Тёмный

Data Privacy Laws | Cybersecurity Insights #12 

Absolute
Подписаться 2,7 тыс.
Просмотров 22 тыс.
50% 1

In this episode, we discuss some of the laws designed to protect the privacy of personal information. Visit www.absolute.com/solutions/us... to learn more.
The most well-known is the EU’s General Data Protection Regulation (GDPR). Under GDPR, an organization must demonstrate that security safeguards are active, up-to-date, and working effectively. Or risk substantial fines.
GDPR has set the standard for other regulations around the world, but Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) comes pretty close. Most notable with PIPEDA is the need to prove your security posture was airtight when the incident happened, not just whether data was stolen.
What about data privacy laws in the US? Well, we find laws such as HIPAA (for health information) and S-P and S-ID statutes for financial records, enforced by the SEC. There is also the California Consumer Privacy Act (CCPA). But no national privacy standard. Yet.
Data Privacy is today's greatest challenge for IT and security teams, and with 35% of sensitive data out-of-sight on endpoints, there has never been a stronger need for persistent endpoint visibility and control.
----
Want to learn more about how to reduce your risk exposure? Arm your organization against potential threats with the steps outlined in this eBook: “3 Overlooked Data Privacy Considerations”: www.absolute.com/customer-res...
Find out more about how Absolute Software can help you protect the privacy of your data: www.absolute.com/solutions/us...
----
Watch more episodes of the Cybersecurity Insights series:
#1 - HIPAA Privacy Rule - • HIPAA Privacy Rule | C...
#2 - HIPAA Security Rule: • HIPAA Security Rule | ...
#3 - HITRUST Cybersecurity Framework: • HITRUST Cybersecurity ...
#4 - NIST Cybersecurity Framework: • NIST Cybersecurity Fra...
#5 - NIST CSF - Identify: • NIST CSF - Identify | ...
#6 - NIST CSF - Protect: • NIST CSF - Protect | ...
#7 - NIST CSF - Detect: • NIST CSF - Detect | Cy...
#8 - NIST CSF - Respond: • NIST CSF - Respond | C...
#9 - NIST CSF - Recover: • NIST CSF - Recover | C...
#10 - Lost/Stolen Device: • Lost & Stolen Device |...
#11 - Data Privacy explained: • Data Privacy Explained...
#12 - Data Privacy laws: • Data Privacy Laws | Cy...
#13 - Data Privacy Tips: • Data Privacy Tips | Cy...
#14 - Top Cybersecurity Threats: • Top Cybersecurity Thre...
#15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: • Phishing and Malware: ...
#16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained • Zombie Computers, Botn...
#17 - Zero Trust Explained: • Zero Trust Explained |...
#18 - 5 Most Devastating Cyber Attacks: • 5 Most Devastating Cyb...
#19 - Dealing with IT Complexity: • Dealing with IT Comple...

Наука

Опубликовано:

 

25 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 11   
@sarahb.9438
@sarahb.9438 5 лет назад
Thanks for the video ! Brief and informative. I like that :)
@absolute_security
@absolute_security 5 лет назад
Thank you!
@JossOrtan
@JossOrtan 16 дней назад
Great insights into data privacy laws! It's clear GDPR has set a high bar globally. How do you see emerging technologies like AI impacting compliance efforts under these regulations?
@pieterrossouw8596
@pieterrossouw8596 4 года назад
I'm a software developer. My job sometimes requires me to handle sensitive client data, although it is avoided as far as possible. As such I keep this information properly encrypted at all times. In the event of a data breach, can a client's auditor force me to give up the decryption keys? I sign nondisclosure agreements with clients, but is the auditor required to sign a similar agreement with me? Client A has no business accessing the data on my machine of Client B, nor the fact my employer is doing business with Client B in the first place. I'm fortunate enough that a data breach has not occurred but I'm not sure how to navigate this if it did. Also if I have personal data on my machine, can I refuse the auditor's access to this without incriminating myself?
@solomonzepeda12
@solomonzepeda12 2 года назад
Thank you, I needed to watch that video. I am a victim in Las Vegas Nevada of what I believe to be the biggest civil y
@jacquelinemanzano9328
@jacquelinemanzano9328 2 года назад
As a former resident, my heart goes out to you. Las Vegas is the "New Tijuana of Mexico" I left there to escape death by mariachi, because my neighborhood was becoming flooded with nightly parties and intolerable loud music.
@techlaw997
@techlaw997 2 года назад
Interesting that you led with GDPR which is an EU regulation. Most US businesses would need even meet the threshold for GDPR.
@johnhack67
@johnhack67 3 года назад
thanks
@leavemealone5242
@leavemealone5242 3 года назад
It's totally wrong
@hootie3851
@hootie3851 Год назад
Cyber Security Breach
Далее
Data Privacy vs. Data Security
6:27
Просмотров 14 тыс.
Privacy and data protection
10:44
Просмотров 284 тыс.
Она Может Остановить Дождь 😱
00:20
СОБАКИ ГОЛОДАЮТ ИЗ-ЗА ЛЕРЫ 🥲
01:00
Information Privacy Law 1 - Origins of Privacy
5:48
Просмотров 10 тыс.
Protecting Personal Privacy
2:58
Просмотров 56 тыс.
Data Protection Explained | Privacy International
3:07
Privacy Law in Australia
6:43
Просмотров 42 тыс.
Unprecedented IT outage still felt around the world
14:46
Prices & Poco M4 Pro 5G
1:00
Просмотров 271 тыс.
iPhone 16 - НЕ СТОИТ ПРОПУСКАТЬ
4:50
iPhone 15 Pro в реальной жизни
24:07
Просмотров 437 тыс.