Data protection vs. data security
Data protection and data security are closely linked.
GDPR has focused everyone’s attention on data protection. But often, it can be difficult to understand the difference between data security and data protection.
?? Data protection is defined as “legal control over access to and use of data.” Achieving it takes a combination of administrative and technical measures.
?? Data security is the process of securing data so that only authorised people can access or modify it. It can be seen as one key element in achieving data protection.
Data protection
Data protection takes a combination of administrative and technical measures. Administrative measures include legal aspects (privacy policies, terms and conditions, etc.).
One of the most important aspects of GDPR is the legal basis for processing a subject’s data.?
In many cases, the basis will be “informed consent,” which can be withdrawn at any time.?
Rights of data subjects
GDPR grants eight fundamental rights.
Technical requirements
Many of these rights, such as the right to erasure and the right to data portability, require technical measures to implement them. GDPR also has strict rules regarding breach notification (informing users and data protection authorities as soon as you suspect a data breach). Following any reported breach, the DPA has a right to inspect all your systems and will want to see detailed logs relating to data access, consent, etc.
GDPR is careful to avoid being over-prescriptive about how you should protect personal data. This is for two reasons. Firstly, not all businesses have equal resources and may store data differently. Secondly, data security is an ever-evolving field, so if GDPR mandated a given approach, it would quickly be outdated. NB, this is in stark contrast to HIPAA, which makes very precise recommendations relating to data security.
Data Security
There are three main forms of data security. Firstly, you need to be able to authenticate users and check what data they are allowed to access. Secondly, you need to actually secure that data, typically using some form of encryption. Thirdly, you need to protect your network, usually with a firewall.
AAA - Authentication, Authorisation, and Accounting - is used to control who has access to data, what they are allowed to do with that data, and keeping records of every access/change.
领英推荐
Encryption involves securing your data with a cryptographic algorithm and a key. Data should be encrypted at rest (storage) and in flight (e.g., when you transfer it from the user's device to the backend).
Firewalls help protect against network threats such as unauthorised access, ransomware, and viruses.
However, several other techniques can help you secure your data. One of the best-known is pseudonymization. This involves storing the user IDs separately from the actual data.
Want to know more?
I really hope you enjoyed this content, and I’d love to hear your thoughts in the comments!?
If you want to know more,?go to our blog, contact us, or visit our website?www.chino.io
See you soon!
Jovan Stevovic?- CEO at Chino.io
Chino.io, your trusted compliance partner
The one-stop shop for solving all privacy and security compliance aspects.
As a partner of our clients, we combine regulatory and technical expertise with a modular IT platform that allows digital applications to eliminate compliance risks and save costs and time.
Chino.io?makes compliant-by-design innovation happen faster, combining legal know-how and data security technology for innovators.
To learn more, book a call with our experts.