Ubuntu 17.10 desktop

GDPR, the General Data Protection Regulation 2016/679 of the European Union, will go into effect on May 25, 2018. It is a piece of legislation that will affect all EU member states and it is designed to address issues regarding the safe storage and responsible use of EU citizenry’s personal data. In fact, it will affect any business or individual handling the data of EU citizens, regardless of where that business or individual is based. If you provide any kind of service or product to individuals it is likely that you are handling EU citizen data and therefore must become compliant with GDPR.

EU GDPR

This new regulation represents a tightening of the data protection laws. The new regulation requires far faster responses to data breaches (within 72 hours), and the maximum penalty for breaching the legislation has increased by over four times to twenty million euros or four percent of a business’s annual global turnover, whichever is higher. In addition, GDPR will unify the processes by which EU countries regulate their data security. This will ensure breaches are easier to report, investigate and respond to the new supervisory authorities being introduced.

What does this mean, in practice? Let’s take a look at GDPR article 25, for instance, which calls for “privacy by design”. This means that privacy measures should be considered and incorporated into products and services as they are being developed. For example, data controllers (those keeping and manipulating data) to conduct “privacy impact assessments” in certain situations where there is a high risk of data exposure or misuse. GDPR encourages organisations to pseudonymise personal data to greatly reduce the impact of these breaches. As most data servers are powered by one Linux distribution or the other, it is important to know what security measures you can take to improve security.

Related Post:  How to customize Linux Mint 12 KDE

Ubuntu 17.10 desktop

Technical implementations of the EU policy are not discussed in the regulation, meaning there is no official guide on how to ensure Linux systems are GDPR compliant. So how do you ensure compliance? Dealing with breaches is one of the most important topics covered in GDPR. As such, event logging should be configured to detect any possible breaches or notable activity, like failed login attempts. It is important to note that any logging should be stored remotely to prevent the files from being accessed during breaches.

In the event of a breach, data could possibly be stolen, changed or removed. In such an event, it is incredibly important to keep backups of your database. This is both so you can compare the compromised and original databases to identify any malicious changes, and so you can restore your database to an unedited variant previous to the breach which will allow you to continue running your business smoothly.

Related Post:  How to install the latest OpenSSH on Windows 7 and Windows 8

Ensure that your operating system and all programs handling the data or granting access to the data are patched and up to date. You should also go about setting up a network firewall to prevent a small breach from quickly spreading to and accessing other associated systems.

GDPR compliance is incredibly important, not only to avoid the fines, but to keep your consumer-base safe and confident. Retention of data under GDPR requires an active statement of consent, as such any serious data breach and loss of customer confidence in your business could lead to dwindling customer data records, making it a lot harder to run a business. To avoid this keep researching GDPR, increase your transparency with customers where possible and ensure you maintain your security standard when you reach compliance.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.