<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GDPR Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/category/services/gdpr/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/category/services/gdpr/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 23 Feb 2026 17:04:47 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>GDPR Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/category/services/gdpr/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Legal Basis for Processing</title>
		<link>https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:44:07 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Legal Basis]]></category>
		<category><![CDATA[Legal Basis for Processing]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2739</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) outlines the conditions under which there is a legal basis for processing personal data. Download Detailed Guidance Here The Six Lawful Bases for Processing: To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (Article&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2739 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2739"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-z7y2e5gamipf" data-node="z7y2e5gamipf">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> outlines the conditions under which there is a legal basis for processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-owx9h013v2js" data-node="owx9h013v2js">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-smkepv8xnwgr" data-node="smkepv8xnwgr">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h2><a name="_Toc222253324"></a>The Six Lawful Bases for Processing:</h2>
<p>To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1">Article 6</a>). If you cannot fit your processing into one of these boxes, you cannot collect the data.</p>
<p>You must identify and document one of these bases before you start processing data.</p>
<ul>
<li><strong>Consent:</strong> The individual has given you clear, specific permission to process their data for a specific purpose.</li>
<li><strong>Contract:</strong> You need to process the data to fulfil a contract with the individual (e.g., you need their address to deliver goods they bought).</li>
<li><strong>Legal Obligation:</strong> You are required by law to process the data (e.g., keeping salary records for tax purposes).</li>
<li><strong>Vital Interests:</strong> It is a life-or-death situation (e.g., giving emergency medical data to a hospital to save someone's life).</li>
<li><strong>Legitimate Interests:</strong> You have a genuine business reason (like fraud prevention or network security), and this reason is not overridden by the individual's rights or freedoms.</li>
<li><strong>Public Interest:</strong> You are performing a task in the public interest or acting under official authority (usually applies to government bodies, not private companies).</li>
</ul>
<p>&nbsp;</p>
<h2><a name="_Toc222253325"></a>1. Strict Rules for "Consent"</h2>
<p>If you choose "Consent" as your legal basis, the bar is set very high. You must be able to prove you obtained it validly.</p>
<ul>
<li><strong>Freely Given:</strong> The user must have a real choice. You cannot force them to consent or punish them if they say no.</li>
<li><strong>Informed:</strong> They must know exactly who you are and what you are doing with their data.</li>
<li><strong>Specific:</strong> You cannot ask for "blanket consent." You must ask for permission for each specific purpose.</li>
<li><strong>Clear Affirmative Action:</strong> The user must do something to consent (like ticking a box). You must also keep a record of this consent being given. Pre-ticked boxes are banned.</li>
<li><strong>Easy Withdrawal:</strong> You must tell them they can withdraw consent at any time, and if they do, you must stop processing immediately.</li>
</ul>
<p>&nbsp;</p>
<h2>2. <a name="_Toc222253328"></a>Contractual Necessity</h2>
<p><strong>When to use it:</strong> Use this when you have a contract with an individual (or are about to enter one) and you literally cannot do your job without their data.</p>
<p><strong>The Rule:</strong> The processing must be necessary for the performance of a contract to which the individual is a party.</p>
<p><strong>Practical Example:</strong> If you sell a product online, you need the customer's address to deliver it. You don't need their consent for the address. You need it to fulfil the contract of sale.</p>
<p><strong>Constraint:</strong> You cannot use this for things that are "nice to have" but not essential to the contract (e.g., using that same address for marketing newsletters usually requires a different basis, like Consent).</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253329"></a>3. Legal Obligation</h2>
<p><strong>When to use it:</strong> Use this when you have no choice because the law says you must process the data.</p>
<p><strong>The Rule:</strong> The processing is necessary for compliance with a legal obligation.</p>
<p><strong>Practical Example:</strong> You are required by tax laws to keep records of employee salaries for a certain number of years. Even if an employee asks you to delete their data, you can refuse because you have a legal obligation to keep it.</p>
<p><strong>Constraint:</strong> This must be a statutory obligation (EU or National law), not just a contractual obligation to a third party or your own company policy.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253330"></a>4. Vital Interests</h2>
<p><strong>When to use it:</strong> This is the "Emergency Only" basis. It applies to life-or-death situations.</p>
<p><strong>The Rule:</strong> The processing is necessary to protect the vital interests of the data subject or another person.</p>
<p><strong>Practical Example:</strong> If a visitor to your office collapses and is unconscious, you might disclose their medical allergies (if known) to the paramedics. You don't need to wake them up to get consent because their life (vital interest) is at risk.</p>
<p><strong>Constraint:</strong> You generally cannot use this for large-scale data processing or health data unless it is truly a medical emergency.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253331"></a>5. Legitimate Interests</h2>
<p><strong>When to use it:</strong> This is the most flexible basis, often used for business activities like fraud prevention, network security, or direct marketing. However, it requires a careful "Balancing Test".</p>
<p><strong>The Rule:</strong> Processing is necessary for your legitimate interests (or those of a third party), UNLESS those interests are overridden by the individual's fundamental rights and freedoms.</p>
<p><strong>The "Balancing Test":</strong> You must weigh your benefit against the user's privacy:</p>
<p><strong>Your side:</strong> "We need to process IP addresses to stop hackers attacking our website." (This is a strong legitimate interest).</p>
<p><strong>Their side:</strong> "Does this hurt the user's privacy?" (Likely minimal impact).</p>
<p><strong>Result:</strong> You can probably proceed.</p>
<p><strong>Constraint:</strong> If the processing would be unexpected, cause harm, or if the individual is a child, their rights likely override your interests. You must document this assessment.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253332"></a>6. Public Interest / Official Authority</h2>
<p><strong>When to use it:</strong> This is primarily for public authorities (like schools, hospitals, police, or councils) performing their official duties.</p>
<p><strong>The Rule:</strong> The processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in you.</p>
<p><strong>Practical Example:</strong> A local council collecting data to organise bin collection or a tax authority collecting income data.</p>
<p><strong>Constraint:</strong> Private companies rarely use this unless they are contracted to carry out specific public tasks (e.g., a private utility company maintaining the water supply).</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-k83hnq942ex6" data-node="k83hnq942ex6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Principles of the GDPR</title>
		<link>https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:37:37 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Principles]]></category>
		<category><![CDATA[Principles of the GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2735</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) sets out the principles of the GDPR that organisations must follow when processing personal data. Download Detailed Guidance Here Principles of the GDPR Here is a simplified guide to the 7 Core Principles of the GDPR (Article 5). Think of these not just as codes, but as the "Golden&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2735 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2735"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-6uevfy4tsmk3" data-node="6uevfy4tsmk3">
			<div class="fl-col fl-node-tywc61d08b2m fl-col-bg-color" data-node="tywc61d08b2m">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-wlgck6yehmd9" data-node="wlgck6yehmd9">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> sets out the principles of the GDPR that organisations must follow when processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-f32r8zk7jtn6" data-node="f32r8zk7jtn6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-pc8s63b9lxrh" data-node="pc8s63b9lxrh">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1><strong>Principles of the GDPR</strong></h1>
<p>Here is a simplified guide to the 7 Core Principles of the GDPR (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1">Article 5</a>).</p>
<p>Think of these not just as codes, but as the "Golden Rules" for how you handle data. If you violate these principles, you are violating the GDPR, even if your security is technically perfect.</p>
<p>&nbsp;</p>
<h2>Lawfulness, Fairness, and Transparency</h2>
<p><strong>Your Obligation:</strong> You must be honest and open about what you are doing.</p>
<p><strong>Lawful:</strong> You cannot process data just because you want to. You need a valid legal reason (like Consent or a Contract).</p>
<p><strong>Fair:</strong> You shouldn't do things with data that people wouldn't expect or that could mislead them. You must give them control over their information.</p>
<p><strong>Transparent:</strong> You can't hide in the shadows. You must provide clear, accessible information (usually a Privacy Notice) explaining exactly how you process their data.</p>
<p>&nbsp;</p>
<h2>Purpose Limitation</h2>
<p><strong>Your Obligation:</strong> Be specific about why you need the data and stick to that reason.</p>
<p><strong>The Rule:</strong> You must collect data for "specified, explicit, and legitimate purposes".</p>
<p><strong>No "Scope Creep":</strong> You cannot collect data for one reason (e.g., "to deliver a pizza") and then use it for a completely different reason later (e.g., "to sell their address to a gym"), unless you get fresh consent or have another clear legal reason.</p>
<p><strong>Communication:</strong> You must tell the individual this purpose at the start.</p>
<p>&nbsp;</p>
<h2>Data Minimisation</h2>
<p><strong>Your Obligation:</strong> Collect only what you strictly need.</p>
<p><strong>The Rule:</strong> Data must be adequate, relevant, and limited to what is necessary for your specific purpose.</p>
<p><strong>Practical Step:</strong> If you don't need someone's date of birth to sell them a book, don't ask for it. Avoid hoarding "just in case" data.</p>
<p>&nbsp;</p>
<h2>Accuracy</h2>
<p><strong>Your Obligation:</strong> Keep the data correct and up to date.</p>
<p><strong>The Rule:</strong> You must take reasonable steps to ensure data is not incorrect or misleading.</p>
<p><strong>Correction:</strong> If you find out data is wrong, you must fix it or erase it without delay. You should also give individuals an easy way to update their own records.</p>
<p>&nbsp;</p>
<h2>Storage Limitation</h2>
<p><strong>Your Obligation:</strong> Don't keep data forever.</p>
<p><strong>The Rule:</strong> You must not keep personal data for longer than you actually need it for your stated purpose.</p>
<p><strong>Guidance:</strong> There may be a statutory requirement for a retention period (e.g. Revenue), or a supervisory body providing guidance. If neither exist, then set your own retention period and document the justification for it.</p>
<p><strong>Retention Policy:</strong> You need a clear policy that says when you will delete data. When that time comes, you must securely erase or anonymise it.</p>
<p>&nbsp;</p>
<h2>Integrity and Confidentiality (Security)</h2>
<p><strong>Your Obligation:</strong> Keep the data safe.</p>
<p><strong>The Rule:</strong> You must protect data against unauthorised access, accidental loss, destruction, or damage.</p>
<p><strong>Measures:</strong> This isn't just about firewalls. It includes organisational measures like taking data backups, restricting access so only the staff who need to see the data can see it, amongst other things.</p>
<p>&nbsp;</p>
<h2><em><strong>Accountability</strong></em></h2>
<p><strong>Your Obligation:</strong> Prove it.</p>
<p><strong>The Rule:</strong> It is not enough to just comply with these principles. You must be able to demonstrate that you comply.</p>
<p><strong>Documentation:</strong> This requires you to have written policies, records of your processing activities, and internal procedures in place to show regulators that you take these rules seriously.</p>
<h2><strong style="color: #ff0000; font-size: 16px;"><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></h2>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-6skdhpegzwc0" data-node="6skdhpegzwc0">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rights of an Individual</title>
		<link>https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 13:46:30 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Individual's Rights]]></category>
		<category><![CDATA[Rights of an individual]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2732</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) provides strong rights of an individual, whose personal data is being processed by organisations. Download Detailed Guidance Here The Rights of an Individual The right to be informed Article 13 and Article 14. Your Obligation: You must be completely transparent about how you use personal data. You cannot collect&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2732 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2732"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-pyocfb5ue2r4" data-node="pyocfb5ue2r4">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2161-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> provides strong rights of an individual, whose personal data is being processed by organisations.</p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-noqujwizr2fs" data-node="noqujwizr2fs">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-2rfcs1d89elm" data-node="2rfcs1d89elm">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1>The Rights of an Individual</h1>
<h2><a name="_Toc484164476"></a><a name="_Toc132378641"></a>The right to be informed</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2254-1-1">Article 13</a> and <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2355-1-1">Article 14</a>.</p>
<p><strong>Your Obligation:</strong> You must be completely transparent about how you use personal data. You cannot collect data in secret; you must provide "fair processing information," typically through a Privacy Notice.</p>
<p><strong>What to include:</strong> You must detail your identity and contact info (and that of your DPO), why you are processing the data and the legal basis for doing so, how long you will keep it, and who else will receive it. You must also list the users' rights, including their right to withdraw consent or lodge a complaint.</p>
<p><strong>Format:</strong> The information must be concise, transparent, intelligible, easily accessible, and free of charge. It must be written in clear, plain language—especially if addressed to a child.</p>
<p><strong>Timing:</strong></p>
<ul>
<li><strong>Direct Collection:</strong> If you got the data straight from the individual, give them this info at the time you collect it.</li>
<li><strong>Indirect Collection:</strong> If you got the data from elsewhere, you must inform the individual within a reasonable period (maximum one month), or at the point you first communicate with them or share the data with someone else.</li>
</ul>
<p>The table below summarises the information you should supply to individuals where the personal data has been obtained either directly from the data subject or by another means.</p>
<table>
<tbody>
<tr>
<td width="301">Identity and contact details of the controller (and where applicable, the controller’s representative) and the data protection officer.</td>
<td width="301">The existence of automated decision making, including profiling and information about how decisions are made, the significance and the consequences.</td>
</tr>
<tr>
<td width="301">Any recipient or categories of recipients of the personal data.</td>
<td width="301">Purpose of the processing and the legal basis for the processing.</td>
</tr>
<tr>
<td width="301">The right to lodge a complaint with a supervisory authority.</td>
<td width="301">The existence of each of data subject’s rights.</td>
</tr>
<tr>
<td width="301">Retention period or criteria used to determine the retention period.</td>
<td width="301">Details of transfers to a different country and what safeguards apply.</td>
</tr>
<tr>
<td width="301">The right to withdraw consent at any time, where relevant.</td>
<td width="301">The legitimate interests of the controller or third party, where applicable.</p>
<p>&nbsp;</td>
</tr>
</tbody>
</table>
<p>If the personal data was obtained directly from the data subject, then you should provide them with the above information at the time you get the personal data.</p>
<p>The next table summarises the information you should supply to individuals where the personal data has not been obtained directly from the data subject.</p>
<table>
<tbody>
<tr>
<td width="301">The source the personal data originates from and whether it came from publicly accessible sources.</td>
<td width="301">Categories of personal data.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><a name="_Toc484164478"></a><a name="_Toc132378642"></a>The right of access (Subject Access Requests)</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2513-1-1">Article 15</a>.</p>
<p><strong> </strong><strong>Your Obligation:</strong> You must allow individuals to verify that their data is being processed lawfully. If asked, you must confirm you are processing their data and provide a copy of it.</p>
<p><strong> </strong><strong>Deadlines:</strong> You must respond without delay, and at the latest within one month.</p>
<p><strong> </strong><strong>Extension:</strong> You can extend this by two months if the request is complex or numerous, but you must notify the individual within the first month and explain why.</p>
<p><strong> </strong><strong>Fees:</strong> You generally cannot charge a fee.</p>
<p style="padding-left: 40px;"><strong><em>Exception:</em></strong> You may charge a "reasonable fee" based on administrative costs only if the request is "manifestly unfounded or excessive" (e.g., repetitive) or for additional copies.</p>
<p><strong> </strong><strong>Verification:</strong> You must verify the identity of the requester using reasonable means before handing over data.</p>
<p style="padding-left: 40px;"><strong>Suggested ways:</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Ask the individual to confirm details only they would know based on the data you already hold. Ask 2-3 specific questions:
<ul>
<li>"Please confirm the amount of your last transaction with us."</li>
<li>"What is the reference number on your most recent bill?"</li>
<li>"Please confirm the phone number we have on file for you."</li>
</ul>
</li>
<li>Require the user to log in to their secure account area to submit the request.</li>
<li>If you must ask for photo ID, ask them to redact unnecessary information – e.g. “Please send a photo of your driving licence, but please black out your licence number and date of birth. We only need to see your name and photo”</li>
</ul>
</li>
</ul>
<p><strong> </strong><strong>Format:</strong> If the request is made electronically, you should provide the data in a commonly used electronic format.</p>
<p><a name="_Toc484164485"></a><strong> </strong></p>
<h2><a name="_Toc132378643"></a>The right to rectification</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2599-1-1">Article 16</a>.</p>
<p><a name="_Toc484164487"></a><a name="_Toc132378644"></a><strong> </strong><strong>Your Obligation:</strong> You must correct inaccurate or incomplete personal data upon request.</p>
<p><strong>Third Parties:</strong> If you have shared this data with other organisations, you must inform them of the correction if possible.</p>
<p><strong>Deadlines:</strong> You have one month to comply. This can be extended by two months for complex requests, provided you notify the individual.</p>
<p><strong>Refusal:</strong> If you decide not to take action, you must explain why and inform the individual of their right to complain to a supervisory authority.</p>
<p>&nbsp;</p>
<h2>The right to erasure ("Right to be Forgotten")</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2606-1-1">Article 17</a>.</p>
<p><a name="_Toc484164492"></a><strong> </strong><strong>Your Obligation:</strong> You must delete personal data when there is no compelling reason to keep it. <strong><u>BUT</u></strong> this is not an absolute right. You are quite likely to refuse this one, as its scope is quite narrow.</p>
<p><strong>When to delete:</strong> You must act if:</p>
<ol>
<li>consent is withdrawn</li>
<li>the data is no longer needed for its original purpose</li>
<li>it was processed unlawfully</li>
<li>if there is a legal obligation to delete it</li>
</ol>
<p>Special attention is required for data collected from children online.</p>
<p><strong>Public Data:</strong> If you have made the data public (e.g., on a website), you must take reasonable steps to inform other controllers processing that data to erase links to or copies of it.</p>
<p><strong>Exceptions:</strong> You can refuse deletion if the processing is necessary for freedom of expression, public health, contractual, legal obligations, or the defence of legal claims.</p>
<p>&nbsp;</p>
<h2><a name="_Toc132378645"></a>The right to restrict processing</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2700-1-1">Article 18</a>.</p>
<p><a name="_Toc484164494"></a> <strong>Your Obligation:</strong> In specific circumstances, you must stop using the data but keep it stored. You can retain just enough info to ensure the restriction is respected in the future.</p>
<p><strong>When to restrict:</strong> You must apply this if an individual contests the accuracy of data (while you verify it), if they object to processing (while you verify your legitimate grounds), or if the processing is unlawful but the individual prefers restriction over deletion.</p>
<p><strong>Notification:</strong> You must inform any third parties you shared the data with about the restriction. You must also tell the individual before you lift the restriction.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378646"></a>The right to data portability</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2753-1-1">Article 20</a>.</p>
<p><a name="_Toc484164498"></a> <strong>Your Obligation:</strong> You must allow individuals to obtain and reuse their data across different services by providing it in a format that allows easy transfer.</p>
<p><strong>Format:</strong> Provide the data in a structured, commonly used, and machine-readable form (e.g., CSV files) so software can extract the data.</p>
<p><strong>Scope:</strong> This applies only to data the individual provided to you, processed by automated means, based on consent or a contract.</p>
<p><strong>Direct Transfer:</strong> If the individual asks and it is technically feasible, you should transfer the data directly to another organisation.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378647"></a>The right to object</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2803-1-1">Article 21</a>.</p>
<p><a name="_Toc484164503"></a> <strong>Your Obligation:</strong> You must respect an individual's right to say "no" to processing in certain cases.</p>
<p><strong>Direct Marketing:</strong> If an individual objects to direct marketing, you must stop immediately. There are no exemptions or grounds to refuse.</p>
<p><strong>Legitimate Interests/Public Task:</strong> If they object to processing based on these grounds, you must stop unless you can demonstrate "compelling legitimate grounds" that override their rights, or if it is for legal claims.</p>
<p><strong>Communication:</strong> You must explicitly bring this right to their attention at the point of first communication and in your privacy notice, keeping it separate from other information.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378648"></a>Rights in relation to automated decision making and profiling</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2838-1-1">Article 22</a>.</p>
<p><strong>Your Obligation:</strong> You must provide safeguards against potentially damaging decisions made solely by computers without human intervention.</p>
<p><strong>The Right:</strong> Individuals can refuse to be subject to automated decisions that have legal or significant effects on them.</p>
<p><strong>Safeguards:</strong> If you use automated decision-making, you must allow the individual to obtain human intervention, express their point of view, and obtain an explanation of the decision so they can challenge it.</p>
<p><strong>Profiling:</strong> If you use profiling (analysing personal aspects like performance, health, or location), you must be transparent about the logic involved and the significance of the consequences. You must use appropriate mathematical procedures and secure the data to prevent errors or discrimination.</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-p687qt9i0vao" data-node="p687qt9i0vao">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>L2 Cyber Security Solutions GDPR Audits are powered by Serity</title>
		<link>https://www.l2cybersecurity.com/serity/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 09:00:30 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[GDPR Audit]]></category>
		<category><![CDATA[Serity]]></category>
		<category><![CDATA[Serity.io]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1852</guid>

					<description><![CDATA[<p>&#160;</p>
<p>The post <a href="https://www.l2cybersecurity.com/serity/">L2 Cyber Security Solutions GDPR Audits are powered by Serity</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-1852 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="1852"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5f1ebb163a553 fl-row-default-height fl-row-align-center" data-node="5f1ebb163a553">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5f1ebb163ac32" data-node="5f1ebb163ac32">
			<div class="fl-col fl-node-5f1ebb163aeb1 fl-col-bg-color" data-node="5f1ebb163aeb1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5f1ebb163d327" data-node="5f1ebb163d327">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><img decoding="async" class="aligncenter wp-image-2238 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/seritysquare-x500-no-longer-available.jpg" alt="Serity No Longer Available" width="500" height="500" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/seritysquare-x500-no-longer-available.jpg 500w, https://www.l2cybersecurity.com/wp-content/uploads/2020/01/seritysquare-x500-no-longer-available-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2020/01/seritysquare-x500-no-longer-available-150x150.jpg 150w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>&nbsp;</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/serity/">L2 Cyber Security Solutions GDPR Audits are powered by Serity</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Right To Be Informed</title>
		<link>https://www.l2cybersecurity.com/right-to-be-informed/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 23:01:46 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1310</guid>

					<description><![CDATA[<p>This page lists all of the various categories of personal data that L2 Cyber Security Solutions process and provides a downloadable PDF containing the required right to be informed information. &#160; &#160; &#160; &#160; Customers (clients who have engaged L2 Cyber Security directly for training and consulting work): Download here Website users: Download here Trainees&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/right-to-be-informed/">Right To Be Informed</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1311" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/right-to-be-informed-150x150.jpg" alt="right to be informed" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/right-to-be-informed-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/right-to-be-informed.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />This page lists all of the various categories of personal data that <a href="http://www.L2CyberSecurity.com">L2 Cyber Security Solutions</a> process and provides a downloadable PDF containing the required right to be informed information.<span id="more-1310"></span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Customers (clients who have engaged L2 Cyber Security directly for training and consulting work):</p>
<p style="padding-left: 30px;"><a href="https://www.l2cybersecurity.com/wp-content/uploads/2019/08/2019-08-01-RTBIB-customers.pdf" target="_blank" rel="noopener noreferrer">Download here</a></p>
<p>Website users:</p>
<p style="padding-left: 30px;"><a href="https://www.l2cybersecurity.com/wp-content/uploads/2019/08/2019-08-01-RTBIB-website.pdf" target="_blank" rel="noopener noreferrer">Download here</a></p>
<p>Trainees who attend an L2 Cyber Security provided course:</p>
<p style="padding-left: 30px;"><a href="https://www.l2cybersecurity.com/wp-content/uploads/2019/08/2019-08-01-RTBIB-trainees-l2cyber.pdf" target="_blank" rel="noopener noreferrer">Download here</a></p>
<p>Trainees who attend a training course, provided by separate business entity, for which L2 Cyber is contracted to (e.g. a Skillnet, Local Enterprise Office, another training company, etc.):</p>
<p style="padding-left: 30px;"><a href="https://www.l2cybersecurity.com/wp-content/uploads/2019/08/2019-08-01-RTBIB-trainees-third-party-trainers.pdf" target="_blank" rel="noopener noreferrer">Download here</a></p>
<p>Suppliers of goods and services to L2 Cyber Security:</p>
<p style="padding-left: 30px;"><a href="https://www.l2cybersecurity.com/wp-content/uploads/2019/08/2019-08-01-RTBIB-suppliers.pdf" target="_blank" rel="noopener noreferrer">Download here</a></p>
<p>Effective Data: <strong>01/08/2019</strong></p>
<p>Reviewed: <strong>Annually</strong></p>
<p>The post <a href="https://www.l2cybersecurity.com/right-to-be-informed/">Right To Be Informed</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Individual&#8217;s Rights</title>
		<link>https://www.l2cybersecurity.com/gdpr-01-individuals-rights/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Sep 2018 11:00:09 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=679</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) created some new rights for individuals and strengthens some of the rights that previously existed under the Data Protection Act 1988/2003. The PDF is available here: GDPR-01-Individuals rights &#160;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-01-individuals-rights/">Individual&#8217;s Rights</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The General Data Protection Regulation (GDPR) created some new rights for individuals and strengthens some of the rights that previously existed under the Data Protection Act 1988/2003.<span id="more-679"></span></p>
<p>The PDF is available here: <a href="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GDPR-01-Individuals-rights-1.pdf" target="_blank" rel="noopener">GDPR-01-Individuals rights</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-01-individuals-rights/">Individual&#8217;s Rights</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data breach video series &#8211; CCTV Leakage</title>
		<link>https://www.l2cybersecurity.com/data-breach-video-series-cctv-leakage/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 20 Jul 2018 10:59:25 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Data Breach]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1274</guid>

					<description><![CDATA[<p>Data Breach CCTV Leakage. This short video talks about how allowing CCTV footage to be leaked online is a serious data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-cctv-leakage/">Data breach video series &#8211; CCTV Leakage</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data Breach CCTV Leakage.</p>
<p>This short video talks about how allowing CCTV footage to be leaked online is a serious data breach under the #GDPR.</p>
<p><iframe loading="lazy" title="What is a data breach - CCTV Leakage" width="500" height="281" src="https://www.youtube.com/embed/A3ylfhDpcPk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>For more information or to contact us please visit our website at <a href="https://www.L2CyberSecurity.com">https://www.L2CyberSecurity.com</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-cctv-leakage/">Data breach video series &#8211; CCTV Leakage</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data breach video series &#8211; Open Plan Office</title>
		<link>https://www.l2cybersecurity.com/data-breach-video-series-open-plan-office/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 16:02:06 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Data Breach]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1270</guid>

					<description><![CDATA[<p>Data Breach Open Plan Office. This short video talks about how having a public space near to an open plan office may lead to a data breach under the #GDPR. A breach may arise where your staff are speaking to other staff or to people on the phone and they are speaking items of personal&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-open-plan-office/">Data breach video series &#8211; Open Plan Office</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data Breach Open Plan Office.</p>
<p>This short video talks about how having a public space near to an open plan office may lead to a data breach under the #GDPR. A breach may arise where your staff are speaking to other staff or to people on the phone and they are speaking items of personal data out loud. If there is somebody waiting in a public space near the open plan office that could overhear their talk, then a data breach will have occurred.</p>
<p><iframe loading="lazy" title="What is a data breach - Open plan office near public space" width="500" height="281" src="https://www.youtube.com/embed/yXURZfucaEE?start=5&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>For more information or to contact us please visit our website at <a href="https://www.L2CyberSecurity.com">https://www.L2CyberSecurity.com</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-open-plan-office/">Data breach video series &#8211; Open Plan Office</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data breach video series &#8211; Sharing a Password</title>
		<link>https://www.l2cybersecurity.com/data-breach-video-series-sharing-a-password/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 13 Jul 2018 17:56:51 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Data Breach]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1266</guid>

					<description><![CDATA[<p>Data Breach Sharing a Password. This short video talks about how simply sharing your password could be a data breach under the #GDPR. This is because, by giving somebody your password, you are giving them access to everything that you have access to. If you are authorised to access certain personal data, which they are&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-sharing-a-password/">Data breach video series &#8211; Sharing a Password</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data Breach Sharing a Password.</p>
<p>This short video talks about how simply sharing your password could be a data breach under the #GDPR. This is because, by giving somebody your password, you are giving them access to everything that you have access to. If you are authorised to access certain personal data, which they are not authorised to be able to access, then by giving them your password, you have caused a data breach as they can now access data that they should not be able to.</p>
<p><iframe loading="lazy" title="What is a data breach - Sharing a Password" width="500" height="281" src="https://www.youtube.com/embed/UAW2NyDbU5I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>For more information or to contact us please visit our website at <a href="https://www.L2CyberSecurity.com">https://www.L2CyberSecurity.com</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-sharing-a-password/">Data breach video series &#8211; Sharing a Password</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data breach video series &#8211; Personal data on display</title>
		<link>https://www.l2cybersecurity.com/data-breach-video-series-personal-data-on-display/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 09 Jul 2018 16:50:59 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Data Breach]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1262</guid>

					<description><![CDATA[<p>Date Breach Personal data on display. This short video talks about how simply leaving somebody&#8217;s personal data on display in a public place is a data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-personal-data-on-display/">Data breach video series &#8211; Personal data on display</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Date Breach Personal data on display.</p>
<p>This short video talks about how simply leaving somebody&#8217;s personal data on display in a public place is a data breach under the #GDPR.</p>
<p><iframe loading="lazy" title="What is a data breach - Leaving personal data on display" width="500" height="281" src="https://www.youtube.com/embed/QDGPc_3lWXw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>For more information or to contact us please visit our website at <a href="https://www.L2CyberSecurity.com">https://www.L2CyberSecurity.com</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-video-series-personal-data-on-display/">Data breach video series &#8211; Personal data on display</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
