Download free GDPR compliance checklist!

Latest bits on privacy and cybersecurity #2

This is latest collection of most interesting articles, reports and publications on privacy, data protection and cyber-security.

The criminal?cyberservices market?2018

This study analyzed in detail the market for cybercriminal services and tried to assess whether cybercriminals need a wide range of specialized knowledge, or whether everything can be outsourced to the shadow market: hackers of websites and servers, malware developers and distributors, botnet owners, and other practitioners.

GDPR National Legislation Survey, 4.0

This is an 4th update of Maker McKenzy’s survey that provides an overview of the current legislative activities in terms of national data protection laws supplementing?the GDPR in the 28 EU Member States.

Future-proofi ng privacy:?A guide to complying with the?EU Data Protection Regulation

Hogan Lovells have updated their guide ?Future-proofing privacy,? which aims to be a useful starting point for organisations seeking to understand the GDPR and comply with it. Twenty-four authors from 10 European Hogan Lovells offices have contributed their knowledge, efforts, and advice to compile a unique resource of practical guidance. We have identified the key issues and explained why they matter. Crucially, we have approached the new framework with a practical mindset, providing concrete suggestions for actions to take now.

Understanding the GDPR

This GDPR FAQ Guide is created in partnership with Robert Half and the multinational law firm Baker McKenzie to help organizations understand, prepare and operate under the GDPR. This guide covers the GDPR basics and focuses on critical areas such as third-party risk, data-privacy rights, consent management and privacy notices.

The ultimate guide to become GDPR compliant All you need to know in?7 easy steps

In this guide, PrivacyPerfect provides a seven step scheme to help you become GDPR compliant. It?s not easy, but it?s doable. To provide you with more insight,?PrivacyPerfect drafted an infographic reflecting the internal and external stakeholders and sources needed for inventory purposes.

Lessons from Hollywood Cybercrimes:?Combating Online Predators

Everyone has emails and other digital information that they consider to be no one?s business except their own. Our emails contain everything from tax returns to intimate photos meant only for someone special. Imagine the horror if a hacker infiltrated an email account belonging to someone you knew and made?those emails public. Imagine the horror if it happened to you.

EDPS?on the Proposal for a Regulation strengthening the security of identity cards?and other documents

This Opinion outlines the position of the EDPS on the Proposal for a Regulation of the European Parliament and of the Council on strengthening the security of identity cards of Union citizens and of residence documents issued to Union citizens and their family members exercising their right of free movement.

How to prepare for and handle?data breach notifications

This whitepaper describes the steps your organisation can take in order to prepare for and handle data breach notifications under the GDPR. Articles 33 and 34 specify the cases in which your organisation has to register a breach, notify it to the supervisory authority or communicate it?to the data subject (the natural persons affected by the breach).

Privacy and Freedom of Expression In the Age of Artificial Intelligence

This paper focuses on applications of ?artificial narrow intelligence?: in particular, machine learning and its implications for human rights.

Clearly Opaque: Privacy Risks of the IoT (2018)

Clearly Opaque: Privacy Risks of the Internet of Things is the Forum’s new major report on the privacy challenges of connected devices and the emerging strategies to address them.?This in-depth, multidisciplinary research report explores issues of transparency, consent, identifiability, emotional and bodily privacy, and the destabilization of boundaries.

Read the research

Asia Pacific Data Protection and Cybersecurity Regulation

This report provides an overview of regional developments in 2017 and what to look out for in 2018. It features a ?heat map? comparing the regulatory environments in Asia?s key jurisdictions, individual country spotlights, and a guide with considerations for businesses setting up compliance programs.

No One Owns Data

Stakeholders in digital markets often frame claims, negotiations and controversies regarding data access as one of ownership. Businesses regularly assert and demand that they own data. Individual data subjects also assume that they own data about themselves. Policy makers and scholars focus on how to redistribute ownership rights to data. Yet, upon closer review, it is very questionable whether data is?or should be?subject to any property rights.