Endpoint

6/30/2017
03:15 PM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

8 Things Every Security Pro Should Know About GDPR

Organizations that handle personal data on EU citizens will soon need to comply with new privacy rules. Are you ready?
2 of 9

Who It Covers

GDPR applies equally to both data controllers and to data processors. Any organization that gathers personal data from a data subject is considered a data controller. They have to document the purposes for which they are collecting the data, how and why they will use or process the data and with whom they will share it. 

Data processors are organizations that process data for a data controller, like a payroll processor or a cloud service provider. For the first time, such organizations are also directly bound by the requirements of the GDPR if any of the data they process belongs to EU residents.

Image Source: Yeexin Richelle via Shutterstock

Who It Covers

GDPR applies equally to both data controllers and to data processors. Any organization that gathers personal data from a data subject is considered a data controller. They have to document the purposes for which they are collecting the data, how and why they will use or process the data and with whom they will share it.

Data processors are organizations that process data for a data controller, like a payroll processor or a cloud service provider. For the first time, such organizations are also directly bound by the requirements of the GDPR if any of the data they process belongs to EU residents.

Image Source: Yeexin Richelle via Shutterstock

2 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
7/3/2017 | 6:32:33 AM
Taking data stewardship for granted
Speaking as someone who works with data-privacy issues for a living, I think it's important and commendable how Jai breaks these factors down.

For people like us who work with these developments, relatively things like knowing that GDPR applies regardless of your organization's relationship to the data, conducting assessments, having to comply with various access, transfer, removal, and informed-consent measures as pertaining to the relationship between individuals and their data, and having an officer specifically appointed to data protection when it comes to certain kinds of sensitive data and/or certain kinds of organizations, seem at least semi-obvious. But these things are easily forgotten or otherwise not considered when you're simply trying to operate an enterprise.

It is so important for people who work in this field to understand that their clients and colleagues may not intuit compliance or best-practice factors -- and likewise important for us to stay abreast of everything and not take anything for granted.

Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
The Data Security Landscape Is Shifting: Is Your Company Prepared?
Francis Dinha, CEO & Co-Founder of OpenVPN,  8/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1712
PUBLISHED: 2018-08-16
IBM API Connect's Developer Portal 5.0.0.0 through 5.0.8.3 is vulnerable to Server Side Request Forgery. An attacker, using specially crafted input parameters can trick the server into making potentially malicious calls within the trusted network. IBM X-Force ID: 146370.
CVE-2018-10139
PUBLISHED: 2018-08-16
The PAN-OS response page for GlobalProtect in Palo Alto Networks PAN-OS 6.1.21 and earlier, PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11 and earlier may allow an unauthenticated attacker to inject arbitrary JavaScript or HTML. PAN-OS 8.1 is NOT affected.
CVE-2018-10140
PUBLISHED: 2018-08-16
The PAN-OS Management Web Interface in Palo Alto Networks PAN-OS 8.1.2 and earlier may allow an authenticated user to shut down all management sessions, resulting in all logged in users to be redirected to the login page. PAN-OS 6.1, PAN-OS 7.1 and PAN-OS 8.0 are NOT affected.
CVE-2018-11771
PUBLISHED: 2018-08-16
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream,...
CVE-2018-1715
PUBLISHED: 2018-08-16
IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 14700...