How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.


Prior to the ratification of the GDPR, individual data privacy was the responsibility of the individual. Outside of the EU, it largely still is, but when the GDPR went into effect it opened people’s eyes to just how many of the corporations they come into contact with were misusing their personal data. The GDPR, which grew from individual privacy laws enacted by individual EU states, provides individuals with recourse if they do not approve of the way their data is being used by corporations. Information such as names, physical addresses, phone numbers, email addresses, and medical and financial information were being shared by technology companies. Somewhere in the lengthy terms of service agreement, companies would have language that allowed them to package individual data and effectively use it as an alternative revenue stream. Consumers in the know don’t see this as fair. 

This level of data privacy has been roundly rejected in the United States up until recently, and those who do want to see a GDPR-like law on the books in the U.S. may not want to hold their breath. Before the GDPR was in the news, not many organizations were thinking about how data breaches could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole. 

After One Year

In the first eight months, over 59,000 personal data breaches have been reported to GDPR regulators. This may be less than you may have liked to see, but it is twice as many as there were in 2017; and, of course, 59,000+ more than anyone wants. The fines levied by GDPR regulators are hefty (up to €20 million, or up to 4 percent of total revenue from the previous year, whichever is larger), so you are seeing an increase aligned and strategic approach to keeping data secure; and, reporting any data breaches that do happen quickly. If you would like to see how the GDPR has fared in its first eight months, download the DLA Piper GDPR data breach survey, here.

The results of the GDPR don’t speak to its effectiveness thus far, but in future reports it will become evident that the law is working to keep individual data secure; or, at the very least, keeping companies honest. Under the GDPR, companies that sustain data breaches have 72 hours to notify the people whose information has been exposed. This strict deadline eliminates the possibilities that companies can manipulate public perception about how they are faring with data security, as you’ve seen numerous times over the past two decades. 

Unfortunately, the huge teeth that the GDPR was built with haven’t been used to bite non-compliant companies thus far. Fines that add up to €55,955,871 have been levied against the companies responsible for the 59,000 and change reported data breaches, an admittedly modest amount when you consider that around 90 percent of that sum was the fine levied against a single company, U.S.-based tech giant Google.. 

According to a French GDPR regulator, this small amount should be considered the result of it being a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law can be if regulators aren’t actively enforcing it in a manner that affects the business operations of those at fault. 

The Wider View

Over the past year since GDPR has went into effect, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit fire under the seats of lawmakers, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”. 

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. One place where data privacy was a priority is in the state of California. Not long after the GDPR went into effect, the Golden State passed its own sweeping (and rather hastily designed) data privacy law, the California Consumer Privacy Act. The CCP is designed to protect the residents of California from corporate overreach. Colorado, Massachusetts, and Ohio lawmakers followed suit with their own privacy laws shortly after California’s CPA was ratified. 

This is good news for individual data privacy in the U.S. It’s a far cry from only a few short years ago where some of the most reputable companies in the world could regularly lose a person’s sensitive data with no pushback. These situations resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regard to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Business Computing Email Privacy Microsoft User Tips Network Security Software Google Malware Productivity Hackers Business Hosted Solutions Computer Tech Term Communication Data Internet Ransomware Mobile Devices Small Business IT Services Efficiency Cloud Computing IT Support Hardware Smartphone Data Recovery Workplace Tips Backup Saving Money Innovation Android Office 365 Managed IT Services Information Business Continuity Microsoft Office Windows Users Social Media Data Backup Managed IT Services Windows 10 Browser Internet of Things Data Management Mobile Device Upgrade App Gmail Vulnerability Business Management Passwords Productivity Outsourced IT Word Server Facebook Phishing Windows 10 Cybersecurity communications Artificial Intelligence Remote Monitoring Disaster Recovery Network Encryption Smartphones Chrome Miscellaneous Tip of the week Analytics Website Infrastructure BYOD IT Support Applications Money VoIP Save Money Gadgets Managed Service Provider Employer-Employee Relationship Virtual Reality Managed Service Paperless Office Risk Management Education Apple Government Antivirus Development Office Tips Unified Threat Management Display Hacker Data storage Access Control Big Data VPN IT Management Maintenance Router Settings Robot Automation Company Culture Google Drive Bandwidth Employee-Employer Relationship Content Filtering Apps YouTube Two-factor Authentication Managing Stress OneNote Avoiding Downtime SaaS Storage Scam Printing Computers Virtualization Holiday Data loss Networking HIPAA Telephone Systems Laptop Retail Alert The Internet of Things desktop Mobile Security Data Security Collaboration Firewall Vendor Management Business Technology Spam Computing Monitors Server Management Downtime Outlook Document Management WiFi Touchscreen Chromebook Business Intelligence Bring Your Own Device Operating System Virtual Private Network Quick Tips LiFi Wireless Hosted Solution Tablet Solid State Drive Administration End of Support Mouse Augmented Reality Hard Disk Drive Computing Infrastructure Professional Services IT solutions LED Going Green Network Congestion Social Networking Dell Migration Google Docs Address Permissions WannaCry PowerPoint Hacks User Error Chatbots Cabling Scary Stories eWaste Laptops Patch Management Managed IT Service Star Wars Bitcoin Data Breach Customer Relationship Management Wi-Fi Wearable Technology Google Maps Running Cable Network upgrade Mobility Google Wallet Writing Specifications Nanotechnology Alerts USB Co-Managed IT Heating/Cooling Multi-Factor Security Motherboard Buisness Cables Business Growth Fraud Cost Management Virtual Desktop Onboarding Password GDPR Dark Data Time Management Update Printer Identity Sports Continuity Software as a Service Legal Break Fix Slack Windows 8 Hard Disk Drives Smart Office Unified Communications Print Toner Drones Search Black Friday Screen Reader Charging Politics Licensing Digital Payment Dongle Content Servers Google Calendar Wires Messaging Emergency Assessment Digital Digital Signage Mobile Device Management Data Warehouse Customer Service Network Management Disaster Solar Deep Learning Entertainment Dark Web Monitoring Solid State Drives Private Cloud Work Shortcuts Office Samsung Cyber Monday Smart Tech Tech Support Cooperation Cybercrime Service Level Agreement Streaming Legislation Voice over Internet Protocol Alt Codes Employee-Employer Relationships Hotspot Internet Exlporer Spyware Troubleshooting Business Analysis SharePoint Marketing Compliance Uninterrupted Power Supply iOS Microsoft Excel Spying Social National Security Techology File Sharing IT Technicians Optimization Security Cameras Budget Social Engineering Managed IT Smart Technology Computer Care Connectivity IBM Humor How To Lenovo Websites Staff Leominster Human Error Information Technology Statistics Modem FinTech Analysis Typing Students Language Identity Theft Value Current Events Downloads Regulations Best Practice Scalability Mail Merge Blockchain Updates VoIP Unified Threat Management Mirgation Halloween Recycling Managed Services Safety Shortcut Distributed Denial of Service Training IoT Corporate Profile Cryptocurrency Mixed Reality Firefox Superfish Automobile K-12 Schools Device Bluetooth Remote Computing Comparison G Suite Cookies MSP Supercomputer CrashOverride Cortana 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Windows 7 Unsupported Software GPS Computer Repair Relocation IT Consultant Cameras BDR Mobile Data Tracking Recovery Meetings How To Work/Life Balance Health Cleaning Regulation Black Market CCTV Mobile Computing Webcam Law Enforcement Electronic Medical Records Notifications Physical Security Error Twitter Printers Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3