eBook: Breach notification under GDPR - How to communicate a personal data breach

eBook: Breach notification under GDPR - How to communicate a personal data breach

26-04-2018fortconsultENE-bog
Working closely with our clients both on site or at events, we are finding that several remain unclear on the topic of breach notification under GDPR. There seems to be little, focused guidance on the topic despite the fact that the new regulation will be enforced from May 2018.

This paper aims to dispel those feelings of worry and give some clarity on how to move forward. We cover everything from making sense of what you need to disclose and when, down to how to plan for the communications aspect of a breach becoming public.
registrering nødvendig

Ved download af dette whitepaper accepterer du, at leverandøren af whitepaperet kontakter dig på din oplyste e-mailadresse eller telefonnummer med yderligere information om leverandørens ydelser relateret til whitepaperet

Sorter efter:
 
Vis:

{{item.texts[0].title}}

{{item.texts[0].title}} {{item.published | date:'dd-MM-yyyy'}}{{item.supplier.fullName}}{{item.language}}{{item.texts[0].class}}
 

Din whitepaper-konto

Opret en gratis whitepaper-konto hos Version2 og få direkte og nem adgang til alle dokumenter, whitepapers, rapporter, cases og webcasts

It-nyheder

770 millioner brugernavne og passwords er lækket i ny database

En ny database, som cirkulerer på hackerfora, indeholder passwords i klartekst for 773 millioner e-mailadresser. Databasen fylder 87...

Hackere infiltrerede Chiles hæveautomater gennem jobsamtale på Skype

Joboplag på LinkedIn var grundlaget for hackerangreb af virksomhed, der forbinder de chilenske bankers infrastruktur af hæveautomater.

Kommuner og skoler skal ikke længere have adgang til elevers trivselsmålinger

Undervisningsministeriet: Bred enighed om at sikre elevers oplysninger bedre i trivselsmålinger.

Vejdirektoratet køber live trafik-data: Det har givet os et databeredskab

Styrelsen vil med nyt udbud investere omkring 12 millioner for fortsat adgang til realtidsdata om trafikken.

Sikker filoverførselsteknik var ikke så sikker alligevel

Opdagede 36 år gamle sårbarheder i flere klientprogrammer.

Whitepapers

Best practices with BYOD

Best practices with BYOD

In today’s modern society the requirement for employees to be based within a...
Open Banking: Security considerations & potential risks

Open Banking: Security considerations & potential risks

The concept of Open Banking is an innovative one. However, as with any new...

SOC maturity & capability

SOC maturity & capability

Security is a high priority for most organisations. A string of high priority...
eBook: Breach notification under GDPR - How to communicate a personal data breach

eBook: Breach notification under GDPR - How to communicate a personal data breach

Working closely with our clients both on site or at events, we are finding...
Intelligent cyberforsvar - wehowsky.com

Intelligent cyberforsvar - wehowsky.com

Bekæmp morgendagens cybertrusler i realtid med anvanceret machine learning
Cybersecurity Frameworks to Consider for Organization-wide Integration

Cybersecurity Frameworks to Consider for Organization-wide Integration

Organizations are inevitably facing cybercrime and attacks that can be...