Perhaps the most comprehensive data privacy standard to date, GDPR affects any organisation that processes the personal data of EU citizens – regardless of where the organisation is headquartered.
Thales can help you comply with the critical Article 5, 32 and 34 GDPR rules related to:
The General Data Protection Regulation is here. The GDPR is designed to improve personal data protections and increase organisational accountability for data breaches. With potential fines of up to four percent of global revenues or 20 million EUR (whichever is higher), the regulation certainly has teeth. No matter where your organisation is located, if it processes or controls the personal data of EU residents, you need to be ready.
Some of the key provisions of the GDPR require organisations to:
CipherTrust Transparent Encryption provides the kind of "state of the art" file-based data protection the GDPR specifies. Using CipherTrust Transparent Encryption, your organisation can render private data unintelligible to a cyber-intruder even in the event of a breach, thereby avoiding the breach notification requirement outlined in Article 34.
The Article states that notification to the data subject shall not be required if the organisation "has implemented appropriate technical and organisational protection measures, and those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorised to access it, such as encryption".
In addition to avoiding a costly breach notification process, you can prevent substantial reputational damage resulting from a publicised breach.
Thales products and solutions help our customers prevent unauthorised access to personal data, thus enabling compliance with Article 32. Specifically, our CipherTrust Data Security Platform enables separation of duties between privileged administrators and data owners and supports two-factor authentication.
CipherTrust Security Intelligence produces detailed security event logs that are easy to integrate with Security Information and Event Management (SIEM) systems to produce the kind of security reports necessary for GDPR compliance. These enterprise network security information logs produce an auditable trail of permitted and denied access attempts from users and processes, delivering unprecedented insight into file access activities. These enterprise network security information logs can report unusual or improper data access and accelerate the detection of insider threats, hackers, and the presence of advanced persistent threats that defeat perimeter security.
Perhaps the most comprehensive data privacy standard to date, GDPR affects any organisation that processes the personal data of EU citizens - regardless of where the organisation is headquartered.
Any organisation that plays a role in processing credit and debit card payments must comply with the strict PCI DSS compliance requirements for the processing, storage and transmission of account data.
Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbour” clause.