Privacy & Protection Challenges: The European Perspective
Curious about how other nations are addressing security and privacy concerns? A new report from an EU agency offers some interesting and provocative insights.
Curious about how other nations are addressing security and privacy concerns? A new report from an EU agency offers some interesting and provocative insights.The European Network and Information Security Agency (ENISA) has issued a detailed report calling for a variety of responses -- and legislation -- aimed at creating a consistent and comprehensive posture toward data privacy and data breaches.
Key recommendations include:
Granting individuals the legal right to have access to information companies have collected about them.
A call for a comprehensive security breach notification law.
A call for the legal instruments necessary to to identify the best available techniques for auditing data collection.
Perhaps most interesting -- and, I think, most challenging -- is the report's recommendation that tools be created aimed at "keeping personal data of citizens within the EU jurisdiction" and to "manage proximity and distance with others in the digital space, both in a legal and a social sense."
Whether or not the larger ambitions and undertakings raised by the report are achievable -- or, depending on your own perspective, worthwhile -- the scope and level of consideration here is well worth a look.
Be interesting to know if any of our own politicians and officials are looking as well. (You can bet that plenty of corporate lawyers are.)
Read more about:
2008About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024