Beyond GDPR: New Privacy Regulations in 2018

by Monica Dubeau

January 8, 2018

Preparing for the EU General Data Protection Regulation (GDPR) has been the top priority for privacy professionals in recent months. GDPR, which goes into effect May 25, 2018, includes some of the tightest data breach notification deadlines and potential penalties of any privacy regulation globally.

However, lurking in the shadow of the GDPR are other changes to data breach notification regulations that are likely to take effect in 2018. Privacy professionals globally need to take note and prepare for these changes as well. Below are a few of the notable regulations globally that are going into effect.

The Notifiable Data Breaches Scheme in Australia, which goes into effect on February 22, will require Australian businesses and government agencies to notify affected individuals of data breach incidents that pose a likely risk of serious harm as soon as practical. Notification to the Australian Information Commissioner will also be required.

Additionally, Canada’s mandatory notification requirement under the federal Personal Information Protection and Electronic Documents Act 2000 (PIPEDA) is expected to be enforced in early 2018. Under PIPEDA, notification to the individual and the Office of the Privacy Commissioner of Canada will be required when there is a real risk of significant harm to the affected individual.

In the U.S., Maryland and Delaware both recently amended their current data breach notification statutes. Both states are following in the footsteps of several other states by imposing tighter notification timeframes. Maryland implemented a 45-day notification timeline, and Delaware will require affected individuals to be notified within 60 days. Additionally, both states have expanded upon their definition of personal information. Maryland’s revisions took effect January 1, and Delaware’s take effect April 14.

Data breach notification requirements are constantly evolving, and organizations globally must ensure they keep up to date with the changes to remain compliant. It is not too soon to consider future requirements and how it will affect your business practices.

Learn how the Resilient Incident Response Platform can help make your privacy breach notification process fast, efficient, and compliant.

Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *

14 − 10 =

View Our Additional Resources

  1. Accelerating SOC Transformation with IBM Resilient and Carbon Black

     

    Accelerating SOC Transformation with IBM Resilient and Carbon Black

    Security Operation Centers (SOCs) today are complex environments. They often have too many separate tools, uncoordinated analysts in the response process, and confusion around alert prioritization. Because of this, SOCs consistently struggle responding to the most urgent incidents.

    Watch Now
  2. Six Steps for Building a Robust Incident Response Function

     

    Six Steps for Building a Robust Incident Response Function

    To overcome today’s top security challenges, organizations are increasingly seeking to orchestrate their incident response (IR). They aim to build agile, measurable IR workflows, increase communication and coordination, and arm their team with the right tools and intelligence.

    Download Now
  3. Intelligent Orchestration: Battling Complex Cyberattacks with the Next Generation of Incident Response and Security Operations

     

    Intelligent Orchestration: Battling Complex Cyberattacks with the Next Generation of Incident Response and Security Operations

    Intelligent Orchestration – the next generation of incident response (IR) – is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations’ response to cyberattacks.

    Download Now
  4. What is Intelligent Orchestration: Ask Ted

     

    What is Intelligent Orchestration: Ask Ted

    Intelligent Orchestration – the next generation of incident response (IR) – is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations’ response to cyberattacks.

    Watch Now