OPINION | A GDPR reality check – What this means for APAC businesses?

Posted on May 22 2018 - 8:13pm by Contributing Writer

By Robin Schmitt
GM, APAC, Neustar

The changing posture of security threats – from networks to applications, disruption to data exfiltration and one-dimensional to multi-dimensional attacks – is driving an architectural shift in the security industry.

That, coupled with the GDPR which will come into full swing on 25 May 2018, raises the question – who really controls your data? With data being used widely from personalised advertising to loyalty reward programs by retailers for consumers, businesses will need to rethink the way they manage and protect personal data in order to comply with the GDPR.

While this will be a limiting factor in the use of consumer data, having a bulletproof cybersecurity strategy creates a prime opportunity for businesses to build better customer relationships, streamline IT and improve data management.

For a start, businesses need to ensure that all sensitive data is stored responsibly and securely in inventories that are regularly reviewed and updated. A crucial yet often overlooked point is having the visibility of where multiple backup copies reside to avoid being rendered as non-compliant when customer data is required to be erased.

A Data Protection Officer (DPO) should also be appointed to articulate the lawful basis for any personal data processing, identify and mitigate associated privacy risks to ensure alignment with GDPR requirements. This can be outsourced depending on the business’s IT requirements.

Lastly, existing privacy and security training needs to be enhanced to address GDPR-specific pain points. That along with robust technologies that safeguard critical information infrastructures, should be conducted in tandem to detect and alleviate the impact of breaches when they occur.

It is not to say that GDPR compliance is a grim tale – but it does require a thoughtful review and refinement of data policies to ensure compliance of the stronger data protection framework in an increasingly global conversation.

Related Posts

Transcend introduces StoreJet 200 portable hard dr... Transcend Information, manufacturer of storage and multimedia products, released the StoreJet 200 for Mac portable hard drive. It features the USB 3.1...
MIASCOR appoints EMME Security Group to enhance se... MIASCOR, the largest aviation services company in the Philippines that provides services for incoming and outgoing international and domestic flights ...
Phl still hampered by so-called health issues from... A global authority in radiation safety affirmed proximity to cell sites does not cause any known health risks, contrary to what many homeowner associa...
Philips Philippines introduces ‘Mobile Obste... Philips Philippines introduced the Mobile Obstetrics Monitoring (or MOM), a smartphone-based solution that addresses the root causes of high maternal ...
Ransomware doubled in second half of 2016, says Ch... Check Point Software Technologies released its H2 2016 Global Threat Intelligence Trends, revealing that ransomware attacks doubled during the period....
Manage smarter, more autonomous networks with Inte... By Alan Zeichick Tech Editor, NetEvents With lots of inexpensive, abundant computation resources available, nearly anything becomes possible. For ...
Lazada teams with Globe Telecom to tap SMEs To support the country’s small and medium enterprises (SMEs), Globe Telecom’s micro, small and medium enterprise arm Globe myBusiness and online shopp...
EMC Corporation expands its VCE VxRack System 1000 EMC Corporation expanded its VCE VxRack System 1000 to provide a turnkey cloud-native IaaS experience through new “Neutrino” nodes. The flexibility of...
Lenovo launches devices in time for holidays Lenovo rolled out new units, right in time for holiday shopping. The Windows 10-based YOGA 900, said to be the world’s thinnest Intel Core i conver...
Software defined everything: Moving from simple vi... Erin Dunne, director of research services of Vertical Systems Group. Virtualization and software-defined networks should be a means to an end — no...
About the Author

Leave A Response