Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
You Have One Year to Make GDPR Your Biggest Security Victory Ever
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/4/2017 | 9:08:57 AM
Re: What Authority Does a Foreign Entity Have on a Sovereign Nation?
@Dr.T: It's more about the businesses -- who subject themselves to that jurisdiction by reaching out to do business there -- than it is about the government of the US.

(And, besides, that's what treaties are for.)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/4/2017 | 9:07:41 AM
Re: What Authority Does a Foreign Entity Have on a Sovereign Nation?
@geriatric: I've not 100% made my way through GDPR yet, but it's unlikely so simple.

Realistically, regulators go affter the big targets and the targets that are most egregious. Realistically speaking, almost nobody cares about lone eBay seller who hasn't dotted his i's.

(*NOT LEGAL ADVICE.)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/30/2017 | 4:41:21 PM
Re: Going on different directions
It's a bigger political issue in Europe -- where people are still old enough to remember oppressive Communist regimes spying on citizens in a pre-digital era.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/30/2017 | 4:36:35 PM
Re: HIPAA
@Dr. T: You would think, but it's not quite so simple (not that HIPAA is "simple") -- especially because fo the relative fungibility of EU privacy rules/regs/laws.  Privacy Shield and GDPR could very well be gone in five years time in favor of another period of BCR-mitigated chaos followed by yet a new rubric.
geriatric
50%
50%
geriatric,
User Rank: Moderator
5/30/2017 | 6:43:51 AM
Re: What Authority Does a Foreign Entity Have on a Sovereign Nation?
@Pablo Valerio - while I certainly agree that any corporation with a physical presence would be subject to the reg, I'm not at all convinced that the EU's authority would extend to an American citizen with an eBay storefront who sells a t-shirt to someone living in France, or even to a small U.S. community bank whose database contains the address of an ex-pat living in Germany. So it all comes down to what 'doing business' means.
Pablo Valerio
50%
50%
Pablo Valerio,
User Rank: Strategist
5/29/2017 | 3:19:15 PM
Re: What Authority Does a Foreign Entity Have on a Sovereign Nation?
@geriatric... actally it doesn't, except if a company does business in Europe. In that case they have all the authority.

If a company such as Facebook wants to quit the European market, and delete all the data they have on EU citizens, then they don't have to worry about GDPR.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2017 | 2:59:43 PM
GDPR
GDPR Is just a start I would say, all other countries will most likely have their own version of regulations to provide privacy to their citizens.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2017 | 2:55:00 PM
Re: DPO and "costl[iness]"
"When it comes to compliance and risk management, you get what you pay for." Agree. It requires lot of effort, time and money.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2017 | 2:53:43 PM
Re: What Authority Does a Foreign Entity Have on a Sovereign Nation?
"Why would the United States agree to comply with a foreign regulation?" No but mos likely you have branch in there or customers, then you are part of the regulation.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2017 | 2:52:11 PM
Re: Going on different directions
"Looks to me that the EU and the US are going on opposite drections" Good point. We are making it political in here US.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...