Data Privacy Laws | Cybersecurity Insights #12
Absolute Absolute
2.76K subscribers
22,192 views
220

 Published On Feb 26, 2019

In this episode, we discuss some of the laws designed to protect the privacy of personal information. Visit https://www.absolute.com/solutions/us... to learn more.

The most well-known is the EU’s General Data Protection Regulation (GDPR). Under GDPR, an organization must demonstrate that security safeguards are active, up-to-date, and working effectively. Or risk substantial fines.

GDPR has set the standard for other regulations around the world, but Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) comes pretty close. Most notable with PIPEDA is the need to prove your security posture was airtight when the incident happened, not just whether data was stolen.

What about data privacy laws in the US? Well, we find laws such as HIPAA (for health information) and S-P and S-ID statutes for financial records, enforced by the SEC. There is also the California Consumer Privacy Act (CCPA). But no national privacy standard. Yet.

Data Privacy is today's greatest challenge for IT and security teams, and with 35% of sensitive data out-of-sight on endpoints, there has never been a stronger need for persistent endpoint visibility and control.

----

Want to learn more about how to reduce your risk exposure? Arm your organization against potential threats with the steps outlined in this eBook: “3 Overlooked Data Privacy Considerations”: https://www.absolute.com/customer-res...

Find out more about how Absolute Software can help you protect the privacy of your data: https://www.absolute.com/solutions/us...

----

Watch more episodes of the Cybersecurity Insights series:
#1 - HIPAA Privacy Rule -    • HIPAA Privacy Rule | Cybersecurity In...  
#2 - HIPAA Security Rule:    • HIPAA Security Rule | Cybersecurity I...  
#3 - HITRUST Cybersecurity Framework:    • HITRUST Cybersecurity Framework | Cyb...  
#4 - NIST Cybersecurity Framework:    • NIST Cybersecurity Framework Explaine...  
#5 - NIST CSF - Identify:    • NIST CSF - Identify | Cybersecurity I...  
#6 - NIST CSF - Protect:    • NIST CSF -  Protect | Cybersecurity I...  
#7 - NIST CSF - Detect:    • NIST CSF - Detect | Cybersecurity Ins...  
#8 - NIST CSF - Respond:    • NIST CSF - Respond | Cybersecurity In...  
#9 - NIST CSF - Recover:    • NIST CSF - Recover | Cybersecurity In...  
#10 - Lost/Stolen Device:    • Lost & Stolen Device | Cybersecurity ...  
#11 - Data Privacy explained:    • Data Privacy Explained | Cybersecurit...  
#12 - Data Privacy laws:    • Data Privacy Laws | Cybersecurity Ins...  
#13 - Data Privacy Tips:    • Data Privacy Tips | Cybersecurity Ins...  
#14 - Top Cybersecurity Threats:    • Top Cybersecurity Threats | Cybersecu...  
#15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware:    • Phishing and Malware: Viruses, Trojan...  
#16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained    • Zombie Computers, Botnets, and Denial...  
#17 - Zero Trust Explained:    • Zero Trust Explained | Cybersecurity ...  
#18 - 5 Most Devastating Cyber Attacks:    • 5 Most Devastating Cyber Attacks | Cy...  
#19 - Dealing with IT Complexity:    • Dealing with IT Complexity | Cybersec...  

show more

Share/Embed