGDPRandaccordinglycomplywithit.Movingahead,letusnowunderstand
whattheGDPRsaysaboutDataSecurityandDataPrivacy.
GDPR Regulation on Data Protection
If your organiza on falls under the ambit of GDPR Regula on your organiza on is expected to meet the
requirementsasstatedintheprotec onsandaccountabilityprinciplesoutlinedinAr cle5-6:
Data minimiza on- Organiza ons are expected to collect and process only as much data as absolutely
necessaryforthepurposesasspecified.
Integrity and Confiden ality of Data- The data collected must be processed in a way that ensures
appropriate security, integrity, and confiden ality of informa on. This can be achieved by adop ng the
techniqueofencryp on.
Accountability- The data controller is responsible for demonstra ng compliance with all of the standard
requirementssetintheGDPRRegula on.
Purpose limita on- The ar cle also clearly states that the organiza on must process data for the
legi matepurposesspecifiedexplicitlytothedatasubjectwhenyoucollectedit.
Lawfulness,fairness,andtransparency-TherequirementsoutlinedintheGDPRRegula onclearlystates
thattheprocessingofdatamustbedonefairly,lawfully,andwithcompletetransparency.
Data storage limita on — Organiza ons are allowed to store personal data for only as long as necessary
forthespecifiedpurpose.
Accuracy of Data- As per the stated requirements, organiza ons are expected to keep personal data
accurateanduptodate.
GDPR Regulation on Data Protection
The GDPR Regula on also lays out Data Privacy rights and principles for organiza ons to follow when
processing the personal informa on of ci zens of the EU. Ar cles 12-23 in Chapter 3 clearly draws out
principlesthattheorganiza onsareobligedtofacilitatedatasubjectrights.
© VISTA InfoSec ®
Right to Transparency in information, and communication for exercising
data subject rights-
Right to be informed- Data Subjects have the right to be informed about where their personal data is
collectedfrom,howtheyareprocessed,andtowhomtheyareshared.
Right to object- Data subject has the right to object the controller from collec ng or processing your
personal data. However, the controllercan overridethe objec on by providinga legi matebasis for using
thedata
Organiza ons are expected to communicate in a concise, transparent, intelligible, and easily accessible
form, using clear and plain language on how the data is processed. Further, organiza ons are expected to
inform and make it easy for people to make access requests, rec fy, erase or restrict the processing of
data.Organiza onsareexpectedtorespondtothoserequestsquicklyandadequately.
Right to access- Data subjects have the right to access informa on pertaining to their personal data from
the controller. The type of informa on that can be accessed may include the category of personal data,
the purpose of processing data, source of collected data, loca on of storing data, or dura on of storing
datatonameafew.
Right to rec fica on- Data subject has the right to demand rec fica on of inaccurate informa on of
theirpersonaldatawithoutanyunduedelay.
Right to erasure- Data subject has the right to demand erasure of their personal data without any undue
delay. This would include also the right to withdraw their consent of processing data at any point of me
consideredappropriatebythedatasubject.
Right to restrict processing of data- The data subject has the right to restrict the processing of data in the
pretext of them processing inaccurate informa on, illegal purpose, or processing beyond the original
purposespecified.
Right to data portability- The data subject has the right to receive their personal data in a structured,
commonly used, and machine-readable format. They further hold the right to transmit those data to
anothercontrollerwithouthindrancefromthecontrollerwhocurrentlyhasit.
Right to no fica on obliga on- Based on the data subject's right to restrict, object, or erasure of their
personal data, the controller is obliged to no fy and ensure the requests are met by the third-party with
whom they have shared the informa on. Right to object automa on of decision- Data subject has the
right not to be subjected to an automated decision of processing, including profiling, which have a legal
effect on him or her.For more details on the Data security and privacy rights outlined in the GDPR
Regula on,youcanrefertothelink h ps://gdpr.eu/tag/chapter-3/
Conclusion
Considering the growing concerns of Data Security and Privacy in the industry, the GDPR Regula on was
established and enforced across the EU. With its far-reaching implica ons on businesses globally,
organiza ons are now expected to implement the best prac ces to ensure Data Security and Privacy of
personal informa on. The purpose of imposing the regula on is to ensure consistency in the data
protec on and privacy laws across the EU and for organiza ons globally, if applicable to them. The
enforcement of the regula on has surely had a posi ve impact on the cyber security industry, ensuring
theimplementa onoftheindustry'sbestprivacylawforsecuringdata.
Wri enBy:-VISTAInfoSec
OriginalSource:- Cisomag.eccouncil
Do write to us your feedback, comments and queries or, if you have any requirements:
info@vistainfosec.com
You can reach us on:
© VISTA InfoSec ®
USA
+1-415-513 5261
INDIA
+91 73045 57744
SINGAPORE
+65-3129-0397
UK
+447405816761

More Related Content

Similar to How does GDPR Regulation help in Data Protection and Data Privacy?

The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical OverviewErnest Staats
 
A quick look at gdpr
A quick look at gdprA quick look at gdpr
A quick look at gdprCookieYes
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Data Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance StrategiesData Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance StrategiesShyamMishra72
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Michel Bitter
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupThe Pathway Group
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. dan hyde
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
Understanding GDPR: A Comprehensive Guide to Data Protection
Understanding GDPR: A Comprehensive Guide to Data ProtectionUnderstanding GDPR: A Comprehensive Guide to Data Protection
Understanding GDPR: A Comprehensive Guide to Data ProtectionShyamMishra72
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 

Similar to How does GDPR Regulation help in Data Protection and Data Privacy? (20)

Things to know about GDPR in 2018
Things to know about GDPR in 2018Things to know about GDPR in 2018
Things to know about GDPR in 2018
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
A quick look at gdpr
A quick look at gdprA quick look at gdpr
A quick look at gdpr
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Data Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance StrategiesData Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance Strategies
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway Group
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Understanding GDPR: A Comprehensive Guide to Data Protection
Understanding GDPR: A Comprehensive Guide to Data ProtectionUnderstanding GDPR: A Comprehensive Guide to Data Protection
Understanding GDPR: A Comprehensive Guide to Data Protection
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
Data protection
Data protectionData protection
Data protection
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

How does GDPR Regulation help in Data Protection and Data Privacy?

  • 1. How does GDPR Regulation help in Data Protection and Data Privacy? © VISTA InfoSec ® Data Protection and Data Privacy: How are they different yet inter-related General Data Protec on Regula on Act is a popular and widely accepted EU law that is concerned with the data protec on and privacy of ci zens of the EU. It is said to be the most stringent data security and privacy law enforced by the EU enforcement direc ves. Organiza ons that are subjected to the Regula on need to understand the significance of the two broad categories of compliance, namely Data Protec on and Data Privacy for its successful implementa on. Today’s ar cle covers details on how the GDPR Regula on facilitates data protec on and data privacy of ci zens of the EU. The ar cle will briefly shedalightontheregula onandexplainhowDataProtec onandDataPrivacyareinterrelated. More than o en, organiza ons believe that by securing their sensi ve data they are also covered for the data privacy regula on. But, that is not the case. Data Security and Data Privacy is o en interchangeably used and has o en led to the ignorance of implemen ng necessary measures to cover both the essen al aspects of the Regula on. It is cri cal that your business understands the difference and addresses the two individually or it will have a significant impact on your business. Data Privacy is a part of the broader spectrum of Data Protec on which is concerned with secure processing, storing, and management of sensi ve data. So, while data protec on ensures securing of data from unauthorized access, data privacy is about empowering individuals of their privacy rights. So, while Data Security protects sensi ve data against external a ackers and malicious insiders, the Data Privacy governs how the data is collected, shared, and used considering the individual’s consent for the same. The below-given table will precisely outlinethedifferencesbetweenDataPrivacyandDataSecurity. Data Security VS Data Privacy Data Security Data Privacy Data security focuses on protec ng sensi ve data against unauthorizedaccessanduse. It is more about protec ng the integrity of the data and ensuring dataaccuracy,reliability,andavailabilitytoauthorizedpar es Data security is for any kind of sensi ve data be it personal, financial,oranyconfiden alinforma on. Datasecurityistheresponsibilityoftheorganiza onshandlingand usingthedata. Dataprotec onaimsatsecuringinforma onfromhackers. Data protec on is a mechanism to secure sensi ve data against hackorthe . Datasecuritymaynotnecessarilyincludedataprivacy Data Privacy focuses on ensuring appropriate handling processing, storage, and use of Personal Informa on and defines who has the authorizedaccesspermission It is about the rights of individuals with respect to their personal informa on. Datasecuritymaynotnecessarilyincludedataprivacy Data privacy is more about securingthe personal informa on of an individual. The control of data privacy is in the hands of individuals who can decideonhowtheirdatacanbeusedorshared Data privacy aims at securing the data from being shared or sold withouttheindividual'sconsent. Data Privacy is a regula on comprising of policies and procedures thathelpsgovernthedata.
  • 2. © VISTA InfoSec ® Basically, Data protec on is nothing but an amalgama on of security measures and privacy policies. Now that we have covered the key differences between Data Security and Data privacy, let us move on to understandtheGDPRRegula onandlearnhowithelpsindataprotec onanddataprivacy GDPR Regulation GeneralDataProtec onRegula onActisalawthataimsatsecuringthedataandprivacyofci zensofthe EU. It is a Privacy law that has a direct impact on businesses around the world dealing with sensi ve data of EU ci zens. GDPR mandates standards for companies that handle EU ci zens’ data to safeguard the processingandmovementofci zens’personaldata.Theregula onclearlyoutlinescertainrequirements pertaining to data protec on and data privacy for organiza ons to follow. All organiza ons falling in the ambit of the regula on be it, small businesses to large enterprises, must be aware of all the data privacy andsecurityrequirementsofGDPRandaccordinglycomplywithit.Movingahead,letusnowunderstand whattheGDPRsaysaboutDataSecurityandDataPrivacy. GDPR Regulation on Data Protection If your organiza on falls under the ambit of GDPR Regula on your organiza on is expected to meet the requirementsasstatedintheprotec onsandaccountabilityprinciplesoutlinedinAr cle5-6: Data minimiza on- Organiza ons are expected to collect and process only as much data as absolutely necessaryforthepurposesasspecified. Integrity and Confiden ality of Data- The data collected must be processed in a way that ensures appropriate security, integrity, and confiden ality of informa on. This can be achieved by adop ng the techniqueofencryp on. Accountability- The data controller is responsible for demonstra ng compliance with all of the standard requirementssetintheGDPRRegula on. Purpose limita on- The ar cle also clearly states that the organiza on must process data for the legi matepurposesspecifiedexplicitlytothedatasubjectwhenyoucollectedit. Lawfulness,fairness,andtransparency-TherequirementsoutlinedintheGDPRRegula onclearlystates thattheprocessingofdatamustbedonefairly,lawfully,andwithcompletetransparency. Data storage limita on — Organiza ons are allowed to store personal data for only as long as necessary forthespecifiedpurpose. Accuracy of Data- As per the stated requirements, organiza ons are expected to keep personal data accurateanduptodate. GDPR Regulation on Data Protection The GDPR Regula on also lays out Data Privacy rights and principles for organiza ons to follow when processing the personal informa on of ci zens of the EU. Ar cles 12-23 in Chapter 3 clearly draws out principlesthattheorganiza onsareobligedtofacilitatedatasubjectrights.
  • 3. © VISTA InfoSec ® Right to Transparency in information, and communication for exercising data subject rights- Right to be informed- Data Subjects have the right to be informed about where their personal data is collectedfrom,howtheyareprocessed,andtowhomtheyareshared. Right to object- Data subject has the right to object the controller from collec ng or processing your personal data. However, the controllercan overridethe objec on by providinga legi matebasis for using thedata Organiza ons are expected to communicate in a concise, transparent, intelligible, and easily accessible form, using clear and plain language on how the data is processed. Further, organiza ons are expected to inform and make it easy for people to make access requests, rec fy, erase or restrict the processing of data.Organiza onsareexpectedtorespondtothoserequestsquicklyandadequately. Right to access- Data subjects have the right to access informa on pertaining to their personal data from the controller. The type of informa on that can be accessed may include the category of personal data, the purpose of processing data, source of collected data, loca on of storing data, or dura on of storing datatonameafew. Right to rec fica on- Data subject has the right to demand rec fica on of inaccurate informa on of theirpersonaldatawithoutanyunduedelay. Right to erasure- Data subject has the right to demand erasure of their personal data without any undue delay. This would include also the right to withdraw their consent of processing data at any point of me consideredappropriatebythedatasubject. Right to restrict processing of data- The data subject has the right to restrict the processing of data in the pretext of them processing inaccurate informa on, illegal purpose, or processing beyond the original purposespecified. Right to data portability- The data subject has the right to receive their personal data in a structured, commonly used, and machine-readable format. They further hold the right to transmit those data to anothercontrollerwithouthindrancefromthecontrollerwhocurrentlyhasit. Right to no fica on obliga on- Based on the data subject's right to restrict, object, or erasure of their personal data, the controller is obliged to no fy and ensure the requests are met by the third-party with whom they have shared the informa on. Right to object automa on of decision- Data subject has the right not to be subjected to an automated decision of processing, including profiling, which have a legal effect on him or her.For more details on the Data security and privacy rights outlined in the GDPR Regula on,youcanrefertothelink h ps://gdpr.eu/tag/chapter-3/
  • 4. Conclusion Considering the growing concerns of Data Security and Privacy in the industry, the GDPR Regula on was established and enforced across the EU. With its far-reaching implica ons on businesses globally, organiza ons are now expected to implement the best prac ces to ensure Data Security and Privacy of personal informa on. The purpose of imposing the regula on is to ensure consistency in the data protec on and privacy laws across the EU and for organiza ons globally, if applicable to them. The enforcement of the regula on has surely had a posi ve impact on the cyber security industry, ensuring theimplementa onoftheindustry'sbestprivacylawforsecuringdata. Wri enBy:-VISTAInfoSec OriginalSource:- Cisomag.eccouncil Do write to us your feedback, comments and queries or, if you have any requirements: info@vistainfosec.com You can reach us on: © VISTA InfoSec ® USA +1-415-513 5261 INDIA +91 73045 57744 SINGAPORE +65-3129-0397 UK +447405816761