Data Protection and Privacy

"The world is one big data problem." Andrew McAfee, MIT

Data Protection and Privacy

Overwhelmed by the onslaught of regulation? Confused by the streams of acronyms?

The bedrock of business regulation is set

We are interpreting and taking advantage of the new opportunities of regulation.  We can’t afford not to master their substance, so let’s build some logic around their interrelationship.  Welcome to the supervisory world and consumer protection in our electronic society.

The EU’s data protection laws have long beenregarded as a gold standard all over the world

The watershed moment sits around 2018 with real implementation actually becoming visible just this decade.  There has been a veritable tsunami of regulation and you are justified in being overwhelmed by it all.  GDPR, PSD2, MiFID II and IDD all hit in 2018. Though each manifestly having their individual raison d’être, their singular common denominator is an explosion of personal data fields that need to be managed securely.

Our Memo provides further insight.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Leave a Reply

Your email address will not be published.

On Key

Related Posts

WEBSITE SECURITY REPORT

GOLD

Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner

SILVER

The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.

BRONZE

You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.