Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.


Before the introduction of the GDPR, individual data privacy was largely an individual’s responsibility. To be fair, in non EU-affiliated circles, it largely still is, but the launch of the GDPR brought to light a lot of issues that people have been talking about for some time: mainly the use of their personal information for corporate financial gain. The GDPR was a response to concerns that some organizations were playing fast and loose with individual’s data that included personal information like names, addresses, email addresses, as well as medical and financial information. In profiting off the capture and sales of this information, the largest corporate tech companies created revenue off the backs of people, creating situations that were simply unfair to consumers and users of these services.

For years leading up to the ratification of the GDPR, EU member states had been legislating their own data protection laws. This trend has been roundly rejected in the United States, but with the implementation of the GDPR, corporations that see themselves as members of the global economy had strict new guidelines to meet in order to be able to use individuals’ data in the same manner as it had been. The GDPR was an amalgamation of these laws and firmly required all businesses to report certain types of personal data breaches within 72 hours to a supervisory authority mandated by EU member nations.

Not only did it give the consumer a voice in the ongoing data collection and distribution scheme, it made businesses cognizant just how important their data management is for the people they depend on. Before the GDPR was in the news, not many organizations were thinking about how a failure to protect customer, staff, and vendor information could negatively affect anyone but themselves. This has led to a wholesale change in the way businesses view data management, the training of their staff, and security investments as a whole.

One Year In

Now that the GDPR has been in place for a year, the results have been mixed. Over 59,000 personal data breaches have been identified by companies that have resulted in notifying regulators. Since sanctions for failing to comply with GDPR mandates carry fines up to €20 million, or up to 4 percent of total revenue from the previous year (whichever is larger), you are seeing a more targeted and strategic approach to keeping data secure, and reporting it quickly when a data breach does happen. To take a look at the results the GDPR had in its first eight months, download the DLA Piper GDPR data breach survey, here.

The takeaway is twofold. Firstly, the GDPR has resulted in a major improvement in data breach reporting speed. Since the mandate gives companies up to 72 hours to notify breached parties, it sets a strict deadline. You likely won’t see situations like the Yahoo! breach where they sat on the information for a year before letting anyone that was affected know they had been breached. The GDPR has also resulted in nearly doubling the amount of reported incidents, not an insignificant number.

On the other hand, fines adding up to €55,955,871 have been levied against the companies responsible for the 59,000 reported incidents, a modest amount for the first year when you consider that about 90 percent of that sum was a single fine levied against U.S. tech giant Google. A French GDPR regulator suggested that this be marked down to more of a transition year than some type of long-term ineffectiveness of the law. It remains to be seen just how effective the law with be if regulators aren’t actively enforcing it.

Effects Abroad

Many U.S. companies do business in mainland Europe and fall under the GDPR regulator's jurisdiction, but domestically, there has been a major change in the way data privacy is viewed. Over the past year, a lot has happened in the U.S. on the individual data privacy front. Not only has the GDPR lit the fire of legislators, it has major tech firm CEOs, such as Apple’s Tim Cook, calling individual data privacy a “fundamental human right”.

While Mr. Cook seems to be in the minority of American tech company leaders (as can be seen by the €50 million GDPR Google fine), it is a step in the right direction. The state of California, not long after the GDPR went into effect, passed its own sweeping (and some would say hastily thrown together) data privacy law, the California Consumer Privacy Act, to protect the residents of the Golden State. Colorado, Massachusetts, and Ohio followed suit with privacy laws shortly after California’s CPA was ratified.

This is good news for individual privacy in the U.S. It’s a far cry from only a few short years ago that resulted in some pretty damning situations for online consumers. Federal lawmakers have balked at making waves of their own in regards to data privacy, but if history is any indication, when states begin passing laws that are outside the norm, the U.S. Congress typically acts to fill the breach.

If you would like more information about the GDPR, subscribe to our blog, or call one of our knowledgeable IT professionals at 1-844-237-4300.

You Can Benefit from Productivity Consultations
Tip of the Week: Keyboard Shortcuts for Slack


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 23 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Hosted Solutions Email Malware Privacy IT Services Network Security Hackers Internet Data Software Data Backup Productivity Outsourced IT Managed IT Services Business Computer Microsoft IT Support Innovation Ransomware Mobile Devices Data Recovery Hardware Tech Term Cloud Computing Google IT Support Small Business Efficiency Backup Business Continuity Collaboration Managed Service Provider Upgrade User Tips Internet of Things Smartphone Android Communication Business Management VoIP Remote Monitoring Phishing Smartphones Paperless Office Disaster Recovery Windows 10 Windows 10 Data Management Windows Encryption Artificial Intelligence Social Media Save Money Managed IT Services Server Cybersecurity Workplace Tips communications Browser Managed IT Mobile Device BYOD Facebook Risk Management Passwords Quick Tips App Office 365 Automation Mobile Device Management Holiday Saving Money Robot Applications Compliance Apps Laptops Bring Your Own Device Gmail BDR Employer-Employee Relationship Vendor Management Network Password Recovery Analytics Virtualization Chrome Managed Service Business Technology Firewall Bandwidth Government Wi-Fi Document Management Unified Threat Management Website IT Management Money Miscellaneous SaaS Data storage Telephone Systems Content Filtering Tip of the week Going Green Healthcare Scam Antivirus Training Project Management Wireless Microsoft Office Infrastructure File Sharing Big Data Vulnerability Information Blockchain Help Desk Hosted Solution Processor Politics Social Work/Life Balance Virtual Reality Computing Regulations Two-factor Authentication Office IT Service Router VPN Printing Computers Operating System Storage Customer Relationship Management Tablet Remote Computing Users Data loss Unified Communications Data Security Files Settings Downtime Customer Service Apple Hacker Company Culture Administration Education Digital Payment Upgrades RMM LiFi Word Websites Identity Theft Wireless Technology Legal Twitter Current Events IT solutions Redundancy Licensing Display Proactive The Internet of Things End of Support Health Software as a Service Budget Sports Information Technology Maintenance Monitors Management Bitcoin Smart Technology Remote Monitoring and Management Net Neutrality Electronic Medical Records Gadgets Patch Management Machine Learning Mobility Alert Networking Remote Workers Mouse Outlook Virtual Private Network Internet Exlporer Google Drive How To Samsung Network Management IoT HIPAA Spam Assessment YouTube Server Management Business Growth Access Control Cooperation Chromebook WiFi How To Flexibility Mobile Security Avoiding Downtime Private Cloud Uninterrupted Power Supply Tech Support Windows 7 Employees Consultation Mobile Computing Asset Tracking Statistics Professional Services Drones SharePoint Staff Writing Emoji Conferencing Address Wireless Internet Backups Break Fix Social Networking Point of Sale Security Cameras Deep Learning Unified Threat Management Hotspot Network Congestion Recycling Cyberattacks Digital Obstacle Manufacturing Solid State Drive Black Friday Roanoke — Central Technology Solutions MSP Disaster Resistance Fraud Screen Reader Computer Repair Utility Computing Consulting Virtual Desktop Search Transportation Mirgation Development Zero-Day Threat Superfish Cybercrime Physical Security OneNote Bluetooth Telephony Virtual Assistant Alt Codes Downloads Augmented Reality Retail Cortana Managing Stress Instant Messaging Sync Employer/Employee Relationships Dark Web Motherboard Proactive IT Law Enforcement Remote Worker User Error Language eWaste Read Only Spyware Course Public Cloud Hard Disk Drives Cryptocurrency Cyber Monday technology services provider 3D Printing Tech Terms Smart Tech Managed Services Provider Shortcut Botnet Migration Processors Cables Backup and Disaster Recovery Travel Projects Office Tips Employee-Employer Relationship Wasting Time Typing Operations Enterprise Content Management Finance Firefox Mobile Device Managment Software Tips Proactive Maintenance Hacks Data Warehousing Heating/Cooling IT Consulting Gadget ROI Best Practice Computing Infrastructure Update Marketing Automobile Computer Care Solid State Drives Technology Assurance Group ’s 18 Unsupported Software Virus Theft Return on Investment Cost Management E-Commerce WannaCry Teamwork Technology Tips Chatbots Wires Buisness Human Error Time Management Connectivity Hacking GPS Database Multi-Factor Security Wearable Technology Social Engineering USB Vulnerabilities Authentication Database Management Microsoft Excel Modem Financial Servers Data Breach Notes Printer Alerts Enterprise Resource Planning Bookmarks Options Windows 8 Save Time Distributed Denial of Service Annual Convention Mobile Data WPA3 Hard Drive Features Supercomputer Shared resources Identities Comparison Identity Permission Crowdsourcing Meetings Dark Data Personal Information Disaster Trending Tracking Voice over Internet Protocol Google Calendar Safety Geography Authorization G Suite History GDPR Cookies Fleet Tracking Procurement Technology Laws Taxes PowerPoint Google Wallet Mobile Favorites Mail Merge Google Maps 5G Managed IT Service San Diego Cache Electronic Health Records VoIP Sponsor IT Budget OneDrive Hard Drives Google Docs Specifications Notifications Test Touchscreen Techology Nanotechnology Star Wars Monitoring Legislation IT Technicians Black Market High-Speed Internet Lenovo Cabling Humor Permissions IT Consultant Error Web Server Hard Disk Drive Students Cameras Printers Motion Sickness Emergency CCTV CrashOverride Administrator Relocation Webcam Regulation