Is it illegal to track your employees’ activities when they’re working from home?
Along with the surge of people working from home or in hybrid situations over the last few years, there has also been an increase in
The GDPR (General Data Protection Regulation) technology framework caters all the possible GDPR technology requirements, and can be used as a foundation for the assessment of a current technology stack and determining the flaws in basic functions. It is the toughest security law in the world and was drafted by the European Union. Get your hands on the latest news and articles about GDPR technology and also all the answers to your questions about GDPR.
Along with the surge of people working from home or in hybrid situations over the last few years, there has also been an increase in
The EU government has devised a new set of stringent rules for all companies trading in the EU to protect consumer data as if it were a state secret.
1. It is an EU regulation as of 27 April 2016. Which gives EU citizens additional privacy and rights REGULATION (EU) 2016/679 OF THE EUROPEAN
Does effective cyber security protection and GDPR compliance mean that existing solutions will need replacing? That depends on what you have deployed and how you have configured
The Carphone Warehouse breach is the biggest so far announced in the post GDPR era. What are the salient points to note from this breach?
Having GDPR compliant processes and procedures is an essential and fundamental part of ensuring a robust data security and management regime is implemented in your
The GDPR regulation is ultimately about good data/information management and governance. Though many organisations acknowledged previous iterations of data protection regulation, GDPR demands that everyone
Why is GDPR necessary? Regulations such as GDPR have come about as a consequence of technology. The increasing storage of private data over decades has
GDPR requires organisations to have a plan along with the necessary process and controls to detect a data breach, regularly evaluate the effectiveness of security