EU Data Protection Regulation



EU (European Union) Data Protection Regulation: Solutions



Hold data on EU citizens? Check if you'll be compliant with the new Data Protection Regulation




About European Union Data Protection Directive


The EU General Data Protection Regulation is set to drastically change data protection law for International organisations, including an increase in penalties for a breach up to 2% of a corporation’s annual global turnover.


Encrypting and storing sensitive data on a secure server and enforcing multiple layers of access control should be a best practice for keeping data safe.


European Union (EU) regulatory framework that aims to protect the privacy of personal data within the EU. Implemented in 1995, the directive requires all member countries of the EU to enact laws to enforce these regulations. The EU data protection regulations are stricter and more comprehensive than those in the United States. As a result, U.S. companies that handle data from EU citizens must put extra measures into place to comply with the directive under the so-called “US-EU Safe Harbour” agreement. Data security is just one aspect of the Data Protection Directive. Compliance with the directive and protection under safe harbour requires robust encryption and key management that ensures the privacy and confidentiality of citizen records.

The Directive also covers the processing of information such as any manual or automatic operation on personal data, including its collection, recording, organisation, storage, modification, retrieval, use, transmission, dissemination or publication, and even blocking, erasure or destruction. One of the primary principles within the Directive is data security:

Once collected, personal data should be kept safe and secure from potential abuse, theft, or loss.

Organisations must therefore protect themselves from data loss or compromise by implementing and enforcing a data protection strategy that complies with the Directive.




Encryption


Certain member countries such as Spain, Italy, France, Austria, and Belgium require encryption for certain categories of data, and/or written security policies that specifically address encryption.

Encryption renders the data unusable, unreadable, and indecipherable to unauthorised individuals in the case of a security breach.

Strong key management techniques ensure that the key is protected with several layers of advanced cryptography and is always stored separate from the encrypted files.




EU Data Protection Directive requirement



Secure data at rest within the organisation


File, folder and removable media encryption as standard to secure data at the endpoint.

Secure data in transit


Full-disk and removable media encryption to secure data on the move. 


Secure data for mobile / home working practices


Installation on a privately owned PC. adds portable encryption to any usb storage device.

Secure transfer of data between locations


Outlook plug-in, clipboard encryption compatible with all mail clients including webmail, and attachment encryption for any system. 


Block / Limit access to certain data


Key-sharing technology make it simple to deploy and manage complex, multi-layered teams and workgroups.


Secure safe storage of personal data

FIPS-140-2 validated for secure industry standard encryption algorithms and methods. 


Secure destruction of redundant data


Securely delete data to the DoD-5220.2 M standard ensuring that it is completely unrecoverable. 





BYOD


Bring Your Own Device / Endpoint Security

Article 31
contains the first new data breach notification requirement. Firstly, under this provision of the new law organisations must notify the authorities about data breaches “without undue delay and, if feasible not later than 24 hours after the breach”.

Countries including Germany and Austria have data breach laws currently

and some industries (for example telecoms) are already subject to an EU wide general data breach reporting requirement.

This puts huge pressure on companies. If an employee loses his iPhone containing customer details on Friday night then he is unlikely to want to boast about it to the company CEO on Monday morning.


e-Discovery

Discover everything: on-premises – cloud – mobile

Total Data Compliance

Infrastructure wide Data Management and Legal eDiscovery and Data Search

Accurately discover and classify personally identifiable information, including where it is stored on the IT network – meaning you are in control of all private consumer data anywhere on your network.



> Legal Search & eDiscovery

Legal and HR teams will love being able to find any data.

Legal retention policy enablement for storage, backup and archive environment and to formulate thorough processes for responding to legal and eDiscovery requests. 




Detecting Breach 


Companies need to consider a data security solution that is distributed in the same manner as their data and infrastructure – across physical, virtual and cloud environments. The right tool should give them visibility, control and threat defense within the data center to help them quickly detect that they have been breached, understand the extent of the breach, and identify how the cyber-criminal got in so that they can put policy and safeguards in place to prevent future occurrences.





Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk