Skip navigation

Suggestions

  • No Suggestions

Kensington GDPR Standards for Europe

  • March 15, 2018

Kensington GDPR Standards for Europe Blog Header Image

<span style="font-weight: 400;">If you have customers </span><em><span style="font-weight: 400;">anywhere</span></em><span style="font-weight: 400;"> in the world, you can have customers </span><em><span style="font-weight: 400;">everywhere</span></em><span style="font-weight: 400;"> in the world. It doesn’t matter whether you are running your own small business in your garage or working for a multi-national corporation. There is always room to expand somewhere around the globe, provided that you can comply with local rules and regulations. But given the complexity of all the rules, as well as the penalties for breaking them, it can be an overwhelming problem to contemplate. After all, for your business to be successful, your attention should be focused on your business, not on the ever-changing world of international trade policies.</span>

<span style="font-weight: 400;">If you are already operating in the European Union (EU), or if you want to move into that market, you need to understand the EU’s General Data Protection Regulation (GDPR). It will offer great benefits to your organization and your customers, but the tasks involved may seem overwhelming initially. But stick with me, and together we will sort out what it means, and what Kensington offers to make it easier for you to comply.</span>

<h2><strong>First, let’s break it down to the basics.</strong></h2>

<strong>What is GDPR?</strong>

<span style="font-weight: 400;">To put it simply, the GDPR requires organizations to apply sound security practices to electronic and paper-based data, and in the case of a data breach, to notify affected or potentially affected individuals.</span>

<strong>When do I need to worry about this?</strong>

<span style="font-weight: 400;">The regulations take effect in May 2018, so you need to start thinking about this now.</span>

<strong>Does it Matter Where I Am Located?</strong>

<span style="font-weight: 400;">The rules apply to every organization anywhere in the world that controls or processes personally identifiable data about people in Europe, no matter where the organization is physically located and whether the personal data relates to an EU citizen.</span>

<strong>Why Should I Review my Physical Security Policies?</strong>

<span style="font-weight: 400;">The physical security of IT hardware is a key factor in protecting data from hacking and malware because 39% of data breaches are caused by a lost or stolen device.</span>

<strong>How Can Kensington Help Me?</strong>

<span style="font-weight: 400;">Kensington is the trusted industry leader in security solutions offering a complete range of security products to ensure that you comply with GDPR to protect the sensitive data that you control and to avoid EU-mandated fines.</span>

<strong>Understanding GDPR</strong>

<span style="font-weight: 400;">The GDPR is part of the European Commission’s plan to modernize and standardize data protection rules. It includes extension and clarification of the rights under the Data Protection Act (DPA).</span>

<span style="font-weight: 400;">The focus of DPA and GDPR is on preventing and combatting security breaches, hacking, and other unlawful practices. It seeks to guarantee individual’s privacy rights including, but not limited to:</span>
<ul>
<li><span style="font-weight: 400;">Transparency—the right to be provided with clear information about how your organization processes personal information.</span></li>
<li><span style="font-weight: 400;">Consent—the right to control how your organization uses personal information.</span></li>
<li><span style="font-weight: 400;">Security—the right to have information about how your organization adequately protects personal information.</span></li>
<li><span style="font-weight: 400;">Collection and purpose limitation—the right to expect that your organization minimize the collection and use of information.</span></li>
<li><span style="font-weight: 400;">Breach notification—the right to be informed in the case of a data breach.</span></li>
</ul>
<strong>GDPR expands existing rights under DPA as well as enforcing new ones. Some notable changes include:</strong>
<ul>
<li><span style="font-weight: 400;">Data portability and the right to be forgotten</span>
<ul>
<li><span style="font-weight: 400;">Individuals have the right to transport their personal data from one organization to another.</span></li>
<li><span style="font-weight: 400;">Personal data must be provided to an individual in a structured and machine-readable format.</span></li>
<li><span style="font-weight: 400;">An individual can request the deletion or removal of personal data.</span></li>
</ul>
</li>
<li><span style="font-weight: 400;">Inventory</span>
<ul>
<li><span style="font-weight: 400;">An organization does not need to inform local authorities that personal data is being processed.</span></li>
<li><span style="font-weight: 400;">Your organization must maintain a record of processing activities under its responsibility.</span></li>
</ul>
</li>
<li><span style="font-weight: 400;">Data protection impact assessments (DPIAs) and security</span>
<ul>
<li><span style="font-weight: 400;">DPIAs are a way to identify high risks to the privacy rights of individuals.</span></li>
<li><span style="font-weight: 400;">Security requirements and recommendations should be based on a risk assessment.</span></li>
</ul>
</li>
<li><span style="font-weight: 400;">Data breach notification</span>
<ul>
<li><span style="font-weight: 400;">Any data breach should be reported to the supervisory authority.</span></li>
<li><span style="font-weight: 400;">Individuals affected by the breach should also be informed.</span></li>
</ul>
</li>
<li><span style="font-weight: 400;">Data governance and accountability</span>
<ul>
<li><span style="font-weight: 400;">Your organization must be able to demonstrate compliance with GDPR.</span></li>
</ul>
</li>
</ul>
<h2><strong>How Could GDPR Cause Problems for Me?</strong></h2>
<span style="font-weight: 400;">If you do not comply with GDPR, your organization can be fined up to 20 million Euros or 4% of your global revenue, whichever is greatest.</span>

<span style="font-weight: 400;">In addition, any data subject has the right to sue you within a court of law.</span>

<span style="font-weight: 400;">There will also be damage to your organization’s reputation in the marketplace and professional standing if you do not protect personal data, or are perceived not to be protecting data appropriately.</span>

<strong>Why is the Physical Security of Devices So Important?</strong>

<span style="font-weight: 400;">Physical loss of portable devices is one of the biggest sources of data breaches.</span>

<span style="font-weight: 400;">Every day, on average over 5 million data records are lost or stolen</span><span style="font-weight: 400;">, with more than a third of businesses not having a physical security policy in place to protect laptops, mobile devices and other electronic assets.</span>

<span style="font-weight: 400;">Of 697 data security incidents recorded between April and June 2017 by the UK’s data protection regulator, the Information Commissioner’s Office (ICO), 6% were due to the theft of an unencrypted device, with data being left in an insecure location or the theft of the only copy of encrypted data accounting for an additional 3.5%. </span>

<span style="font-weight: 400;">In the </span><strong>financial </strong>sector <span style="font-weight: 400;">25% of breaches are due to lost or stolen devices and are the most frequent cause of data leakage, being especially tempting targets because of the volume of sensitive data stored and used.</span>

<span style="font-weight: 400;">Within </span><strong>healthcare</strong> <span style="font-weight: 400;">physical theft or loss is the biggest cause of security incidents, accounting for 32% of over 100,000 incidents surveyed in 82 countries.</span>

<span style="font-weight: 400;">Overall, 39% of data breaches are caused by a lost or stolen device, and well-implemented security policies are shown to reduce laptop theft by 85%.</span>

<span style="font-weight: 400;">Portable devices are at risk even when you or your employees are working in a secure office location. 58% of laptops are stolen from the office and 85% of IT managers suspect internal theft.</span><span style="font-weight: 400;"> Data is at risk as soon as the laptop has been taken, especially as only 3%</span><span style="font-weight: 400;"> are ever recovered.</span>

<strong>What Should I Do To Protect My Organization?</strong>

<span style="font-weight: 400;">GDPR applies to personal data and a sub-category of personal data called sensitive personal data that is handled in both electronic and physical formats. Your organization needs to devise and adhere to security policies that protect personal data and be able to demonstrate your compliance with all aspects of the regulations.</span>

<span style="font-weight: 400;">Your policies need to address who in your organization is authorized to access information about your customers, how it is accessed, and the hardware and software technology used to access and protect it. </span>

<span style="font-weight: 400;">The physical security of the devices used by your organization is a key component of any comprehensive data protection plan. </span>

<strong>Solutions Kensington Offers to Prevent and Solve Physical Security Problems</strong>

<span style="font-weight: 400;">Kensington is the trusted leader in physical security for IT hardware around the globe. We offer an integrated suite of products that protect computers and portable devices from theft and other physical breaches that could compromise personal data.</span>

<strong>Locks and Cables for Portable Devices</strong>

<span style="font-weight: 400;">Laptop locks protect portable devices in your organization from theft and save you the time and cost associated with tracking the offender and replacing the laptop. Laptop locks are primarily designed to protect against opportunistic theft, but they are also very effective at preventing theft. IDC reported that, of IT Managers that have suffered laptop theft, 52% state that the thefts would have been prevented by a lock.</span>

MicroSaver 2.0 Keyed Laptop Lock — Master Keyed On Demand Image

<span style="font-weight: 400;">Kensington offers a full range of solutions for devices with standard laptop security slots, as well as for slim tablets and other peripheral without a security slot. To back up the security of our locks, Kensington cables are cut resistant.</span>

<span style="font-weight: 400;">We are the world’s top seller of laptop locks with over 25 million locks sold around the globe. The locking cables are unobtrusive and easy to attach and use, to ensure that users in your organization can easily lock their device every time they need to. For convenience and to fit the security needs of all organizations, Kensington offers keyless combination locks as well as keyed solutions with individual and master key options. </span>

<strong>USB Port Blockers</strong>

<span style="font-weight: 400;">The ports on your device are physical gateways that someone with opportunity and malicious intent—for instance in your office after hours or in a crowded tradeshow clustered around the charging station—could use to access your computer directly to copy secure data or upload malware. The Kensington USB Port Lock with Blockers is simple to use, and prevents anyone from connecting to the USB port on your device.</span>

<strong>VeriMark FingerPrint Key</strong>

<span style="font-weight: 400;">The VeriMark FingerPrint Key is a portable pocket-sized device that uses your unique individual fingerprint to authenticate your identity and to store your passwords. </span>

<span style="font-weight: 400;">The VeriMark Fingerprint Security Key is the world’s first fingerprint security key that supports Windows Hello and Fast Identity Online (FIDO) universal 2nd-factor authentication (U2F) to protect against unauthorized access on compromised devices while offering unprecedented cyber-security for today’s trusted cloud-based service and software providers including Google, Dropbox, GitHub, and Facebook.</span>

<span style="font-weight: 400;">The Password Management feature of the VeriMark Fingerprint Security Key lets you use your fingerprint to authenticate and automatically fill in usernames and passwords for websites using popular industry-leading tools like Dashlane, LastPass (Premium), Keeper (Premium), and Roboform.</span>

AC12 Security Charging Cabinet Image

<span style="font-weight: 400;">Without your fingerprint, a thief cannot access your device or the secure systems to which you have access.</span>

<strong>Privacy Screens</strong>

<span style="font-weight: 400;">Any time a piece of personal data is visible on a screen, even for an instant, it is vulnerable. A person sitting next to you on a plane or across from you in a data center should never be able to glance over and see secure personal data. To protect against this threat, Kensington offers Privacy Screens custom designed for a variety of devices. The screens are easy to install and limit the field of vision on the screen so that only an authorized viewer looking straight at the screen will be able to see the information being displayed. Anyone else glancing from the side will just see a black screen.</span>

<strong>Lockable Cabinets</strong>

<span style="font-weight: 400;">Every portable device in your organization is at risk, even if it never leaves your office. With a Kensington locking cabinet, you can control who has access to which devices and when they have access. As part of your security policies, you can have an easy way to make sure every device—and the information on it—is safe when it is not being used.</span>

<strong>How Should I Get Started Complying with GDPR?</strong>

<span style="font-weight: 400;">You need to review your current policies and procedures used to protect secure data, and where necessary, come up with new ones that comply with GDPR before May 2018. It is up to your organization to ensure that any of your existing systems that do not fully support the regulations are either improved or replaced. A key component of any complete security solution is making sure that devices and the secure data on them are protected from physical attack and loss.</span>

Click Here to Protect Yourself with Kensington's World Class Security Products

<strong>Sources</strong>
<ol>
<li>Kensington Security Survey, August 2016 &amp; Ponemon Institute Cost of Data Breach Study, 2016.</li>
<li>2016 Data Breaches - Privacy Rights Clearinghouse</li>
<li>Breach Level Index, September 2017</li>
<li>Kensington IT Security &amp; Laptop Theft Survey, August 2016</li>
<li>Information Commissioner’s Office - https://ico.org.uk/ action-weve-taken/data-security-incident-trends</li>
<li>Financial Services Breach Report, Bitglass, 2016</li>
<li>Verizon Data Breach Investigations Report 2016</li>
<li>Kensington Security Survey, August 2016 &amp; Ponemon Institute Cost of Data Breach Study, 2016</li>
<li>IDC Executive Brief 2010 - Laptop Theft: The Internal and External Threat</li>
<li>IDC White Paper 2007 - The Threat of Theft and Loss of Laptops for the SME</li>
<li>IDC Executive Brief 2010 - Laptop Theft: The Internal and External Threat</li>
</ol>

Live chat by BoldChat