What are the EU General Data Protection Regulation Articles relevant to Data Protection?

What are the EU General Data Protection Regulation Articles relevant to Data Protection?

[spacer]
[spacer]

Section 1 General obligations

  • Article 15: Right of access by the data subject
  • Article 17: Right to erasure (‘right to be forgotten’)
  • Article 20: Right to data portability
  • Article 25: Data protection by design and by default

Section 2 Security of personal data

  • Article 32: Security of processing
  • Article 33: Notification of a personal data breach to the supervisory authority
  • Article 34: Communication of a personal data breach to the data subject (within 72 hours to both the authorities & individuals)

Section 3 Data protection impact assessment and prior consultation

  • Article 35: Data protection impact assessment

Section 4 Data protection officer

  • Article 37: Appoint a Data Protection Officer (DPO)

 

GTB TECHNOLOGIES’ ABILITY TO VISUALIZE AND CONTROL SENSITIVE DATA WILL BE THE CRITICAL KEY TO AN EFFECTIVE GDPR STRATEGY

 

[i]

[i] http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf

 

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.