Sign In
Small logos Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
  • Platforms
    The New Google Algorithm Update for 2021
    Google algorithm update for 2021
    Google

    Google is continuously making improvements to its algorithm and how websites are ranked on its organic search results page. This…

    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service-Partner-Horizontal
    Oracle

    ORACLE OPENWORLD — Oracle today announced that the Oracle Cloud Platform has been validated to develop applications using India Stack…

    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    Oracle

    Oracle today announced that AT&T signed an agreement to move thousands of its large scale internal databases to Oracle’s Cloud…

    3 Min Read
    IBM and Andrés Cepeda introduce First ‘Cognitive Music’ Project in Latin America
    IBM-Watson
    IBM

    IBM (NYSE: IBM) and Grammy-winning Colombian singer, songwriter and producer Andrés Cepeda will partner to collaboratively compose the artist’s next…

    3 Min Read
    Alpine Consulting Launches New eCommerce Website for Dana Rebecca
    IBM

    The new website will provide clients with the ability to more easily browse the latest innovations and designs in the…

    2 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR

    RISMA Systems was founded in 2014 by Lars Nybro Munksgaard, who initially developed a system that helped accountants and lawyers…

    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest-Minds
    GDPR

    We are currently living in two different worlds – the digital world and the physical one. One day the twain…

    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv
    GDPR

    As a professional services business operating in a world driven by data and technology, Gemserv like many businesses,  finds itself…

    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    GDPR

    Enterprises often restrict their privacy management strategy to customer data only. Though it is the personal data of employees, spread…

    6 Min Read
    Alert Logic: Quick, Accurate Threat Detection is Best Defense Against GDPR Non-Compliance
    Alert-Logic
    GDPR

    The General Data Protection Regulation (GDPR) went into effect two years ago. The European Union established strong, common standards for…

    7 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Reading: Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • Home
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Entrepreneurs View
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Functions > GDPR > Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
GDPR

Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA

CEO
Last updated: 2022/05/24 at 6:14 AM
CEO
Share
SHARE

As we fast approach the second anniversary of the implementation of GDPR, the impact it has had on businesses and driving change has been substantial. Initially, many were sceptical of the EU’s adoption of data protection change. But, driven by the need to replace previous data protection rules across Europe that were almost two decades old – with some of them first being drafted in the 1990s – the new regime has sparked a data management revolution that was long overdue. In the last twenty years, we have led data-heavy lifestyles, with people routinely sharing their personal information freely online. GDPR has helped to harmonise data privacy laws across the EU, as well as providing greater protection and rights to individuals. The impact of these laws has dramatically altered how businesses and other organisations can handle the information of all those that interact with them.

DATA LOSS OCCURS WHEN DATA IS ACCIDENTALLY DELETED, SHARED OR SOMETHING CAUSES DATA TO BECOME CORRUPTED

Global Impact

Last year, the ICO’s combined fines for British Airways and   Marriott   International was an eyewatering £275,787,290 (€314,990,200) grabbing many headlines and highlighting to organisations changing their business processes would be of the utmost importance. In 2020, the impact of GDPR is not only being seen in Europe where countries such as Germany, Bulgaria, and Spain have imposed more fines than the UK. The global impact has seen the US follow suit with the California Consumer Privacy Act (CCPA) kicking into action in January, as well as countries such as Bahrain introducing its Personal Data Protection Law last year and Singapore publishing a factsheet to help businesses better understand the GDPR when applied to the Singaporean context.

Importance of Data and its Role within your Organisation

With the increasing amount of data from new and emerging technologies, ensuring that it is being controlled and shared effectively becomes even more paramount. Data loss is a serious problem for businesses of all sizes— losing files means losing time and money to restore or recover information that is essential to your business, plus being exposed to the risk of legal repercussions if the data loss infringes customers’ privacy rights. Data loss occurs when data is accidentally deleted, shared or something causes data to become corrupted. From an enterprise point of view, we are still seeing human error as a leading cause of data loss for businesses, with 50% being attributed to inadequate or poorly observed business processes.

Before any best practice solution or loss prevention strategy can be rolled out, it is important for an organisation to understand exactly what data they hold and the potential risks to its security. This means establishing the types of data that are being held, collected, stored, and where it is located. Alongside this, it is important to understand why the business has it, how sensitive it is, and who is accessing, using, or sharing it.

Privacy by Design

One of the best methodologies that an organisation can use to fulfill its compliance obligations is Privacy by Design approach. The framework achieved international acceptance when the International Assembly of Privacy Commissioners and Data Protection Authorities unanimously passed a resolution in 2010. This approach takes privacy into account throughout the whole process, ensuring that it is incorporated into an organisation’s systems, policies, and processes, and technologies. Privacy by Design needs to start with data classification. The sheer volume of unstructured data within organisations, combined with the ever-increasing technical abilities of hackers and the fallibility of employees, makes it impossible to rely on people and processes alone to ensure that sensitive data is handled appropriately. Data classification embeds a culture of compliance by involving users to identify, manage, and control the regulated data they work with while automating parts of the protection process to enforce rules and policies consistently.

Data Classification

The key with this approach is that data is classified at the source so the organisation’s rules can be applied at the outset. As mentioned before, it is important to understand what data you have, who is using it, how it is being stored, used and shared, and whether it is company-sensitive; this is key to any data protection strategy. Once you have defined what data you have, you will be able to classify and protect it.

Data classification is the categorisation of data according to its level of sensitivity or value, using labels. These are attached as visual markings and metadata within the file. When classification is applied to the metadata, it ensures that the data can only be accessed or used in accordance with the rules that correspond with its label. Clearly you need to define your classification policy first and decide who should have access to each type of data. Once this has been done, it is simply the case of selecting an appropriate classification tool.

Best Practice in the Future

As cumulative fines across EU reach £ 410,772,087 (€ 467,476,268), organisations need to ensure that by using approaches such as Privacy by Design they can mitigate the threat that unsecured data poses to the business. As we live in an evolving world, businesses cannot take a ‘tick box’, point-in-time approach. Legislation, threats, and the business itself will constantly evolve, while demands from regulators and the board for better governance will continue to intensify. Ongoing measurement of the effectiveness of security policy is the only way to check that the controls the business has put in place remain fit for purpose. The monitoring of classification activities is a powerful way of doing this and improves the chances that a breach will be quickly detected – helping the business to comply with notification periods required by regulators, as well as to minimise damage. If there is a breach, the detailed audit information that robust classification provides will allow a business to demonstrate that the appropriate steps to protect data were taken. This is a critical aspect of complying with increasingly weighty privacy regulation and ensuring that data continues to be an asset that powers the business, rather than a threat to its bottom line.

CEO June 25, 2020
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article Alert-Logic Alert Logic: Quick, Accurate Threat Detection is Best Defense Against GDPR Non-Compliance
Next Article ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Joel-Christner-VP-of-Marketing

CloudGenix: Application-Centric WAN For Better Business Operations

Business wide-area networks (WANs) have undergone a critical shift in…

August 7, 2020
Micro Blog
25 Business Ideas for Entering Toronto’s Hospitality Industry

Toronto, with its diverse culture, vibrant neighborhoods, and a steady influx of…

9 Min Read
NVISNx
ENTREPRENEUR VIEWS
NVISNx: Revolutionizing The Way Companies Govern & Manage Data Risk

INTRODUCTION: While it was predicted that the global workspaces would have to…

9 Min Read
Right Laptop
Micro Blog
How to Find the Right Laptop for a Student

A laptop is probably the most powerful tool a modern student can…

8 Min Read
ENTREPRENEUR VIEWS
Lanconic Inc.: Agile For Advanced Human Resources

Technology has witnessed massive growth in the last two decades and Agile…

5 Min Read

Skybridge Americas: Revolutionizing Customer Service With Talent and IT Innovation

Investing in customer experience has proven…

September 18, 2023

YELLOW BRICK ROAD: Unleashing Child’s Imagination With Unique Child Care Programs

Early childhood offers a critical window…

September 18, 2023

The ROI Of A Clean Workplace: Unseen Benefits Revealed

The ROI Of A Clean Workplace:…

September 18, 2023

PATRICK R. RICCARDS: Transforming The Teaching And Learning 0f American History

An exceptional visionary and dynamic leader,…

September 15, 2023

You Might Also Like

Risma Systems
ENTREPRENEUR VIEWSGDPR

RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance

RISMA Systems was founded in 2014 by Lars Nybro Munksgaard, who initially developed a system that helped accountants and lawyers…

9 Min Read
Happiest-Minds
GDPR

Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses

We are currently living in two different worlds – the digital world and the physical one. One day the twain…

8 Min Read
Gemserv
GDPR

Gemserv: GDPR 2020 and Beyond

As a professional services business operating in a world driven by data and technology, Gemserv like many businesses,  finds itself…

9 Min Read
GDPR

ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL

Enterprises often restrict their privacy management strategy to customer data only. Though it is the personal data of employees, spread…

6 Min Read
Small logos Small logos

© 2023 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?