Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.
There are many facets of GDPR that may continue to be difficult to operationalize and manage, one being the intersection between the directive and cybersecurity practices. This includes enabling compliance with new laws around data breach prevention and notification, and requirements for measures taken to safeguard personal data.
GDPR outlines that to be compliant, companies must follow established cybersecurity practices, implementing “state of the art” approaches and “appropriate technical and organizational measures to ensure a level of security appropriate to the risk …” to prevent a breach of sensitive, protected data.
Some examples are described as to what this means, including using pseudonyms, data encryption and regularly testing security, but no minimum standards that explain exactly what is expected are defined. This presents a real challenge, given how quickly cybersecurity practices and technology change and threat actors evolve. The cybersecurity industry doesn't currently have a unified position on what qualifies as “state of the art,” leaving the burden on individual organizations to implement their view of strong cyber resilience and defend their position that they have in fact taken appropriate measures to secure their networks.
Further, under the new law, organizations are given a 72-hour window to notify impacted persons when a breach occurs. This is a tight turnaround; even identifying that a breach has occurred within 72 hours, much less notifying the entire population whose information may have been breached, is difficult.
A recent survey around GDPR readiness and concerns in the UK revealed that while respondents are taking GDPR related crises seriously — with 64% indicating they are establishing a response team and 54% regularly reviewing their incident response process — many have a lot of work to do to address cybersecurity implications. In the survey, less than a quarter had obtained cyber insurance and only 32% had performed table top exercises with crisis management response teams.
To execute strong privacy protections and the ability to enable quick identification and notification of data breaches, organizations must invest in a holistic cybersecurity program. Programs should encompass several key best practices, including:
GDPR, as well as China's cybersecurity law may be just the tip of the iceberg in terms of future privacy legislation. Similar laws are emerging around the world — including several in the U.S. driven by lawmakers in states such as California and New York — establishing privacy as a mainstay in the future of global business.
Compliance is not to be viewed lightly. Aside from the financial risk of a violation, organizations must be more conscious than ever before of the reputational damage that can result from failing to take privacy seriously. Multinational corporations in particular must now stay abreast of the varying and emerging requirements and have a foundation in place to adjust programs and policies as the landscape evolves.
*****
Jake Frazier is a senior managing director and head of the Information Governance, Privacy & Security practice within the Technology segment at FTI Consulting. Anthony J. Ferrante is a senior managing director and global head of Cybersecurity at FTI Consulting. The views expressed herein are those of the author(s) and not necessarily the views of FTI Consulting, Inc., its management, its subsidiaries, its affiliates, or its other professionals.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.
This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.
Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.