The Incorporation of GDPR
Anna Stavrou
??I don't usually stalk profiles, but when I do I have a career opportunity for you!
The European Union, is one of the most prominent "sui generis" international organizations and is controlled by a number of Conventions and Treaties that impose legal obligations on its member nations in particular domains (Official Journal of the EU, 2021). In instances of conflict, this strategy often wins over national legal systems. Consequently, national legislative systems are united and, in certain cases, consolidated. In response to the fast development of new technologies, EU legislators have recently changed EU data protection regulations to provide European individuals greater authority to assert their rights surrounding the processing of their personal information.
According to the Council of the EU (8 April, 2016), the adoption of the General Data Protection Regulation (GDPR) was the centerpiece of these initiatives. Its wording was finalized on April 8, 2016, and accepted by the European Parliament on April 14. Based on the European Data Protection Supervisor (25 May, 2018), it was subsequently adopted on April 27, 2016 and went into effect on May 24, 2016, and came into force on May 25, 2018. In addition to offering European people greater control over their data protection rights, the GDPR combines the data protection systems of the 28 Member States.
In the last decade, the Data Protection (DP) Regulation of the European Union has undergone a major shift. The use of developing technology, the rapid expansion of social networking, and the computerization of public services have all had an influence on the social, legal, economic, and political realms. Social, legal, economic, and political domains have been affected by the rapidity of development of new technologies and the outcomes of their application, as well as the fast expansion of social networking and the computerized connectivity of public services. Governments, police, and other public entities acquire and handle internet user-posted data for legitimate security purposes. As a consequence of the necessity to combat terrorist threats, the gathering and categorization of information and data about the lives and actions of residents has expanded substantially. The public and private sectors manage personal data in a faceless and depersonalized way, which is highly uncomfortable and usually malevolent.
The implementation of the General Data Protection Regulation in EU member states heralds the arrival of legal rights for data subjects in an era dominated by data. Nonetheless, the successful protection of personal data and the rights of natural people relies not only on the legal framework, but also on the data subjects' understanding of these rights, who must also assume personal responsibility for the protection of personal data.
According to the Official Journal of the EU (27 April, 2016), the EU General Data Protection Regulation (GDPR), which was established by regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016, aims to ensure a high level of protection for personal data in all EU member states by establishing standards that are directly applicable to the processing of personal data and, as a result, harmonizing the legal framework. According to the European Commission (10 January, 2017), data may cross EU internal borders provided the planned processing conforms with the GDPR's general criteria, since this does not constitute an international data transfer. Based on recital 10 of GDPR, to promote data sharing inside the EU, a consistent degree of personal data protection and the elimination of impediments to data flows are essential (European Commission, 2019).
The European Commission (2018) claims that in Greece, the General Data Protection Regulation 2016/679/EU creates a digital environment where companies and organizations may more effectively track, safeguard, and manage data. In compliance with GDPR, robust security measures must be in place to secure the data being processed. For instance, all public and private libraries, including the National Library of Greece, must comply with GDPR rules for the protection of personal data. To comply with GDPR rules and guarantee the effective protection of stored special categories of data and personal data, robust security measures must be installed. Kantarcioglu et al (2016) claims that in accordance with the most current advancements in cyber security, network security solutions now combine machine learning and big data analytics, which have resulted in enhanced procedures and better outcomes.?
领英推荐
Therefore, regulation of emerging technology is more vital than ever. According to A. Papadopoulos (2020), it is difficult for regulators to strike a balance between responsible innovation and the deployment of technology for the public good. Based on the European Commission (2017), the cross-border movement of goods and services (both private and public) necessitates the harmonization (and in many instances, unification) of national legal frameworks and the coordination of self-restraint mechanisms across Member States.
Based on the article 33 of GDPR, in the case of a data breach, the data controller must inform the supervisory authority within 72 hours. By doing so, firms face the danger of losing authentic data, sustaining reputational damage, and perhaps incurring GDPR penalties. Due to the enormous costs associated with data breaches, businesses and organizations are actively encouraged to employ security by design to reduce expenditures in their IT security infrastructure and protect their data (IBM Security, 2017; IBM Security, 2019).
From the above said, it is apparent that for firms to minimize risk surrounding GDPR, they need to adopt “technical precautions." According to the European Commission (2016) the legislative reference to "technical measures" in Regulation 2016/679/EU refers to the functions, processes, controls, systems, procedures, and policies that are in place to maintain and protect a company's sensitive data and private information.
But how can success be achieved in the most effective manner? The best course of action, according to Vavousis et al. (2020), is to conduct vulnerability assessments and penetration testing on the network and all of its components, including servers, routers, switches, and endpoints. Moreover, risk assessments will enable the identification of any gaps in all processing operations, the greatest dangers concerning personal data, and the necessary safeguards to be implemented.
References
Order and Logistics Coordinator | MA in Human Resources Management
2 年Thank you for sharing such an interesting article Anna. The protection of personal data consists a very sensitive topic which needs to be approached carefully.
Talent Management Specialist at Domes Resorts
2 年Great article Anna accompanied by an extensive analysis regarding the GDPR rules. Thank you for sharing! ??
Human Resources Specialist
2 年Very interesting article Anna! GDPR is an opportunity to build trust! ??
Associate at PwC Greece | Payroll & Benefits Solutions
2 年Very thorough research, Anna! Thank you for sharing!
????????? ?? ???????? ??????? @ ?????? | ?????? ????????, ??????????? ???????????
2 年That was a very detailed article Anna, congrats ???? By protecting consumers' privacy, organizations not only avoid potential penalties, but they can also unlock hidden reputational and brand value. As consumers become savvier and more aware of privacy concerns, they will seek out companies that take privacy seriously.