Introduction GDPR introduced and changed the UK and European privacy rules exponentially. The inclusion of Article 25, ‘Privacy by Design’ and ‘Privacy by Default’, formed the basis of embedding global data privacy compliance management into everyday operations and...
A personal data breach is a security breach “leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data,” (GDPR, Article 4.12). All data breaches whether reportable or not require the completion of...
A comprehensive data map can prove an invaluable tool in helping you manage your data privacy, but what exactly is GDPR data mapping and why do you need to do it? As we have passed the third anniversary of GDPR, most businesses have a fairly good grip on what GDPR...
GDPR & Access Controls: Which one is right for you? When it comes to GDPR and access controls, companies often fumble by inadvertently allowing inappropriate access to data. GDPR requires organisations to “implement appropriate technical and organisational...
Many manufacturers and retailers of IoT devices don’t realise that these devices fall under the purview of data privacy regulations. As data regulators turn their attention to IoT devices, manufacturers and retailers must take steps to stay ahead of developing global...