Our view on GDPR...stop the panic | Microbyte

Our view on GDPR…stop the panic

GDPR is the word on everyone’s lips, and here at Microbyte we’re getting asked about it a lot. Many of you are worried about the hefty 4% fine for offending companies, but if you’re already taking data seriously, there’s no need to panic.

General Data Protection Regulation will come into effect next May, but most of the laws and concepts it outlines are already being put into practice. Some of the key new guidelines and regulations include:

  • More stringent regulations around responsible data outsourcing.
  • Reporting all data breaches – this is already practised within organisations such as the NHS, which have automated systems that know whether to report concerns.
  • Data Protection Officers – people in your business, who understands what you are doing with data, where it is flowing, how it is being used etc.
  • Data Protection Impact Assessments – a risk assessment around data, making sure everyone is considering the real impact of breaches.
  • Right to erasure – in our view, this is long overdue and this aims to guarantee when people wish to be removed from a database, they can be with no hassle.

Of the 17000 cases investigated by the ICO last year, just 16 ever resulted in fines, so before starting to panic, consider the broad spectrum of businesses these investigations must have been spread over! In the current climate however, it is right and important that companies demonstrate just how seriously they take data and make the most of the ICO to help on that journey.

Unfortunately, there’s no quick course or webinar that will make you compliant, because compliance itself is a moving target. What businesses need to do is prove they’re doing everything reasonably possible to take care of data, whether that’s moving data to the Cloud, internal audit processes, encryption etc.

Even though the guidelines might appear to take a new approach to data protection, in our view we actually need to start by going back to basics and asking ourselves key questions. Are we being sensible? Do we trust the measures we have in place? It’s a good time to look at fundamental security safeguards from passwords to data storage and transportation.

Many of you will be familiar with Microbyte’s NetAdmin process, also referred to as our Standardisation Checklist. We have already started implementing more checks around basic data protection, and these will of course evolve as we learn more over the coming months from the ICO.

There is always more that can be done, but let’s get back to basics and start taking data seriously before panicking about fines from a framework which was put in place to help us not hinder.

For more information about how we are planning to help move our clients forward feel free to contact us.

Contact Us

Similar blogs

What is a Disaster Recovery Policy?

Recovering from a disaster requires proper planning. As the cliché goes, ‘Failing to plan is planning to fail’- a truism appropriate for incident responses in a business environment.  When critical business operations are under attack, having a disaster recovery policy is essential to establish the correct response. As a high-level strategic document, the policy informs…

Read More

Avatar photo

What is an IT Security Policy

What is an IT Security Policy

An IT security policy confirms the specific rules and correct procedures governing how employees and other parties may use the company’s IT resources. This type of policy details both what is expected and what actions are not allowed. Policies detail acceptable uses of IT technologies, controls limiting user access, accepted procedures, and the consequences for…

Read More

Avatar photo

A Guide to Responsible IT Asset Disposition

A Guide to Responsible IT Asset Disposition

IT asset acquisition requires careful consideration and post-purchase implementation. IT asset disposition (known as ITAD) involves the full lifecycle of an asset while owned by the business.   Every IT asset has a lifecycle. A home user might use a laptop for 4 – 5 years, but most companies expect a shorter lifespan. The equipment must…

Read More

Avatar photo

10 Important Questions to Ask Before Choosing a Managed Service Provider (MSP)

10 Important Questions to Ask Before Choosing a Managed Service Provider (MSP)

Having a reliable and efficient IT infrastructure is a huge asset to any business. Being able to rely on your technology and having professional support when you need it can set you ahead of the competition. As companies grow increasingly reliant on technology, Managed IT Service Providers (MSPs) offer an affordable, practical and efficient way…

Read More

Avatar photo

BAU IT Support

Business As Usual (BAU) IT Support

Business as usual (BAU) support represents regular work tasks within an IT department. They reflect tasks that key IT personnel perform to maintain technology systems with minimal potential disruption to business operations. BAU tasks may include routine tasks such as infrastructure management, network monitoring, software patching, hardware driver updates, and other responsibilities. Troubleshooting – working…

Read More

Avatar photo

What is EOSL and How to Manage it for Your Business

What is EOSL and How to Manage it for Your Business?

Technology-related products have an expected lifecycle: they do not last forever. The End of Service Life (EOSL), a technical term, applies somewhere between 6 to 12 years after the initial release date. At the EOSL stage, the Original Equipment Manufacturer (OEM) typically discontinues maintenance support, releasing software fixes, or new firmware updates. Occasionally, they offer…

Read More

Avatar photo