Get Started Today!  (415) 295-4898

croom new

415 IT Blog

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.

The GDPR

Before the introduction of the GDPR, individual data privacy was largely an individual’s responsibility. To be fair, in non EU-affiliated circles, it largely still is, but the launch of the GDPR brought to light a lot of issues that people have been talking about for some time: mainly the use of their personal information for corporate financial gain. The GDPR was a response to concerns that some organizations were playing fast and loose with individual’s data that included personal information like names, addresses, email addresses, as well as medical and financial information. In profiting off the capture and sales of this information, the largest corporate tech companies created revenue off the backs of people, creating situations that were simply unfair to consumers and users of these services.

For years leading up to the ratification of the GDPR, EU member states had been legislating their own data protection laws. This trend has been roundly rejected in the United States, but with the implementation of the GDPR, corporations that see themselves as members of the global economy had strict new guidelines to meet in order to be able to use individuals’ data in the same manner as it had been. The GDPR was an amalgamation of these laws and firmly required all businesses to report certain types of personal data breaches within 72 hours to a supervisory authority mandated by EU member nations.

Not only did it give the consumer a voice in the ongoing data collection and distribution scheme, it made businesses cognizant just how important their data management is for the people they depend on. Before the GDPR was in the news, not many organizations were thinking about how a failure to protect customer, staff, and vendor information could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole.

One Year In

Now that the GDPR has been in place for a year, the results have been mixed. Over 59,000 personal data breaches have been identified by companies that have resulted in notifying regulators. Since sanctions for failing to comply with GDPR mandates carry fines up to €20 million, or up to 4 percent of total revenue from the previous year (whichever is larger), you are seeing a more targeted and strategic approach to keeping data secure, and reporting it quickly when a data breach does happen. To take a look at the results the GDPR had in its first eight months, download the DLA Piper GDPR data breach survey, here.

The takeaway is twofold. Firstly, the GDPR has resulted in a major improvement in data breach reporting speed. Since the mandate gives companies up to 72 hours to notify breached parties, it sets a strict deadline. You likely won’t see situations like the Yahoo! breach where they sat on the information for a year before letting anyone that was affected know they had been breached. The GDPR has also resulted in nearly doubling the amount of reported incidents, not an insignificant number.

On the other hand, fines adding up to €55,955,871 have been levied against the companies responsible for the 59,000 reported incidents, a modest amount for the first year when you consider that about 90 percent of that sum was a single fine levied against U.S. tech giant Google. A French GDPR regulator suggested that this be marked down to more of a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law with be if regulators aren’t actively enforcing it.

Effects Abroad

Many U.S. companies do business in mainland Europe and fall under the GDPR regulator's jurisdiction, but domestically, there has been a major change in the way data privacy is viewed. Over the past year, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit the fire of legislators, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”.

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. The state of California, not long after the GDPR went into effect, passed its own sweeping (and some would say hastily thrown together) data privacy law, the California Consumer Privacy Act, to protect the residents of the Golden State. Colorado, Massachusetts, and Ohio followed suit with privacy laws shortly after California’s CPA was ratified.

This is good news for individual privacy in the U.S. It’s a far cry from only a few short years ago that resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regards to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at (415) 295-4898.

You Can Benefit from Productivity Consultations
Tip of the Week: Keyboard Shortcuts for Slack
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Network Security Privacy Software Cloud Data Recovery Data Email Malware IT Support Outsourced IT IT Services Tech Term Business Internet Innovation Hackers Managed IT Services Computer Cloud Computing Business Management User Tips Small Business Collaboration Ransomware Windows 10 Microsoft Upgrade Hardware Efficiency Google Mobile Devices Android Paperless Office Server Phishing Business Continuity Managed Service Provider VoIp Encryption Communication Communications Remote Monitoring Vulnerability Smartphones Cybersecurity Browser Applications Internet of Things Managed IT services Passwords Artificial Intelligence Data Management Office 365 Business Technology Holiday Managed IT Laptops Managed Service Quick Tips Workplace Tips Backup Compliance Mobile Device Blockchain Smartphone Tip of the week Processor Employer-Employee Relationship Project Management Information Disaster Recovery Scam Wi-Fi Government Antivirus Save Money Document Management Bandwidth Saving Money Healthcare BYOD Automation Website Microsoft Office Windows Data Security BDR Infrastructure Vendor Management Two-factor Authentication IT Management Chrome Router Customer Relationship Management VPN Analytics Social Media Downtime Files Access Control Virtual Private Network The Internet of Things Company Culture Gmail Network Risk Management Unified Threat Management Cooperation Word Remote Workers IoT Software as a Service Net Neutrality Regulations Patch Management Management Server Management RMM Tablet File Sharing Internet Exlporer Data Loss Proactive Smart Technology Alert Storage Assessment Redundancy Maintenance HIPAA Bring Your Own Device Help Desk Remote Monitoring and Management Network Management Users Windows 7 Machine Learning Networking Operating System Consultation Mobile Security Employees Unified Communications Facebook Instant Messaging Time Management Settings Recycling Consulting Specifications 5G Development Virtual Assistant Heating/Cooling Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Digital Payment Hotspot Manufacturing Motherboard Chromebook Bookmarks ROI Operations Samsung Fleet Tracking Zero-Day Threat Virtualization Trending IT Consulting Cyberattacks Social Managed IT Service GDPR Connectivity Customer Service Transportation Statistics Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Cookies Cables SharePoint Wasting Time Servers Current Events Superfish Wireless Mouse Language Password Vulnerabilities Mail Merge User Error Favorites Apps Money Asset Tracking Backup and Disaster Recovery CIO applications Mobility Managing Stress Data Breach Read Only Security Cameras Break Fix MSP Finance Permissions Bluetooth Chatbots Point of Sale Tech Terms Cyber Monday Staff Recovery Employer/Employee Relationships Nanotechnology Wires Downloads Database Miscellaneous Mirgation Hard Drive Computing Infrastructure Hard Disk Drives Mobile Computing Address WiFi Conferencing Microsoft Excel Wearable Technology Star Wars Human Error Spam Enterprise Content Management Printing Dark Web Augmented Reality Notes Authentication Google Calendar Fraud Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Gadgets Proactive Maintenance App Avoiding Downtime Voice over Internet Protocol Websites Projects Cache Monitoring Electronic Medical Records Computing Alerts Solid State Drives Geography Meetings PowerPoint Display Utility Computing OneNote Permission Travel Social Networking Technology Laws Remote Worker Virtual Reality Emergency Multi-Factor Security Authorization Teamwork Identity Outlook Disaster Resistance Features Financial Firewall Cybercrime Screen Reader SaaS Return on Investment Remote Computing Comparison Licensing Options Modem High-Speed Internet Printer Politics Professional Services Training Tech Support Search How To Test Technology Tips OneDrive G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility WPA3 Legislation Touchscreen Shared resources Hacking Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech Regulation Twitter Education CEO Printers Marketing Students Daniel Stevens

Latest Blog

As you company grows, you will need to invest a good deal of the revenue that you take in to keep operations from falling into complacency. In order to get a good idea what investments would be most advantageous, doing a proactive ROI analysis of project you plan to undertak...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...