Perhaps the most comprehensive data privacy standard to date, GDPR affects any organization that processes the personal data of EU citizens -- regardless of where the organization is headquartered.
Thales can help you comply with the critical Article 5, 32 and 34 GDPR rules related to:
The General Data Protection Regulation is here. The GDPR is designed to improve personal data protections and increase organizational accountability for data breaches. With potential fines of up to four percent of global revenues or 20 million EUR (whichever is higher), the regulation certainly has teeth. No matter where your organization is located, if it processes or controls the personal data of EU residents, you need to be ready.
Some of the key provisions of the GDPR require organizations to:
CipherTrust Transparent Encryption provides the kind of "state of the art," file-based data protection the GDPR specifies. Using CipherTrust Transparent Encryption, your organization can render private data unintelligible to a cyber-intruder even in the event of a breach, thereby avoiding the breach notification requirement outlined in Article 34.
The Article states that notification to the data subject shall not be required if the organization "has implemented appropriate technical and organizational protection measures, and those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorized to access it, such as encryption."
In addition to avoiding a costly breach notification process, you can prevent substantial reputational damage resulting from a publicized breach.
Thales products and solutions help our customers prevent unauthorized access to personal data, thus enabling compliance with Article 32. Specifically, our CipherTrust Data Security Platform enables separation of duties between privileged administrators and data owners and supports two-factor authentication.
CipherTrust Security Intelligence produces detailed security event logs that are easy to integrate with Security Information and Event Management (SIEM) systems to produce the kind of security reports necessary for GDPR compliance. These enterprise network security information logs produce an auditable trail of permitted and denied access attempts from users and processes, delivering unprecedented insight into file access activities. These enterprise network security information logs can report unusual or improper data access and accelerate the detection of insider threats, hackers, and the presence of advanced persistent threats that defeat perimeter security.
Perhaps the most comprehensive data privacy standard to date, GDPR affects any organization that processes the personal data of EU citizens - regardless of where the organization is headquartered.
Any organization that plays a role in processing credit and debit card payments must comply with the strict PCI DSS compliance requirements for the processing, storage and transmission of account data.
Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.