<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Privacy Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/data-privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/data-privacy/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 04 Mar 2019 17:47:31 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Data Privacy Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/data-privacy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>First Annual Report from the DPC</title>
		<link>https://www.l2cybersecurity.com/first-annual-report-dpc/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 01 Mar 2019 16:30:03 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Annual Report]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1605</guid>

					<description><![CDATA[<p>The first annual report from the Data Protection Commission, under the auspices of the GDPR has just been released. Have you read it yet? It&#8217;s only 104 pages and unless you are a privacy nerd (like me) you may find it tough going. Truth be told, I struggled to stay fully focused on it as&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/first-annual-report-dpc/">First Annual Report from the DPC</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1606" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/03/DPC-first-annual-report-150x150.jpg" alt="first annual report" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/03/DPC-first-annual-report-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/03/DPC-first-annual-report.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />The first annual report from the Data Protection Commission, under the auspices of the GDPR has just been released. <span id="more-1605"></span>Have you read it yet? It&#8217;s only 104 pages and unless you are a privacy nerd (like me) you may find it tough going. Truth be told, I struggled to stay fully focused on it as I read through it.</p>
<h3>Surely this isn&#8217;t the first annual report?</h3>
<p>The office of the Data Protection Commissioner has been around for many many years and have issued many many annual reports. When the GDPR came along on 25th May, the office was renamed to be the Data Protection Commission. This report (which you can <a href="https://www.dataprotection.ie/sites/default/files/uploads/2019-03/DPC Annual Report 25 May - 31 December 2018.pdf" target="_blank" rel="noopener noreferrer">read here</a>) is their first report covering the period 25th May &#8211; 31st December 2018.</p>
<p>Due to the fact that there are investigations still going on from before 25th May 2018, under the previous legislation, the report shows two sets of figures. This post will concentrate on the GDPR figures.</p>
<h3>What are the highlights?</h3>
<p>There were nearly 2,000 complaints made. The top 10 of these accounted for 94% of all complaints. They are:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1607" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/03/Report-complaints.jpg" alt="Top 10 GDPR complaints 2018" width="457" height="603" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/03/Report-complaints.jpg 457w, https://www.l2cybersecurity.com/wp-content/uploads/2019/03/Report-complaints-227x300.jpg 227w" sizes="(max-width: 457px) 100vw, 457px" /></p>
<p>Issues around access rights was also the number 1 complaint (39%) under the previous legislation, so this is the most important area that a business or organisation should get right. I&#8217;m a little surprised by the complaints under Right of Rectification. That is such a simple one to get correct, why were there 30 complaints? ?‍♂️</p>
<h3>Data breaches are on the rise.</h3>
<p>There were nearly 3,700 data breaches reported. 85% of them were in the category of unauthorised disclosure which wasn&#8217;t really surprising.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-1608" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/03/DPC-Data-Breaches-2018.jpg" alt="Data breaches 2018" width="500" height="432" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/03/DPC-Data-Breaches-2018.jpg 500w, https://www.l2cybersecurity.com/wp-content/uploads/2019/03/DPC-Data-Breaches-2018-300x259.jpg 300w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>It&#8217;s interesting to note that there were 226 incidents (6%) which related to paper records. I actually think that figure should be a little bit higher, as I suspect people don&#8217;t consider losing or poorly disposing of paper records to be a proper data breach.</p>
<h3>What about the Facebook problems reported last year?</h3>
<p>They are in there too. There are 15 Statutory Inquiries into multinational technology companies. 10 of these inquiries relate to Facebook (7), or Facebook owned companies (WhatsApp 2 and Instagram 1). Of those 10 complaints 4 related to Legal Basis for processing and 3 relate to the <a href="https://www.l2cybersecurity.com/facebook-breach-dpc-public/" target="_blank" rel="noopener noreferrer">data breach reported in September 2018</a>.</p>
<p>The other companies that had inquiries ongoing are Apple with 2, Twitter 2 and LinkedIn 1.</p>
<h3>Was there anything else interesting in the report?</h3>
<p>Well yes there was. It&#8217;s to do with how the DPC acted when dealing with some of the complaints they came across. There were a few case studies provided (pages 24-26). The DPC handled these without the need to impose sanctions, by making the data controller aware of their failings and providing ways to rectify the situation.</p>
<p>What was also interesting was where complaints had come in about data controllers, who had been investigated previously by the Office of the Data Protection Commissioner. In these cases, the DPC prosecuted them in court and had financial penalties applied (pages 64-67). These cases were taken under previous legislation, so the sanctions were small enough. But this shows that if you, as a controller, come to the DPC&#8217;s attention multiple times, they will take a dim view of your behaviour.</p>
<h3>Conclusion:</h3>
<p>There was a lot more to this first annual report than what I covered above, but for most businesses, these are the items that matter.</p>
<p>If you would like to avail of a free 1 hour consultation to find out what you need to do to prepare your business for the GDPR, then please send an e-mail to <a href="mailto:info@l2cybersecurity.com">info@l2cybersecurity.com</a> and somebody will get back to you.</p>
<p>#GDPR #SimpleGDPR</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/first-annual-report-dpc/">First Annual Report from the DPC</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR fines are starting to come.</title>
		<link>https://www.l2cybersecurity.com/gdpr-fines-starting-to-come/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 28 Nov 2018 12:44:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR fines]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1469</guid>

					<description><![CDATA[<p>Shortly after I posted about the Austrian GDPR fine, another fine was issued by the regulatory authority in Portugal. Late last week the German regulatory authority imposed another fine on an App maker. So the GDPR fines are beginning to come. Let&#8217;s take a quick look at these three cases and then see what you&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-fines-starting-to-come/">GDPR fines are starting to come.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1471" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/GDPR-fines-150x150.jpg" alt="GDPR fines" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/GDPR-fines-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/11/GDPR-fines.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Shortly after I posted about the <a href="https://www.l2cybersecurity.com/gdpr-hasnt-gone-away/" target="_blank" rel="noopener">Austrian GDPR fine</a>, another fine was issued by the regulatory authority in Portugal. Late last week the German regulatory authority imposed another fine on an App maker. So the GDPR fines are beginning to come. Let&#8217;s take a quick look at these three cases and then see what you can do.<span id="more-1469"></span></p>
<h3></h3>
<h3></h3>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3>Austrian surveillance cost €4.8K</h3>
<p>Just to recap, a business owner had <a href="https://digital.freshfields.com/post/102f39w/first-gdpr-fine-issued-by-austrian-data-protection-regulator" target="_blank" rel="noopener">CCTV installed</a> outside their premises. One camera was recording a large portion of the public footpath. This was judged to be too invasive and there was poor signage. The regulatory authority hit them with a modest €4,800 fine. The Austrian data protection authority had 36 other proceedings pending at that time.</p>
<h3>Portuguese hospital with too many doctor&#8217;s accounts hit for €400K</h3>
<p>An unnamed hospital in Portugal had 985 doctor&#8217;s accounts on it&#8217;s IT system and only 296 doctors on staff. It seems that non-Doctor types (e.g. psychologists and dietitians) used doctor accounts to access patient data. What is most troubling is that a doctor account has unrestricted access to every single patient&#8217;s data.</p>
<p>You might not think this is a big deal, but you&#8217;re dealing with sensitive personal data here. There should be some controls on access to it, including audit logs of any and all access made by authorised personnel.</p>
<p><a href="https://www.insideprivacy.com/data-privacy/portuguese-hospital-receives-and-contests-400000-e-fine-for-gdpr-infringement/" target="_blank" rel="noopener">The regulator has imposed</a> a €400,000 fine on the hospital, which is appealing the judgement. The Portuguese Government have not yet fully implemented the GDPR, but the regulator is acting as if it was in place.</p>
<h3>App maker who cooperated, still fined €20K</h3>
<p>A German chat platform, knuddles.de had a breach in which <a href="https://www.baden-wuerttemberg.datenschutz.de/lfdi-baden-wuerttemberg-verhaengt-sein-erstes-bussgeld-in-deutschland-nach-der-ds-gvo/" target="_blank" rel="noopener">330,000 e-mail addresses</a> (in German) and their account passwords were stolen by hackers. The passwords were in plain text (no hashing or encrypting was applied). It was the screw-up with the password that caused the fine. They hadn&#8217;t applied appropriate technical or organisational controls to protect the data.</p>
<p>The regulatory authority acknowledged that Knuddles were very proactive in reporting the breach and the subsequent follow up. They have implemented stronger security controls in a very short time. In consultation with the regulator they have more measures coming in due course.</p>
<p>The regulator also looked at the financial  strength of the company in determining the fine, not wanting to place the business under any financial burden. So the fine was proportionate. I would hate to think what might have been the case if they hadn&#8217;t cooperated.</p>
<h3>To avoid GDPR fines, budget now to prepare early in 2019</h3>
<p>If your business hasn&#8217;t put in place any policies or procedures to address the requirements of the GDPR, you should look at addressing this soon. Most annual budgets will have been exhausted by now, so put in place a sensible sum for GDPR preparation work, early next year.</p>
<ul>
<li>If you haven&#8217;t attended a GDPR awareness event, then seek one out or give us a call on <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">087-436-2675</span></span>.</li>
<li>We are now offering <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-Practical-Training.pdf" target="_blank" rel="noopener">Practical GDPR Training</a>, which can give you virtually everything you need to be as compliant as possible. Being &#8220;100% GDPR compliant&#8221; is not something that can be stated presently, as there is no certification available to support such a declaration.</li>
<li>Or if you prefer to keep making money for your business and not be distracted, then we can do the work for you. Send us an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we&#8217;ll get in touch.</li>
</ul>
<p>#GDPR</p>
<p>#SimpleGDPR</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-fines-starting-to-come/">GDPR fines are starting to come.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook are only fined £500,000</title>
		<link>https://www.l2cybersecurity.com/facebook-are-only-fined-500000/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 26 Oct 2018 10:27:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Fined]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[ICO]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1444</guid>

					<description><![CDATA[<p>You remember the Facebook/Cambridge Analytica mess from earlier this year? Well, Facebook have been issued with a notice that they are to be fined £500,000 as a result of this. &#8220;What? Facebook are only fined £500,000?&#8221; I hear you cry. Yes that is maximum penalty that the Information Commissioners Office (ICO) in the UK are able to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-are-only-fined-500000/">Facebook are only fined £500,000</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1445" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/facebook-are-only-fined-150x150.jpeg" alt="Facebook are only fined £500,000" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/facebook-are-only-fined-150x150.jpeg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/facebook-are-only-fined.jpeg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />You remember the <a href="https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/" target="_blank" rel="noopener">Facebook/Cambridge Analytica mess</a> from earlier this year? Well, Facebook have been issued with a notice that <a href="https://ico.org.uk/media/action-weve-taken/mpns/2260051/r-facebook-mpn-20181024.pdf" target="_blank" rel="noopener">they are to be fined £500,000</a> as a result of this. &#8220;What? Facebook are only fined £500,000?&#8221; I hear you cry. <span id="more-1444"></span>Yes that is maximum penalty that the Information Commissioners Office (ICO) in the UK are able to levy under the Data Protection Act 1998.</p>
<p>&#8220;But where are the €20m or 4% of turnover fines for violating the GDPR?&#8221; you shout. As the underlying data breach incident occurred some years ago and surfaced before the #GDPR went into effect in May 2018, then they couldn&#8217;t be prosecuted under the Data Protection Act 2018, which implements the GDPR.</p>
<p>But this is still a significant judgement. The ICO has gone for the maximum possible penalty against Facebook, showing that what they were up to was completely unacceptable and rightly so. They found that Facebook had breached two of the principles of data protection:</p>
<ol>
<li>Facebook had unfairly processed personal data.</li>
<li>And they didn&#8217;t put in place appropriate measures to prevent unauthorised or unlawful processing of personal data.</li>
</ol>
<p>So while Facebook are only fined £500,000 this time, this is a clear indication that data protection authorities won&#8217;t be afraid of going after the maximum fines available to them for failures in respect to protecting peoples personal data.</p>
<p>Also don&#8217;t forget that the Irish Data Protection Commissioner is <a href="https://www.l2cybersecurity.com/facebook-breach-dpc-public/" target="_blank" rel="noopener">investigating Facebook for a GDPR era incident</a>. That incident started with 50m people affected with another 40m possibly impacted. It dropped down to only ~30m affected &#8230; but that&#8217;s still ~30,000,000 people. Of those, 14m had the following personal data accessed:</p>
<blockquote><p>Username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages they follow, and the 15 most recent searches.</p></blockquote>
<p>That is a massive amount of personal data to have been harvested, and could definitely be used against the victims. That particular investigation will be a big one and will probably run into some time in 2019.</p>
<p>In the meantime, lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-are-only-fined-500000/">Facebook are only fined £500,000</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Holiday Data Breach Photos.</title>
		<link>https://www.l2cybersecurity.com/holiday-data-breach-photos/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 28 Aug 2018 08:48:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1361</guid>

					<description><![CDATA[<p>Most normal people go on holidays, forget about work, relax and enjoy themselves. They also, probably take lots of nice photos of the great places they&#8217;ve been and the nice food they&#8217;ve eaten. I went on holiday recently in remote, rural Ireland and I did pretty much all of the above. However, I suffer from&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/holiday-data-breach-photos/">Holiday Data Breach Photos.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Most normal people go on holidays, forget about work, relax and enjoy themselves. They also, probably take lots of nice photos of the great places they&#8217;ve been and the nice food they&#8217;ve eaten. I went on holiday recently in remote, rural Ireland and I did pretty much all of the above.<span id="more-1361"></span> However, I suffer from an affliction, which means I actually have holiday data breach photos because:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1362" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/I-see-data-breaches.gif" alt="I see data breaches" width="400" height="225" /></p>
<p>I wasn&#8217;t deliberately going looking for data breaches or other data privacy concerns. However these two examples just leapt out at me. Please note that I have redacted sections of these pictures where there were potentially identifying features. I&#8217;ve also removed individual&#8217;s names, just in case you could make them out.</p>
<h3>Staff roster and holiday plans on public display</h3>
<p>I ate and drank in quite a few different establishments on my holiday, but this one had the staff roster and a holiday planner in plain sight, over one of the tills.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1364" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Holiday-and-roster-on-public-view.jpg" alt="Holiday planner and roster on public display" width="439" height="374" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Holiday-and-roster-on-public-view.jpg 439w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Holiday-and-roster-on-public-view-300x256.jpg 300w" sizes="auto, (max-width: 439px) 100vw, 439px" />Because it was dark, the camera struggled to pick it out very clearly, but I could read the names clearly on the holiday planner (on the left). This had the staff names down the left hand side. Then the columns were for June, July and August and this is where the staff obviously noted their holiday plans.</p>
<p>The weekly roster is on the right, where again the staff names were down the left hand side. Then what shifts they were working each day was in the columns. I couldn&#8217;t make this out myself at the distance I was from it &#8211; approximately 2m.</p>
<p>If I had a better camera or better light, there is no doubt I could easily have got the complete staff list, their holiday plans and their work schedule for the coming week.</p>
<p>This is a breach of the staff&#8217;s right to privacy. Any member of the public could see when they were going to be on holiday or when they were going to be at work. This could lead to their home being broken into, as the bad guys know when they are going to be away. Or how about an abusive ex-partner? How much would they love to have this kind of information available to them.</p>
<p>The real shame about this &#8230; this place had a large back-of-house (kitchen and office) that all the staff had access to, but not the public. Why not post these things back there?</p>
<h3>Staff surveillance</h3>
<p>CCTV is used extensively in pubs and restaurants mainly for crime prevention and health and safety purposes. In this pub there was this ONE camera that only had eyes for one thing &#8230; this till</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1365" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/CCTV-watching-a-till.jpg" alt="cctv watching a till" width="417" height="600" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/CCTV-watching-a-till.jpg 417w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/CCTV-watching-a-till-209x300.jpg 209w" sizes="auto, (max-width: 417px) 100vw, 417px" /></p>
<p>So obviously they were using this camera to keep an eye on staff to see if they were fiddling the till. This was a very obvious placement of a camera. This would not be considered &#8220;covert&#8221; by any means or standards. That&#8217;s me talking as somebody who notices this stuff for a living. If I was still in school, starting out on my first pub job, I may <em><strong>not</strong></em> notice such things.</p>
<p>Surveillance of staff needs to be declared by the employer. In this instance there should be a point in the staff manual noting that the tills are monitored by cameras. If an employer was to use secret cameras to monitor staff, they should also declare this. They should state that from time-to-time covert surveillance of employees, in the performance of their work, may be implemented.</p>
<h3>Have you any holiday data breach snaps?</h3>
<p>In both of the above situations, I have anonymously (I was on holiday, so I&#8217;m not hunting sales leads) notified the owners of the establishments about my observations.</p>
<p>When you are looking through your photos from your vacation, can you find any holiday data breach pictures? If you think you have, send them in confidence to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and I&#8217;ll let you know, but please don&#8217;t tell me the name of the place or the location.</p>
<p>If you would like to know more about different data breaches under the GDPR, check out the videos available on the <a href="https://www.l2cybersecurity.com/gdpr/" target="_blank" rel="noopener">GDPR section</a> of my website.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/holiday-data-breach-photos/">Holiday Data Breach Photos.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Who&#8217;s been reading your Gmail?</title>
		<link>https://www.l2cybersecurity.com/whos-been-reading-your-gmail/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 09:51:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GMail]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1242</guid>

					<description><![CDATA[<p>For a long time the answer to the question &#8220;Who&#8217;s been reading your Gmail?&#8221; has been Google&#8217;s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/whos-been-reading-your-gmail/">Who&#8217;s been reading your Gmail?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-1243 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/look-over-shoulder-150x150.jpg" alt="Who's been reading your Gmail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/look-over-shoulder-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/look-over-shoulder.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />For a long time the answer to the question &#8220;Who&#8217;s been reading your Gmail?&#8221; has been Google&#8217;s advertising algorithms. They stated that <a href="https://blog.google/products/gmail/g-suite-gains-traction-in-the-enterprise-g-suites-gmail-and-consumer-gmail-to-more-closely-align/">they have stopped doing that last year</a>. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being fully aware of it.<span id="more-1242"></span></p>
<p>I have covered this area before, where I talked about <a href="https://www.l2cybersecurity.com/permission-to-spy/">Mobile App permissions</a>. It&#8217;s pretty easy to see what permissions a Mobile App is looking for and to make an educated decision about whether it should receive those permissions by you.</p>
<p>In this newly revealed situation, some third-party developers, who create add-on apps for your e-mail may have actually had real people reading your e-mail. <span id="c103" class="notranslate">?</span></p>
<p>The apps in question are usually performing some useful function, like monitoring your mailbox for meeting invitations and then suggesting appropriate times for the meeting. Or itinerary/travel planning apps that look for flight/hotel booking e-mails and then package them up into a useful, coordinated scheduling pack.</p>
<p>According to <a href="https://nakedsecurity.sophos.com/2018/07/04/someone-else-is-reading-your-gmails/">this Sophos report</a>, when you install these (usually free) add-ons:</p>
<blockquote><p>Users had to agree to share that information first, granting explicit permission for an app to access your Gmail account or your broader Google account. However, what users may not have known is that this doesn’t only give the third party company’s software access to your email. It gives developers inside those companies the ability to manually access them too.</p></blockquote>
<p>And as is also reported in that Sophos report, one of the companies did admit to allowing their staff to actually read people&#8217;s e-mails, supposedly to include new features that people might find useful. However what&#8217;s at play here is that most people weren&#8217;t aware that their actual e-mails are being read by another actual human.</p>
<p>Most people, myself included, went &#8220;Meh!&#8221; when we heard that Google&#8217;s advertising algorithms were scanning our e-mail content, because it is some non-human thing that is looking at the cold hard data.</p>
<p>However, the notion that another actual human may have been reading sensitive, private discussions in an e-mail chain would be quite concerning to most people and rightfully so.</p>
<h4>How can you find out who&#8217;s been reading your Gmail?</h4>
<p>Well you might not be able to find out if they have read your e-mail, but there&#8217;s something really easy you can do to find out what apps have got access to your Gmail.</p>
<p>Check the <a href="https://myaccount.google.com/permissions">apps with access to your account</a> page for your Google account and review any apps you have there. I&#8217;ve just done it and found there was an app that I previously used to look at Google Analytics, but have since stopped using and uninstalled. However the app developers still would have had permission to access any Google Analytics data I had (which I don&#8217;t any more as I have stopped using that too). I simply clicked on the app and removed it&#8217;s access. It&#8217;s that simple.</p>
<p>If you do have these apps that can enable somebody to read your Gmail, you need to consider a couple of things:</p>
<ol>
<li>If this is your business e-mail account, have you considered the #GDPR aspects of giving an external third party access to view personal data? You will need to have a Data Processing Agreement in place with the third party and also declare their access to the individuals whose personal data you process.</li>
<li>If this is your personal e-mail account, then you have got to make the determination if the app is so useful to you that you are happy to allow some developer, somewhere in the world read your e-mail.</li>
</ol>
<p>For me privacy wins out every time.</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/whos-been-reading-your-gmail/">Who&#8217;s been reading your Gmail?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MyFitnessPal Breach &#8211; Bigger than Equifax</title>
		<link>https://www.l2cybersecurity.com/myfitnesspal-breach-bigger-equifax/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 30 Mar 2018 15:15:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1181</guid>

					<description><![CDATA[<p>The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the Equifax breach. Under Armour, the website&#8217;s owner, reported the breach yesterday. They have pushed out a notification on their website as well as to all affected customers of the MyFitnessPal&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/myfitnesspal-breach-bigger-equifax/">MyFitnessPal Breach &#8211; Bigger than Equifax</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1182" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal-150x150.jpg" alt="MyFitnessPal breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal.jpg 362w" sizes="auto, (max-width: 150px) 100vw, 150px" />The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/">Equifax breach</a>. <em>Under Armour</em>, the website&#8217;s owner, <a href="https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html">reported the breach</a> yesterday. <span id="more-1181"></span>They have pushed out <a href="https://content.myfitnesspal.com/security-information/notice.html">a notification</a> on their website as well as to all affected customers of the MyFitnessPal breach and actually did so very quickly, which is pretty impressive. So far, it&#8217;s being handled a lot better than the <a href="https://www.theregister.co.uk/2017/09/21/equifax_fooled_again_company_teets_out_links_to_website_parodying_it/">Equifax omni-shambles</a>.</p>
<p><em> Under Armour</em> report that the MyFitnessPal breach included user names, e-mail addresses and hashed passwords (hashing is the way to scramble passwords).</p>
<p>This breach was detected last weekend, on 25th March. The data itself had been last accessed by the evil doers in February.</p>
<p>As part of the notification, <em>Under Armour </em>stated that they:</p>
<ul>
<li>are notifying MyFitnessPal users to provide information on how they can protect their data</li>
<li>will be requiring MyFitnessPal users to change their passwords and urge users to do so immediately</li>
<li>will continue to monitor for suspicious activity and <span style="text-decoration: underline;"><strong>to coordinate with law enforcement authorities</strong></span></li>
<li>will continue to make enhancements to their systems to detect and prevent unauthorised access to user information</li>
</ul>
<p>All good steps to be taken. I particularly applaud the engagement with law enforcement. As I stated in the post about the <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/">overwhelming attack</a> which was detected earlier this month, businesses need to start reporting these criminal activities, so our own <em>Garda Síochána</em> can get better statistics which will support more funding for the <em>Garda Cyber Crime Bureau</em>.</p>
<p><em>Under Armour</em> also provided the affected users with good advice:</p>
<ul>
<li>Change your password for any other account on which you used the same or similar information used for your MyFitnessPal account</li>
<li>Review your accounts for suspicious activity</li>
<li>Be cautious of any unsolicited communications that ask for your personal data or refer you to a web page asking for personal data</li>
<li>Avoid clicking on links or downloading attachments from suspicious emails</li>
</ul>
<p>I suppose it was too much to hope that they would give a suggestion that users should also start using two-factor authentication where possible. Hopefully one of the enhancements that they will make to their systems will be to introduce such a feature.</p>
<p>Have a watch of my <a href="https://www.youtube.com/watch?v=JqcpmfqBAK8">short 10 minute video</a> which tells you all you need to know about two-factor authentication:</p>
<p>The post <a href="https://www.l2cybersecurity.com/myfitnesspal-breach-bigger-equifax/">MyFitnessPal Breach &#8211; Bigger than Equifax</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does Your VPN Leak Data?</title>
		<link>https://www.l2cybersecurity.com/does-your-vpn-leak-data/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 14:45:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1296</guid>

					<description><![CDATA[<p>It&#8217;s probably not a question most people would ask when they purchase a Virtual Private Network (VPN), but maybe you should ask &#8220;Does this VPN leak data?&#8221; It&#8217;s been revealed that several VPN providers are putting your privacy at risk by leaking some data that should be kept secret. VPNs are supposed to be all about&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/does-your-vpn-leak-data/">Does Your VPN Leak Data?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1297" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Leaking-VPN-150x150.jpeg" alt="VPN leak" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Leaking-VPN-150x150.jpeg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Leaking-VPN.jpeg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />It&#8217;s probably not a question most people would ask when they purchase a Virtual Private Network (VPN), but maybe you should ask &#8220;Does this VPN leak data?&#8221; It&#8217;s been revealed that several VPN providers are putting your privacy at risk by <a href="https://voidsec.com/vpn-leak/">leaking some data</a> that should be kept secret. <span id="more-1296"></span>VPNs are supposed to be all about privacy, so this question shouldn&#8217;t have to be asked as the provider should not be leaking anything.</p>
<p>&nbsp;</p>
<h3>What&#8217;s this VPN thing anyway?</h3>
<p>A VPN is (usually) a piece of software that is installed on your computer or mobile device which establishes a secure connection between that device and some other point on the internet. That could be your corporate network or a VPN provider&#8217;s network. The connection is fully encrypted, so all the data flowing between your device and the other end of the connection will be meaningless scrambled data. It will be useless to anybody that intercepts this data.</p>
<p>What is also very important is that the VPN hides the users identity/location by making your device appear to be located elsewhere on the internet, rather than where your internet provider shows you as being. It does this by assigning your connection a different address on the internet, also known as the Internet Protocol (IP) Address.</p>
<h3>So what data does some provider&#8217;s VPN leak?</h3>
<p>The <a href="http://ip.voidsec.com/">simple tool</a> provided by the security researcher Paolo Stagno can show your original IP address as well as your VPN provided IP address. Therefore a website can tell where you actually are on the internet rather than where your VPN provider is trying to show you as being from. So here is an example of where you have a VPN leak:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1298" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/vpn-leak.png" alt="" width="601" height="363" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/vpn-leak.png 601w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/vpn-leak-300x181.png 300w" sizes="auto, (max-width: 601px) 100vw, 601px" /></p>
<p>As you can see, in the lower half (Web RTC), your Internet Service Provider (ISP) provided IP address is shown, along with your actual internal address of your local home or office network.</p>
<p>Compare that now to a VPN connection where they are not allowing the data to be leaked:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1299" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-vpn-leak.jpg" alt="" width="609" height="367" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-vpn-leak.jpg 609w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-vpn-leak-300x181.jpg 300w" sizes="auto, (max-width: 609px) 100vw, 609px" /></p>
<p>Here we see only the VPN provider&#8217;s IP address and their internal network address. So somebody using this VPN would not be at risk from being identified and located on the internet. This is important to maintain privacy, as that is one of the main reasons for wanting to use a VPN in the first place.</p>
<p>If you would like to have a chat about some of the<a href="https://www.l2cybersecurity.com/#ourservices"> security services</a> we can provide, then please either send an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> or call us on <span style="text-decoration: underline;"><strong>087-436-2675</strong></span>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/does-your-vpn-leak-data/">Does Your VPN Leak Data?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cambridge Analytica were nosey ninnies</title>
		<link>https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 10:55:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cambridge Analytica]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1174</guid>

					<description><![CDATA[<p>Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. This has been blown up as a big&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/">Cambridge Analytica were nosey ninnies</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1175" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Cambridge-Analytica-and-Facebook-150x150.jpg" alt="Cambridge Analytica and Facebook" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Cambridge-Analytica-and-Facebook-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Cambridge-Analytica-and-Facebook.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. <span id="more-1174"></span>This has been blown up as a big scandal and rightly so. However, are we really surprised? Think about it rationally. Should we be surprised that the huge volume of data that we hand over to Facebook is utilised in ways that are incomprehensible to us? The vast majority of us are not data scientists, so we may not realise that by &#8220;Liking&#8221; that funny picture lampooning a political figure, we are giving Facebook a possible indication of our political preferences.</p>
<h3>What did Cambridge Analytica do?</h3>
<p>In 2015, Dr Aleksandr Kogan, who was a lecturer at Cambridge University&#8217;s Department of Psychology, put out an &#8220;App&#8221; on Facebook which carried out a survey for the purposes of &#8220;scientific research&#8221;. <span id="c128" class="notranslate">?</span></p>
<p>This app had some 270,000 people use it on their Facebook page. &#8220;In so doing, they gave their consent for Kogan to access information such as the city they set on their profile, or content they had liked, as well as more limited information about friends who had their privacy settings set to allow it.” according to a <a href="https://newsroom.fb.com/news/2018/03/suspending-cambridge-analytica/">Facebook statement</a>.</p>
<p>Basically, this &#8220;App&#8221; profiled the people who used it, then probed into the Facebook profiles of the friends of that 270,000 and profiled them as well. This is where the 50 million affected people figure came from.</p>
<p>Just to be clear &#8211; There was no <span style="text-decoration: underline;"><strong>breach</strong></span> of Facebook data in this &#8220;scandal&#8221;. Facebook had a &#8220;Feature&#8221; at the time which allowed apps to look at freinds profiles. These apps would have told the users that this is what they were enabling before they used the app for the first time. You know. At that screen that nobody (but me) reads! Here&#8217;s an example.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1186 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/FB-App-permissions.jpg" alt="Facebook App Permissions example" width="647" height="344" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/FB-App-permissions.jpg 647w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/FB-App-permissions-300x160.jpg 300w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<p>Cambridge Analytica then used all of the data to psychologically profile Americans and then target specific political messages, which would definitely influence that individual. Doing so to 50 million individuals is tantamount to manipulation.</p>
<p>This video has a CA whistle blower telling what they did:</p>
<p><iframe loading="lazy" title="Cambridge Analytica: Whistleblower reveals data grab of 50 million Facebook profiles" width="500" height="281" src="https://www.youtube.com/embed/zb6-xz-geH4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h3>Should I delete my Facebook account?</h3>
<p>Well that is completely up to you.</p>
<p>I deleted my original Facebook account back in about 2012, after I downloaded a copy of my Facebook data and saw just how much information I had given them and what it could be potentially used for. It&#8217;s not just the content of posts, photos and videos that I had put on the platform (and I was fairly prolific at the time), but it was all of the Likes and Shares of different things that caused me concern.</p>
<p>By looking at all of this data in one place, I could see that they could potentially see who and what I was about and what my opinions might be.</p>
<p>It freaked me out.</p>
<p>I deleted my account.</p>
<p>I created a new account in 2014 as I had become involved in a <a href="https://www.facebook.com/KREnergyTeam">community project</a> which needed online exposure. I have expanded that to a <a href="https://www.facebook.com/MulcairMensShed/">few other</a> community projects, as well as my own <a href="https://www.facebook.com/L2Cyber/">business page</a>, but I am pretty frugal with anything else I give Facebook. I usually limit it to photos of my dogs, the scenery or the weather.</p>
<p>I recently downloaded my Facebook data again and because I have been careful, I don&#8217;t see too much in they way for potential manipulation with it.</p>
<p>I needn&#8217;t worry too much, because I never believe anything I read &#8230; particularly on Facebook. <span id="c116" class="notranslate">?</span><span id="c116" class="notranslate">?</span><span id="c116" class="notranslate">?</span></p>
<p>But have a read of this other <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/">short blog</a> about what breached data can be used for.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/">Cambridge Analytica were nosey ninnies</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Protection Policy Template</title>
		<link>https://www.l2cybersecurity.com/gdpr-05-data-protection-policy-template/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 09 Jan 2018 22:32:54 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1087</guid>

					<description><![CDATA[<p>The GDPR requires every business to have a data protection policy, which needs to be reviewed regularly. You can download this template here GDPR-05-Data Protection Policy Template. Important Notice: As every company is different, please seek professional advice when creating your data protection policy. Your business may face circumstances and issues that are not covered&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-05-data-protection-policy-template/">Data Protection Policy Template</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The GDPR requires every business to have a data protection policy, which needs to be reviewed regularly. <span id="more-1087"></span>You can download this template here <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/GDPR-05-Data-Protection-Policy-Template.pdf">GDPR-05-Data Protection Policy Template</a>.</p>
<h1><strong>Important Notice: </strong></h1>
<p><span style="color: #ff0000;"><strong><em>As every company is different, please seek professional advice when creating your data protection policy. Your business may face circumstances and issues that are not covered by this sample policy.</em></strong></span></p>
<p><span style="color: #ff0000;"><strong><em>This data protection policy is made available on an ‘as is’ basis. L2 Cyber Security Solutions cannot take any responsibility for the consequences of errors or omissions. Any reliance you place on this document will be at your own risk.</em></strong></span></p>
<p><span style="color: #ff0000;"><strong><em>Neither L2 Cyber Security Solutions, nor its employees are liable for any losses or damages arising from your use of this document. These individuals and organisations exclude all warranties and representations, express or implied, in respect of your use of the website and its content.</em></strong></span></p>
<h1><strong>Data protection policy </strong></h1>
<h2>Context and overview</h2>
<h3>Key details</h3>
<p>Policy prepared by:                                         Name</p>
<p>Approved by board / management on:          Date</p>
<p>Policy became operational on:                       Date.</p>
<p>Next review date:                                           Date.</p>
<h3>Introduction</h3>
<p>[Company name] needs to gather and use certain information about individuals.</p>
<p>These can include customers, suppliers, business contacts, employees and other people the organisation has a relationship with or may need to contact.</p>
<p>This policy describes how this personal data must be collected, handled and stored to meet the company’s data protection standards — and to comply with the law.</p>
<h3>Why this policy exists</h3>
<p>This data protection policy ensures [company name]:</p>
<ul>
<li>Complies with data protection law and follow good practice</li>
<li>Protects the rights of staff, customers and partners</li>
<li>Is open about how it stores and processes individuals’ data</li>
<li>Protects itself from the risks of a data breach</li>
</ul>
<h3>Data protection law</h3>
<p>The General Data Protection Regulation 2016/679 describes how organisations — including [company name] — must collect, handle and store personal information.</p>
<p>These rules apply regardless of whether data is stored electronically, on paper or on other materials.</p>
<p>To comply with the law, personal information must be collected and used fairly, stored safely and not disclosed unlawfully.</p>
<p>The General Data Protection Regulation is underpinned by eight important principles. These say that personal data must:</p>
<ol>
<li>Be processed fairly and lawfully</li>
<li>Be obtained only for specific, lawful purposes</li>
<li>Be adequate, relevant and not excessive</li>
<li>Be accurate and kept up to date</li>
<li>Not be held for any longer than necessary</li>
<li>Processed in accordance with the rights of data subjects</li>
<li>Be protected in appropriate ways</li>
<li>Not be transferred outside the EU, unless that country or territory also ensures an adequate level of protection</li>
</ol>
<h2>People, risks and responsibilities</h2>
<h3>Policy scope</h3>
<p>This policy applies to:</p>
<ul>
<li>The head office of [company name]</li>
<li>All branches of [company name]</li>
<li>All staff and volunteers of [company name]</li>
<li>All contractors, suppliers and other people working on behalf of [company name]</li>
</ul>
<p>It applies to all data that the company holds relating to living individuals, even if that information technically falls outside of the General Data Protection Regulation 2016/679. This can include:</p>
<ul>
<li>Names of individuals</li>
<li>Postal addresses</li>
<li>Email addresses</li>
<li>Telephone numbers</li>
<li>…plus any other information relating directly or indirectly to individuals</li>
</ul>
<h3>Data protection risks</h3>
<p>This policy helps to protect [company name] from some very real data security risks, including:</p>
<ul>
<li><strong>Breaches of confidentiality. </strong>For instance, information being given out inappropriately.</li>
<li><strong>Failing to offer choice. </strong>For instance, all individuals should be free to choose how the company uses data relating to them.</li>
<li><strong>Reputational damage. </strong>For instance, the company could suffer if hackers successfully gained access to sensitive data.</li>
</ul>
<h3>Responsibilities</h3>
<p>Everyone who works for or with [company name] has some responsibility for ensuring data is collected, stored and handled appropriately.</p>
<p>Each team that handles personal data must ensure that it is handled and processed in line with this policy and data protection principles.</p>
<p>However, these people have key areas of responsibility:</p>
<ul>
<li>The <strong>board of directors </strong>is ultimately responsible for ensuring that [company name] meets its legal obligations.</li>
<li>The <strong>[data protection officer], [name], </strong>is responsible for:
<ul>
<li>Keeping the board updated about data protection responsibilities, risks and issues.</li>
<li>Reviewing all data protection procedures and related policies, in line with an agreed schedule.</li>
<li>Arranging data protection training and advice for the people covered by this policy.</li>
<li>Handling data protection questions from staff and anyone else covered by this policy.</li>
<li>Dealing with requests from individuals to see the data [company name] holds about them (also called ‘subject access requests’).</li>
<li>Checking and approving any contracts or agreements with third parties that may handle the company’s sensitive data.</li>
</ul>
</li>
<li>The <strong>[IT manager], [name], </strong>is responsible for:
<ul>
<li>Ensuring all systems, services and equipment used for storing data meet acceptable security standards.</li>
<li>Performing regular checks and scans to ensure security hardware and software is functioning properly.</li>
<li>Evaluating any third-party services the company is considering using to store or process data. For instance, cloud computing services.</li>
</ul>
</li>
<li>The <strong>[marketing manager], [name], </strong>is responsible for:
<ul>
<li>Approving any data protection statements attached to communications such as emails and letters.</li>
<li>Addressing any data protection queries from journalists or media outlets like newspapers.</li>
<li>Where necessary, working with other staff to ensure marketing initiatives abide by data protection principles.</li>
</ul>
</li>
</ul>
<h2>General staff guidelines</h2>
<ul>
<li>The only people able to access data covered by this policy should be those who <strong>need it for their work</strong>.</li>
<li>Data <strong>should not be shared informally</strong>. When access to confidential information is required, employees can request it from their line managers.</li>
<li><strong>[Company name] will provide training </strong>to all employees to help them understand their responsibilities when handling data.</li>
<li>Employees should keep all data secure, by taking sensible precautions and following the guidelines below.</li>
<li>In particular, <strong>strong passwords must be used </strong>and they should never be shared.</li>
<li>Personal data <strong>should not be disclosed </strong>to unauthorised people, either within the company or externally.</li>
<li>Data should be <strong>regularly reviewed and updated </strong>if it is found to be out of date. If no longer required, it should be deleted and disposed of.</li>
<li>Employees <strong>should request help </strong>from their line manager or the data protection officer if they are unsure about any aspect of data protection.</li>
</ul>
<h2>Data storage</h2>
<p>These rules describe how and where data should be safely stored. Questions about storing data safely can be directed to the IT manager or data controller.</p>
<ul>
<li>When data is <strong>stored on paper, </strong>it should be kept in a secure place where unauthorised people cannot see it.</li>
<li>These guidelines also apply to data that is usually stored electronically but has been printed out for some reason:</li>
<li>When not required, the paper or files should be kept <strong>in a locked drawer or filing cabinet</strong>.</li>
<li>Employees should make sure paper and printouts are <strong>not left where unauthorised people could see them</strong>, like on a printer.</li>
<li><strong>Data printouts should be shredded </strong>and disposed of securely when no longer required.</li>
</ul>
<p>When data is <strong>stored electronically</strong>, it must be protected from unauthorised access, accidental deletion and malicious hacking attempts:</p>
<ul>
<li>Data should be <strong>protected by strong passwords </strong>that are changed regularly and never shared between employees.</li>
<li>If data is <strong>stored on removable media </strong>(like a CD or DVD), these should be kept locked away securely when not being used.</li>
<li>Data should only be stored on <strong>designated drives and servers</strong>, and should only be uploaded to an <strong>approved cloud computing services</strong>.</li>
<li>Servers containing personal data should be <strong>sited in a secure location</strong>, away from general office space.</li>
<li>Data should be <strong>backed up frequently</strong>. Those backups should be tested regularly, in line with the company’s standard backup procedures.</li>
<li>Data should <strong>never be saved directly </strong>to laptops or other mobile devices like tablets or smart phones.</li>
<li>All servers and computers containing data should be protected by <strong>approved security software and a firewall</strong>.</li>
</ul>
<h2>Data use</h2>
<p>Personal data is of no value to [company name] unless the business can make use of it. However, it is when personal data is accessed and used that it can be at the greatest risk of loss, corruption or theft:</p>
<ul>
<li>When working with personal data, employees should ensure <strong>the screens of their computers are always locked </strong>when left unattended.</li>
<li>Personal data <strong>should not be shared informally</strong>. In particular, it should never be sent by email, as this form of communication is not secure.</li>
<li>Data must be <strong>encrypted before being transferred electronically</strong>. The IT manager can explain how to send data to authorised external contacts.</li>
<li>Personal data should <strong>never be transferred outside of the European Economic Area</strong>.</li>
<li>Employees <strong>should not save copies of personal data to their own computers. </strong>Always access and update the central copy of any data.</li>
</ul>
<h2>Data accuracy</h2>
<p>The law requires [company name] to take reasonable steps to ensure data is kept accurate and up to date.</p>
<p>The more important it is that the personal data is accurate, the greater the effort [company name] should put into ensuring its accuracy.</p>
<p>It is the responsibility of all employees who work with data to take reasonable steps to ensure it is kept as accurate and up to date as possible.</p>
<ul>
<li>Data will be held in <strong>as few places as necessary</strong>. Staff should not create any unnecessary additional data sets.</li>
<li>Staff should <strong>take every opportunity to ensure data is updated. </strong>For instance, by confirming a customer’s details when they call.</li>
<li>[Company name] will make it <strong>easy for data subjects to update the information </strong>[company name] holds about them. For instance, via the company website.</li>
<li>Data should be <strong>updated as inaccuracies are discovered</strong>. For instance, if a customer can no longer be reached on their stored telephone number, it should be removed from the database.</li>
<li>It is the marketing manager’s responsibility to ensure <strong>marketing databases are checked against industry suppression files </strong>every six months.</li>
</ul>
<h2>Subject access requests</h2>
<p>All individuals who are the subject of personal data held by [company name] are entitled to:</p>
<ul>
<li>Ask <strong>what information </strong>the company holds about them and why.</li>
<li>Ask <strong>how to gain access </strong>to it.</li>
<li>Be informed <strong>how to keep it up to date. </strong></li>
<li>Be informed how the company is <strong>meeting its data protection obligations</strong>.</li>
</ul>
<p>If an individual contacts the company requesting this information, this is called a subject access request.</p>
<p>Subject access requests from individuals should be made by email, addressed to the data controller at [email address]. The data controller can supply a standard request form, although individuals do not have to use this.</p>
<p>Individuals cannot be charged to honour a subject access request. The data controller will aim to provide the relevant data within 30 days.</p>
<p>The data controller will always verify the identity of anyone making a subject access request before handing over any information.</p>
<h2>Disclosing data for other reasons</h2>
<p>In certain circumstances, the General Data Protection Regulation allows personal data to be disclosed to law enforcement agencies without the consent of the data subject.</p>
<p>Under these circumstances, [company name] will disclose requested data. However, the data controller will ensure the request is legitimate, seeking assistance from the board and from the company’s legal advisers where necessary.</p>
<h2>Providing information</h2>
<p>[Company name] aims to ensure that individuals are aware that their data is being processed, and that they understand:</p>
<ul>
<li>How the data is being used</li>
<li>How to exercise their rights</li>
</ul>
<p>To these ends, the company has a privacy statement, setting out how data relating to individuals is used by the company.</p>
<h2>[This is available on request. A version of this statement is also available on the company’s website.]</h2>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-05-data-protection-policy-template/">Data Protection Policy Template</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy Notice Requirements</title>
		<link>https://www.l2cybersecurity.com/gdpr-04-privacy-notice/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 09 Jan 2018 22:24:14 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1080</guid>

					<description><![CDATA[<p>The GDPR requires a privacy notice to be Concise, transparent and written in clear and plain language. You can download a copy of this here GDPR-04-Privacy Notice Requirements and a template here GDPR-04-Privacy Notice Template. The GDPR says that the information you provide to people about how you process their personal data must be: Concise,&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-04-privacy-notice/">Privacy Notice Requirements</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The GDPR requires a privacy notice to be Concise, transparent and written in clear and plain language. <span id="more-1080"></span>You can download a copy of this here <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/GDPR-04-Privacy-Notice-Requirements.pdf">GDPR-04-Privacy Notice Requirements</a> and a template here <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/GDPR-04-Privacy-Notice-Template.pdf">GDPR-04-Privacy Notice Template</a>.</p>
<p>The GDPR says that the information you provide to people about how you process their personal data must be:</p>
<ul>
<li>Concise, transparent, intelligible and easily accessible.</li>
<li>Written in clear and plain language, particularly if addressed to a child.</li>
<li>Free of charge.</li>
</ul>
<h1>What information must be provided:</h1>
<h2>Where you obtain personal data directly from the individual:</h2>
<ul>
<li>Identity and contact details of the controller and where applicable, the controller’s representative and the data protection officer (if applicable).</li>
<li>Purpose of the processing and the legal basis for the processing.</li>
<li>The legitimate interests of the controller or third party, where applicable.</li>
<li>Any recipient or categories of recipients of the personal data.</li>
<li>Details of transfers to third country and safeguards.</li>
<li>Retention period or criteria used to determine the retention period.</li>
<li>The existence of each of data subject’s rights.</li>
<li>The right to withdraw consent at any time, where relevant.</li>
<li>The right to lodge a complaint with a supervisory authority.</li>
<li>Whether the provision of personal data is part of a statutory or contractual requirement or obligation and possible consequences of failing to provide the personal data.</li>
<li>The existence of automated decision making, including profiling and information about how decisions are made, the significance and the consequences.</li>
</ul>
<p>This information should be provided to the individual at the time that the data is obtained.</p>
<h2>Where the personal data is not directly obtained from the individual:</h2>
<ul>
<li>Identity and contact details of the controller and where applicable, the controller’s representative and the data protection officer (if applicable).</li>
<li>Purpose of the processing and the legal basis for the processing.</li>
<li>The legitimate interests of the controller or third party, where applicable.</li>
<li>Categories of personal data.</li>
<li>Any recipient or categories of recipients of the personal data.</li>
<li>Details of transfers to third country and safeguards.</li>
<li>Retention period or criteria used to determine the retention period.</li>
<li>The existence of each of data subject’s rights.</li>
<li>The right to withdraw consent at any time, where relevant.</li>
<li>The right to lodge a complaint with a supervisory authority.</li>
<li>The source the personal data originates from and whether it came from publicly accessible sources.</li>
<li>The existence of automated decision making, including profiling and information about how decisions are made, the significance and the consequences.</li>
</ul>
<p>In this case, this information should be provided to the individual:</p>
<ul>
<li>Within a reasonable period of having obtained the data (within one month)</li>
<li>If the data is used to communicate with the individual, at the latest, when the first communication takes place; or</li>
<li>If disclosure to another recipient is envisaged, at the latest, before the data are disclosed.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-04-privacy-notice/">Privacy Notice Requirements</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
