In this episode, we discuss some of the laws designed to protect the privacy of personal information. Visit www.absolute.com/solutions/us... to learn more.
The most well-known is the EU’s General Data Protection Regulation (GDPR). Under GDPR, an organization must demonstrate that security safeguards are active, up-to-date, and working effectively. Or risk substantial fines.
GDPR has set the standard for other regulations around the world, but Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) comes pretty close. Most notable with PIPEDA is the need to prove your security posture was airtight when the incident happened, not just whether data was stolen.
What about data privacy laws in the US? Well, we find laws such as HIPAA (for health information) and S-P and S-ID statutes for financial records, enforced by the SEC. There is also the California Consumer Privacy Act (CCPA). But no national privacy standard. Yet.
Data Privacy is today's greatest challenge for IT and security teams, and with 35% of sensitive data out-of-sight on endpoints, there has never been a stronger need for persistent endpoint visibility and control.
----
Want to learn more about how to reduce your risk exposure? Arm your organization against potential threats with the steps outlined in this eBook: “3 Overlooked Data Privacy Considerations”: www.absolute.com/customer-res...
Find out more about how Absolute Software can help you protect the privacy of your data: www.absolute.com/solutions/us...
----
Watch more episodes of the Cybersecurity Insights series:
#1 - HIPAA Privacy Rule - • HIPAA Privacy Rule | C...
#2 - HIPAA Security Rule: • HIPAA Security Rule | ...
#3 - HITRUST Cybersecurity Framework: • HITRUST Cybersecurity ...
#4 - NIST Cybersecurity Framework: • NIST Cybersecurity Fra...
#5 - NIST CSF - Identify: • NIST CSF - Identify | ...
#6 - NIST CSF - Protect: • NIST CSF - Protect | ...
#7 - NIST CSF - Detect: • NIST CSF - Detect | Cy...
#8 - NIST CSF - Respond: • NIST CSF - Respond | C...
#9 - NIST CSF - Recover: • NIST CSF - Recover | C...
#10 - Lost/Stolen Device: • Lost & Stolen Device |...
#11 - Data Privacy explained: • Data Privacy Explained...
#12 - Data Privacy laws: • Data Privacy Laws | Cy...
#13 - Data Privacy Tips: • Data Privacy Tips | Cy...
#14 - Top Cybersecurity Threats: • Top Cybersecurity Thre...
#15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: • Phishing and Malware: ...
#16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained • Zombie Computers, Botn...
#17 - Zero Trust Explained: • Zero Trust Explained |...
#18 - 5 Most Devastating Cyber Attacks: • 5 Most Devastating Cyb...
#19 - Dealing with IT Complexity: • Dealing with IT Comple...
25 июл 2024