Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.


Before the introduction of the GDPR, individual data privacy was largely an individual’s responsibility. To be fair, in non EU-affiliated circles, it largely still is, but the launch of the GDPR brought to light a lot of issues that people have been talking about for some time: mainly the use of their personal information for corporate financial gain. The GDPR was a response to concerns that some organizations were playing fast and loose with individual’s data that included personal information like names, addresses, email addresses, as well as medical and financial information. In profiting off the capture and sales of this information, the largest corporate tech companies created revenue off the backs of people, creating situations that were simply unfair to consumers and users of these services.

For years leading up to the ratification of the GDPR, EU member states had been legislating their own data protection laws. This trend has been roundly rejected in the United States, but with the implementation of the GDPR, corporations that see themselves as members of the global economy had strict new guidelines to meet in order to be able to use individuals’ data in the same manner as it had been. The GDPR was an amalgamation of these laws and firmly required all businesses to report certain types of personal data breaches within 72 hours to a supervisory authority mandated by EU member nations.

Not only did it give the consumer a voice in the ongoing data collection and distribution scheme, it made businesses cognizant just how important their data management is for the people they depend on. Before the GDPR was in the news, not many organizations were thinking about how a failure to protect customer, staff, and vendor information could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole.

One Year In

Now that the GDPR has been in place for a year, the results have been mixed. Over 59,000 personal data breaches have been identified by companies that have resulted in notifying regulators. Since sanctions for failing to comply with GDPR mandates carry fines up to €20 million, or up to 4 percent of total revenue from the previous year (whichever is larger), you are seeing a more targeted and strategic approach to keeping data secure, and reporting it quickly when a data breach does happen. To take a look at the results the GDPR had in its first eight months, download the DLA Piper GDPR data breach survey, here.

The takeaway is twofold. Firstly, the GDPR has resulted in a major improvement in data breach reporting speed. Since the mandate gives companies up to 72 hours to notify breached parties, it sets a strict deadline. You likely won’t see situations like the Yahoo! breach where they sat on the information for a year before letting anyone that was affected know they had been breached. The GDPR has also resulted in nearly doubling the amount of reported incidents, not an insignificant number.

On the other hand, fines adding up to €55,955,871 have been levied against the companies responsible for the 59,000 reported incidents, a modest amount for the first year when you consider that about 90 percent of that sum was a single fine levied against U.S. tech giant Google. A French GDPR regulator suggested that this be marked down to more of a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law with be if regulators aren’t actively enforcing it.

Effects Abroad

Many U.S. companies do business in mainland Europe and fall under the GDPR regulator's jurisdiction, but domestically, there has been a major change in the way data privacy is viewed. Over the past year, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit the fire of legislators, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”.

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. The state of California, not long after the GDPR went into effect, passed its own sweeping (and some would say hastily thrown together) data privacy law, the California Consumer Privacy Act, to protect the residents of the Golden State. Colorado, Massachusetts, and Ohio followed suit with privacy laws shortly after California’s CPA was ratified.

This is good news for individual privacy in the U.S. It’s a far cry from only a few short years ago that resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regards to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at 1-844-237-4300.

You Can Benefit from Productivity Consultations
Tip of the Week: Keyboard Shortcuts for Slack


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 03 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Privacy Hosted Solutions Data Network Security IT Services Data Backup Email Internet Malware Hackers Software IT Support Efficiency Outsourced IT Microsoft Innovation Business Mobile Devices Data Recovery Productivity Computer Managed IT Services Hardware Small Business Google Upgrade Business Continuity IT Support Cloud Computing Ransomware Cybersecurity Backup Communication Phishing Tech Term Collaboration User Tips Managed IT Services Windows 10 Managed Service Provider Workplace Tips Disaster Recovery Business Management VoIP Smartphones Internet of Things Smartphone Android Data Management Remote Monitoring Paperless Office Social Media Mobile Device communications Facebook Encryption Managed Service Managed IT Save Money Windows 10 Server Windows Network Browser Office 365 Quick Tips Artificial Intelligence BDR Miscellaneous Saving Money Virtualization Help Desk Wi-Fi Passwords Holiday Risk Management BYOD Apps Business Technology Vendor Management Compliance App Password Healthcare Health Mobile Device Management Windows 7 Automation Government Document Management Avoiding Downtime Bring Your Own Device Remote Work Gmail Going Green Training Robot Big Data Analytics Users Chrome Microsoft Office Applications Employer-Employee Relationship Firewall Recovery Bandwidth Unified Threat Management Laptops Two-factor Authentication Data loss Vulnerability Data Security Money Data storage Computing Content Filtering Wireless Blockchain SaaS Telephone Systems IT Management Mobility Redundancy File Sharing Office Tip of the week Scam Antivirus Project Management Processor Computers Storage Apple Infrastructure Hosted Solution Information Website Work/Life Balance Router Flexibility Maintenance Company Culture Customer Service RMM Virtual Reality Budget Information Technology Operating System Proactive Printing Gadgets Machine Learning Access Control Regulations Tablet IT Service Remote Computing Meetings OneDrive Unified Communications Settings Files VPN Downtime Social Customer Relationship Management IoT Software as a Service Virtual Private Network Politics Wireless Technology Legal Chromebook Education Covid-19 Current Events LiFi Network Management Digital Payment Electronic Health Records Employees Smart Technology Assessment Websites Identity Theft Monitoring Server Management Licensing IT solutions How To Net Neutrality Recycling Uninterrupted Power Supply Social Network Mobile Office Upgrades Consultation Utility Computing Consulting Bitcoin Twitter Sports Internet Exlporer File Management HIPAA Cooperation Display Word Search Outlook Managed Services Provider Mouse Payment Cards Employee-Employer Relationship Mobile Security End of Support Management Google Drive Remote Monitoring and Management Monitors Co-Managed IT Alert Spam Remote Workers Business Growth Electronic Medical Records Professional Services Managed Services WiFi YouTube Augmented Reality Patch Management Mobile Computing Dark Web Time Management Networking Private Cloud Hard Drive How To Samsung Tech Support Hacker Solid State Drive Administration The Internet of Things Operations Point of Sale Hard Disk Drives Test Virtual Machines Data Warehousing Cache Remote Worker Batteries Virtual Desktop Disaster Trending Cybercrime High-Speed Internet Cyber security Technology Assurance Group ’s 18 Notifications Star Wars Projects Gamification Alt Codes Computing Infrastructure Technology Laws Sync Wasting Time Conferencing Smart Devices Cryptocurrency Technology Tips Chatbots Black Market Mail Merge Telephony Asset Tracking Proactive Maintenance Digitize Multi-Factor Security Wearable Technology Writing Emoji VoIP Sponsor Law Enforcement MSP Solid State Drives Credit Cards Microsoft Excel Modem Touchscreen Techology Public Cloud ROI Cyberattacks Network Congestion Travel Development Teamwork Zero-Day Threat Hacks Distributed Denial of Service Annual Convention Lenovo Botnet Return on Investment Typing Printer Alerts Statistics Mobile Device Managment Managing Stress Database Software Tips Instant Messaging Sensors Comparison Identity Address OneNote Database Management Shadow IT Best Practice Computer Repair Notes Computer Care Read Only Google Calendar Retail Cortana Marketing Digital Obstacle Gadget Options Tech Terms Holidays Cookies Physical Security Disaster Resistance Automobile eWaste Cables Shared resources Backup and Disaster Recovery Windows Server 2008 Outsource IT Managed IT Service San Diego 3D Printing Buisness Superfish Active Directory Bluetooth Enterprise Content Management Voice over Internet Protocol Finance Windows 8 Save Time Specifications Processors GPS GDPR Outsourcing Proactive IT PowerPoint Value of Managed Services Identities Legislation IT Technicians Spyware Course 5G Theft IT Permissions Office Tips Nanotechnology SharePoint Staff Update Shortcut Crowdsourcing Wires Human Error Laptop Break Fix Social Networking Unsupported Software Virus Cost Management Supercomputer E-Commerce Windows Server G Suite Vulnerabilities History Authentication Telephone Black Friday Roanoke — Central Technology Solutions Firefox Connectivity Tracking Video Conferencing Google Wallet Unified Threat Management Hotspot Heating/Cooling IT Consulting Enterprise Resource Planning Google Maps Bookmarks Hard Drives Google Docs Mirgation Social Engineering USB Taxes WPA3 Wireless Internet Financial Business Telephone Fraud Screen Reader Downloads WannaCry Manufacturing Permission Optimization Remote Working Humor Motherboard Mobile Data Security Cameras IT Budget Features User Management Hacking Geography Transportation Cabling Authorization Mobile VoIP Backups Cyber Monday technology services provider Biometric Drones User Error Language Servers Data Breach Mobile Virtual Assistant Favorites Vendor Migration Safety Fleet Tracking Employer/Employee Relationships Procurement IT Assessment Deep Learning Dark Data Smart Tech Personal Information Regulation Error Students Web Server Cameras Motion Sickness Administrator Printers CCTV Hard Disk Drive Relocation Webcam Emergency CrashOverride IT Consultant