• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Have You Seen This GDPR email?

Have You Seen This GDPR email?

2018-05-01 by Michelle Dvorak

Have You Seen This GDPR email?

Important updates about the General Data Protection Regulation (GDPR)

The above is the subject of an email sent out by Google laying out the actions they are taking to comply with the General Data Protection Regulation (GDPR). Google is making changes to its services – free and paid – to give advertisers and users of Google Analytics the ability to control data retention and who they target advertisements at and how.

Google is not the only company sending out GDPR related emails. Major corporation are preparing their systems to comply with the EU’s regulation. Email inboxes are flooded with requests to re-opt into email lists. Websites have their user policies more prominent, linked off the home page, rather than buried through obscure websites navigation. The wording of the privacy policy cannot be miles long legalese either. It must be reasonably understandable and clear. Users must have an easy method to drop out of your online tracking too.

GDPR affects all businesses dealing with European Union (EU) citizens, not just Google. The regulation affects any organization that contains information on EU citizens, regardless of where it is based.

What is GDPR?

GDPR is short for the General Data Protection Regulation. It is a law approved by the EU Parliament on 14 April 2016. Organizations have had plenty of time to prepare for the regulation. It goes into effect on May 25, 2018. Fines for breaking GDPR regs are huge at 4% of annual global turnover for or €20 Million.

When an organization collects personal data they currently inform users, usually through a privacy policy, how that data will be used. Under GDPR organizations need to explain, in concise, easy to understand, and clear language, their lawful basis for processing user data as well as the data retention periods. Individuals have the right to access, modify, and require that their data be erased all together. In addition, under GDPR, people have the right to:

GDPR includes the following rights for individuals:

  • the right to be informed
  • the right to restrict processing
  • the right to data portability
  • the right to object
  • the right not to be subject to automated decision-making including
  • profiling

The right to have data erasure is especially interesting. It is also known as “the right to be forgotten.” Organizations have one month from the time of a verbal or written request to respond to the right to be forgotten.

Organizations may also need to put steps in place to verify the age of children and obtain parental consent to stay GDPR compliant. This is especially true of social media channels.

Filed Under: News Tagged With: GDPR, Google

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version