close
test_template

The Aim of The General Data Protection Regulation

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 1010 |

Pages: 2|

6 min read

Published: Mar 1, 2019

Words: 1010|Pages: 2|6 min read

Published: Mar 1, 2019

The aim of the GDPR (General Data Protection Regulation) is to protect all EU citizens from privacy and data breaches in an ever more data-driven world that is immensely unlike from the time in which the 1995 directive was established. The GDPR was approved and adopted by the EU Parliament in April 2016. The regulation will take effect after a two-year transition period and, unlike a Directive it does not require any allowing legislation to be passed by government that it will be in force May 2018. The GDPR not only applies to organizations located within the EU but it will also apply to organizations located outside of the EU if they offer goods or services to, or monitor the behavior of, EU data focuses. It applies to all companies dealing out and holding the personal data of data subjects exist in in the European Union, nevertheless of the company’s location. The regulation applies if the data controller (an organization that collects data from EU residents) or processor (an organization that processes data on behalf of data controller e.g. cloud service providers) or the data subject (person) is based in the EU. Additionally, the regulation also applies to organizations based outside the European Union if they collect or process personal data of EU residents. According to the European Commission "personal data is any information relating to an individual, whether it relates to his or her private, professional or public life. It can be anything from a name, a home address, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer’s IP address”.

Deviations that the GDPR will bring about include the redefining of geographical borders. The directive not only applies to entities that work in the EU but also entities that deal with the data of any resident of the EU. Nevertheless of where the data is managed, if an EU citizen's data is being treated, the entity is now subject to the GDPR. Fines are also much more severe under the GDPR and can total twenty million euros or 4% of an entity's annual turnover, which ever amount is higher. In addition, like previous regulations, all data breaches that effect the rights and freedoms of individuals residing in the EU must be disclosed within 72 hours. The overarching board, the EU Data Protection Board, EDP, oversees all oversight set by the GDPR.

In computer security, a hacker is someone who emphases on security devices of computer and network systems. A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network. Hackers may be motivated by a gathering of details, such as profit, protest, information gathering, challenge, recreation, or to evaluate system weaknesses to assist in formulating defenses against potential hackers. The grouping that has evolved around hackers is often mentioned to as the computer underground. There is a long-lasting argument about the term's true meaning. In this argument, the term hacker is tamed by computer programmers who argue that it refers simply to someone with an advanced understanding of computers and computer networks, and that cracker is the more suitable term for those who breakdown into computers, whether computer criminal (black hats) or computer security expert (white hats).

Eric S. Raymond, author of The New Hacker's Dictionary, advocates that members of the computer alternative should be called crazy. So far, those people see themselves as hackers and even try to take in the views of Raymond in what they see as a wider hacker culture, a view that Raymond has harshly forbidden. Instead of a hacker/cracker dichotomy, they highlight a range of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they typically reserve the term cracker for more hateful activity. To do so, there are several periodic tools of the skill and techniques used by computer criminals and security experts. A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security activities are SQL injection, cross-site scripting and cross-site request forgery which misuse security breaches that may result from second-rate programming exercise. These are very common in Web site and Web domain hacking as vulnerability scanner, finding vulnerabilities, brute-force attack, password cracking, packet analyzer, rootkit, computer virus, computer worm.

For example, Chinese smartphone manufacturer OnePlus has confirmed it has been hit by a credit card breach that affects about 40,000 users of the company’s Android devices. A major hack against Norway’s health-care service has resulted in patient data being stolen and has put an entire country on edge.

With the clock indicating on GDPR, businesses around the world are motocross to obey. Data protection trials continue to cultivate as businesses hold more and more penetrating information for customers, making cyber security one of the newest topics in and out of the tech industry now. Cyber security is the technologies and processes designed to protect networks, computers, programmers and data from attack, theft or damage. Personal information, intellectual property, big data and mergers & achievements information are common targets for cyber criminals. Across the UK, several large companies have recently suffered from cyber-attacks, resulting in a breach of security and sensitive information dripping to the public. A common significance of an attack is discontinuity, which restricts systems and infrastructure and stops programmers from working. With the affected increase in online cyber-crime and data theft, cyber security is an area that affects the daily lives of people and administrations. This is replicated in some of the current ICO forfeits/fines forced on organizations for major breaches of information protection and weak cyber security controls. Companies are not only facing customer criticism, but also the incapacity to continue with business as usual.

Get a custom paper now from our expert writers.

According to Wayne Bennett, Manager - technology recruitment, Robert Walters "Companies can no longer hide behind closed doors when recovering from a breach. Customers are more cautious than ever when choosing companies to work with, they want to know they can trust a company with their important information - making cyber security more important than ever”.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

The Aim of the General Data Protection Regulation. (2019, February 27). GradesFixer. Retrieved December 8, 2024, from https://gradesfixer.com/free-essay-examples/the-aim-of-the-general-data-protection-regulation/
“The Aim of the General Data Protection Regulation.” GradesFixer, 27 Feb. 2019, gradesfixer.com/free-essay-examples/the-aim-of-the-general-data-protection-regulation/
The Aim of the General Data Protection Regulation. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-aim-of-the-general-data-protection-regulation/> [Accessed 8 Dec. 2024].
The Aim of the General Data Protection Regulation [Internet]. GradesFixer. 2019 Feb 27 [cited 2024 Dec 8]. Available from: https://gradesfixer.com/free-essay-examples/the-aim-of-the-general-data-protection-regulation/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now