How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.


Prior to the ratification of the GDPR, individual data privacy was the responsibility of the individual. Outside of the EU, it largely still is, but when the GDPR went into effect it opened people’s eyes to just how many of the corporations they come into contact with were misusing their personal data. The GDPR, which grew from individual privacy laws enacted by individual EU states, provides individuals with recourse if they do not approve of the way their data is being used by corporations. Information such as names, physical addresses, phone numbers, email addresses, and medical and financial information were being shared by technology companies. Somewhere in the lengthy terms of service agreement, companies would have language that allowed them to package individual data and effectively use it as an alternative revenue stream. Consumers in the know don’t see this as fair. 

This level of data privacy has been roundly rejected in the United States up until recently, and those who do want to see a GDPR-like law on the books in the U.S. may not want to hold their breath. Before the GDPR was in the news, not many organizations were thinking about how data breaches could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole. 

After One Year

In the first eight months, over 59,000 personal data breaches have been reported to GDPR regulators. This may be less than you may have liked to see, but it is twice as many as there were in 2017; and, of course, 59,000+ more than anyone wants. The fines levied by GDPR regulators are hefty (up to €20 million, or up to 4 percent of total revenue from the previous year, whichever is larger), so you are seeing an increase aligned and strategic approach to keeping data secure; and, reporting any data breaches that do happen quickly. If you would like to see how the GDPR has fared in its first eight months, download the DLA Piper GDPR data breach survey, here.

The results of the GDPR don’t speak to its effectiveness thus far, but in future reports it will become evident that the law is working to keep individual data secure; or, at the very least, keeping companies honest. Under the GDPR, companies that sustain data breaches have 72 hours to notify the people whose information has been exposed. This strict deadline eliminates the possibilities that companies can manipulate public perception about how they are faring with data security, as you’ve seen numerous times over the past two decades. 

Unfortunately, the huge teeth that the GDPR was built with haven’t been used to bite non-compliant companies thus far. Fines that add up to €55,955,871 have been levied against the companies responsible for the 59,000 and change reported data breaches, an admittedly modest amount when you consider that around 90 percent of that sum was the fine levied against a single company, U.S.-based tech giant Google.. 

According to a French GDPR regulator, this small amount should be considered the result of it being a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law can be if regulators aren’t actively enforcing it in a manner that affects the business operations of those at fault. 

The Wider View

Over the past year since GDPR has went into effect, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit fire under the seats of lawmakers, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”. 

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. One place where data privacy was a priority is in the state of California. Not long after the GDPR went into effect, the Golden State passed its own sweeping (and rather hastily designed) data privacy law, the California Consumer Privacy Act. The CCP is designed to protect the residents of California from corporate overreach. Colorado, Massachusetts, and Ohio lawmakers followed suit with their own privacy laws shortly after California’s CPA was ratified. 

This is good news for individual data privacy in the U.S. It’s a far cry from only a few short years ago where some of the most reputable companies in the world could regularly lose a person’s sensitive data with no pushback. These situations resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regard to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 18 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Hackers Google Software Productivity Business Hosted Solutions Data Tech Term Hardware Communication Mobile Devices Ransomware Internet Small Business IT Services Efficiency Cloud Computing IT Support Smartphone Data Recovery Workplace Tips Backup Android Saving Money Innovation Managed IT Services Windows Upgrade Managed IT Services Microsoft Office Users Data Backup Social Media Business Continuity Information Office 365 Server Mobile Device Browser Business Management Windows 10 Outsourced IT Data Management Miscellaneous Smartphones Windows 10 Internet of Things Cybersecurity communications Facebook Phishing Gmail Vulnerability App Word Passwords Productivity Artificial Intelligence Network Infrastructure Remote Monitoring Disaster Recovery Encryption VoIP Chrome Gadgets Managed Service Provider Tip of the week BYOD Applications IT Support Money Website Managed Service Save Money Apps Virtual Reality Analytics Employer-Employee Relationship Storage Government Paperless Office Antivirus YouTube Hacker Data storage Display Risk Management Unified Threat Management Router Employee-Employer Relationship Access Control Office Tips VPN IT Management Robot Company Culture Maintenance Automation Google Drive Bandwidth Big Data Content Filtering Quick Tips Settings Education Development Apple SaaS Two-factor Authentication Printing Hard Disk Drive Virtualization HIPAA Holiday Avoiding Downtime Computers Scam Retail Alert Mobile Security Search Networking Data loss Telephone Systems Business Intelligence Spam Computing Outlook Monitors WiFi desktop Vendor Management Bring Your Own Device Operating System LiFi Data Security Chromebook Server Management Collaboration Firewall OneNote Laptop Hosted Solution Business Technology Touchscreen The Internet of Things Administration Virtual Private Network Augmented Reality MSP Mouse Document Management End of Support Tablet Managing Stress Wireless Solid State Drive Downtime Bitcoin Bluetooth Comparison Digital Signage Data Warehouse Motherboard Cables Google Wallet Firefox Superfish Training Corporate Profile Entertainment Alerts USB Automobile Writing Monitoring Solid State Drives Identity Continuity Address G Suite Permissions Wi-Fi Shortcuts Fraud Cost Management Business Growth Employee-Employer Relationships Smart Office Password Patch Management Managed IT Service Dell Streaming Processor Screen Reader Charging Legal User Error Dongle Windows 8 Specifications Cabling Troubleshooting Business Analysis BDR Halloween Wires Unified Communications Drones Customer Relationship Management Dark Data WannaCry Update iOS Licensing Heating/Cooling Multi-Factor Security Google Maps Spying National Security Solar Security Cameras Assessment Printer Analysis Students Work Mobile Device Management Break Fix Politics Human Error Memory Smart Tech Deep Learning Time Management Scalability Cooperation Service Level Agreement Black Friday Virus Scary Stories Voice over Internet Protocol Customer Service Servers Google Calendar Office Samsung Updates Compliance Running Cable Emergency Private Cloud Managed Services Hotspot Internet Exlporer Alt Codes Network Management Digital Payment Mixed Reality IT Technicians Optimization Dark Web Tech Support Device Reducing Cost Connectivity Buisness Migration Staff Leominster Virtual Desktop Social Cyber Monday Disaster LED Threats Modem Sports FinTech Budget Digital Humor Legislation Social Engineering PowerPoint Regulations Information Technology Laptops Language Value Typing SharePoint Data Breach Mirgation Recycling Current Events Microsoft Excel Websites Mobility Batteries IoT Best Practice Windows 7 K-12 Schools Managed IT Smart Technology Uninterrupted Power Supply Co-Managed IT Cookies Techology Spyware Cryptocurrency Statistics File Sharing Safety Onboarding GDPR Social Networking How To Lenovo Computer Care IBM Software as a Service Computing Infrastructure Professional Services Downloads Remote Computing Slack Hard Disk Drives Chatbots Cybercrime eWaste IT solutions Going Green Mail Merge Blockchain Print Toner Star Wars Google Docs Messaging Wearable Technology Network upgrade Hacks Shortcut Distributed Denial of Service Content Marketing Huawei Nanotechnology VoIP Unified Threat Management Identity Theft Network Congestion Travel Processors Machine Learning CrashOverride Unsupported Software Supercomputer Motion Sickness Staffing Administrator Taxes Computer Repair Relocation IT Budget Web Server what was your? Mobile Data Regulation How To Work/Life Balance Printers GPS Recovery IT Consultant Health Black Market Mobile Computing Cameras Meetings Law Enforcement Tracking Notifications Cleaning Electronic Medical Records Twitter CCTV Physical Security Webcam Upgrades Gadget Financial Emoji Crowdsourcing Error Personal Information Botnet Myths Point of Sale Ben McDonald shares 3D Printing Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3