Employment Law and Security Management: Evaluating the GDPR
Introduction
While the General Data Protection Regulation (GDPR) is a piece of legislation developed and ready to be implemented by the European Union, the ramifications of this law will be felt far beyond the boundaries of the EU. The GDPR replaces the old Data Protection Directive of the EU and will apply to any company in the world that sells or markets goods or services to EU citizens. Security management teams have already been put on notice for companies like Facebook, which specializes in obtaining data from the users of its platform and selling it to third parties. With the GDPR in place, this practice will no longer be acceptable. This legislation is a game changer, and this paper will provide an evaluation of the GDPR, a summary of the law, and a discussion of its benefits and limitations and how it will impact security management.
GDPR Summary
The GDPR aims to protect the data privacy rights of citizens in the EU from companies looking to exploit their data by collecting it against their will and selling it to third parties against their wishes. In other words, this legislation flies in the face of what every website and company on the Internet wants to do with users’ information—profit from it.
This legislation goes beyond the EU. It is really a global piece of legislation because it impacts every company that wants to do business in the EU—and since virtually every corporation today is part of the global economy there are few major companies and industries that will not be impacted by this legislation.
What does the GDPR intend to do precisely? The most important elements of this law are concerning data protection requirements that companies must abide by. These requirements include:
1. The requirement to obtain the consent of users before collecting, storing and transferring their data
2. Making sure that any data that is collected contains no personal identifying features—i.e., all users are made anonymous: no personal data remains
3. If data collections or databases or hacked or breached, all users with records on file must be notified as well as the public at large through press release so that all stakeholders are informed of the security breach
4. Any data of users or consumers that is moved across borders must meet specific regulations regarding safe transfer
5. Companies will be required to hire a data security manager to ensure...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now