General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)

On October 6, 2015, the EU’s highest court (ECJ)[1] struck down the Safe Harbor Agreement between the US and the European Commission.

Many believe the EU will move forward with the General Data Protection Regulation (GDPR), “The EU General Data Protection Regulation (GDPR) was proposed in 2012 and aims to apply a single set of data protection rules across the European Union (EU) to protect user’s data.”[2]

It’s quite apparent that compliance and regulatory obligations are increasingly becoming much more complex, leaving global organizations sending and receiving PII data across different jurisdictions open to substantial fines and penalties.  When data travels cross borders, as it does so often, the risk increases on an exponential basis for the data owner.  This affects the SMB cloud computing business or the multi-national organization.

If or when the GDPR takes effect (end of 2015), global organizations will need to localize all data protection flow policies to meet each of the individual regions regulations, is your organization prepared?

Data owners must not only know who is sending their data and where that data is going, they must be able to prevent, based on content & context, data transmissions in an instant.

Legacy DLP, Data Classification & Data Discovery solutions cannot accurately provide both the content & context awareness to respond to EU General Data Protection Regulation ( GDPR ).   

Whether it be on premises or off premise and via the cloud, GTB Technologies has the answer.

 

GTB Data Protection DLP Solutions


[1] http://www.nytimes.com/2015/10/07/technology/european-union-us-data-collection.html

 

[2] http://www.computerweekly.com/news/2240235141/EU-companies-unaware-of-proposed-data-protection-law

 

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.