<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GDPR Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/gdpr/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/gdpr/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 23 Feb 2026 17:04:47 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>GDPR Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/gdpr/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Legal Basis for Processing</title>
		<link>https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:44:07 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Legal Basis]]></category>
		<category><![CDATA[Legal Basis for Processing]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2739</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) outlines the conditions under which there is a legal basis for processing personal data. Download Detailed Guidance Here The Six Lawful Bases for Processing: To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (Article&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2739 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2739"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-z7y2e5gamipf" data-node="z7y2e5gamipf">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> outlines the conditions under which there is a legal basis for processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-owx9h013v2js" data-node="owx9h013v2js">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-smkepv8xnwgr" data-node="smkepv8xnwgr">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h2><a name="_Toc222253324"></a>The Six Lawful Bases for Processing:</h2>
<p>To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1">Article 6</a>). If you cannot fit your processing into one of these boxes, you cannot collect the data.</p>
<p>You must identify and document one of these bases before you start processing data.</p>
<ul>
<li><strong>Consent:</strong> The individual has given you clear, specific permission to process their data for a specific purpose.</li>
<li><strong>Contract:</strong> You need to process the data to fulfil a contract with the individual (e.g., you need their address to deliver goods they bought).</li>
<li><strong>Legal Obligation:</strong> You are required by law to process the data (e.g., keeping salary records for tax purposes).</li>
<li><strong>Vital Interests:</strong> It is a life-or-death situation (e.g., giving emergency medical data to a hospital to save someone's life).</li>
<li><strong>Legitimate Interests:</strong> You have a genuine business reason (like fraud prevention or network security), and this reason is not overridden by the individual's rights or freedoms.</li>
<li><strong>Public Interest:</strong> You are performing a task in the public interest or acting under official authority (usually applies to government bodies, not private companies).</li>
</ul>
<p>&nbsp;</p>
<h2><a name="_Toc222253325"></a>1. Strict Rules for "Consent"</h2>
<p>If you choose "Consent" as your legal basis, the bar is set very high. You must be able to prove you obtained it validly.</p>
<ul>
<li><strong>Freely Given:</strong> The user must have a real choice. You cannot force them to consent or punish them if they say no.</li>
<li><strong>Informed:</strong> They must know exactly who you are and what you are doing with their data.</li>
<li><strong>Specific:</strong> You cannot ask for "blanket consent." You must ask for permission for each specific purpose.</li>
<li><strong>Clear Affirmative Action:</strong> The user must do something to consent (like ticking a box). You must also keep a record of this consent being given. Pre-ticked boxes are banned.</li>
<li><strong>Easy Withdrawal:</strong> You must tell them they can withdraw consent at any time, and if they do, you must stop processing immediately.</li>
</ul>
<p>&nbsp;</p>
<h2>2. <a name="_Toc222253328"></a>Contractual Necessity</h2>
<p><strong>When to use it:</strong> Use this when you have a contract with an individual (or are about to enter one) and you literally cannot do your job without their data.</p>
<p><strong>The Rule:</strong> The processing must be necessary for the performance of a contract to which the individual is a party.</p>
<p><strong>Practical Example:</strong> If you sell a product online, you need the customer's address to deliver it. You don't need their consent for the address. You need it to fulfil the contract of sale.</p>
<p><strong>Constraint:</strong> You cannot use this for things that are "nice to have" but not essential to the contract (e.g., using that same address for marketing newsletters usually requires a different basis, like Consent).</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253329"></a>3. Legal Obligation</h2>
<p><strong>When to use it:</strong> Use this when you have no choice because the law says you must process the data.</p>
<p><strong>The Rule:</strong> The processing is necessary for compliance with a legal obligation.</p>
<p><strong>Practical Example:</strong> You are required by tax laws to keep records of employee salaries for a certain number of years. Even if an employee asks you to delete their data, you can refuse because you have a legal obligation to keep it.</p>
<p><strong>Constraint:</strong> This must be a statutory obligation (EU or National law), not just a contractual obligation to a third party or your own company policy.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253330"></a>4. Vital Interests</h2>
<p><strong>When to use it:</strong> This is the "Emergency Only" basis. It applies to life-or-death situations.</p>
<p><strong>The Rule:</strong> The processing is necessary to protect the vital interests of the data subject or another person.</p>
<p><strong>Practical Example:</strong> If a visitor to your office collapses and is unconscious, you might disclose their medical allergies (if known) to the paramedics. You don't need to wake them up to get consent because their life (vital interest) is at risk.</p>
<p><strong>Constraint:</strong> You generally cannot use this for large-scale data processing or health data unless it is truly a medical emergency.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253331"></a>5. Legitimate Interests</h2>
<p><strong>When to use it:</strong> This is the most flexible basis, often used for business activities like fraud prevention, network security, or direct marketing. However, it requires a careful "Balancing Test".</p>
<p><strong>The Rule:</strong> Processing is necessary for your legitimate interests (or those of a third party), UNLESS those interests are overridden by the individual's fundamental rights and freedoms.</p>
<p><strong>The "Balancing Test":</strong> You must weigh your benefit against the user's privacy:</p>
<p><strong>Your side:</strong> "We need to process IP addresses to stop hackers attacking our website." (This is a strong legitimate interest).</p>
<p><strong>Their side:</strong> "Does this hurt the user's privacy?" (Likely minimal impact).</p>
<p><strong>Result:</strong> You can probably proceed.</p>
<p><strong>Constraint:</strong> If the processing would be unexpected, cause harm, or if the individual is a child, their rights likely override your interests. You must document this assessment.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253332"></a>6. Public Interest / Official Authority</h2>
<p><strong>When to use it:</strong> This is primarily for public authorities (like schools, hospitals, police, or councils) performing their official duties.</p>
<p><strong>The Rule:</strong> The processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in you.</p>
<p><strong>Practical Example:</strong> A local council collecting data to organise bin collection or a tax authority collecting income data.</p>
<p><strong>Constraint:</strong> Private companies rarely use this unless they are contracted to carry out specific public tasks (e.g., a private utility company maintaining the water supply).</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-k83hnq942ex6" data-node="k83hnq942ex6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Principles of the GDPR</title>
		<link>https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:37:37 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Principles]]></category>
		<category><![CDATA[Principles of the GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2735</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) sets out the principles of the GDPR that organisations must follow when processing personal data. Download Detailed Guidance Here Principles of the GDPR Here is a simplified guide to the 7 Core Principles of the GDPR (Article 5). Think of these not just as codes, but as the "Golden&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2735 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2735"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-6uevfy4tsmk3" data-node="6uevfy4tsmk3">
			<div class="fl-col fl-node-tywc61d08b2m fl-col-bg-color" data-node="tywc61d08b2m">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-wlgck6yehmd9" data-node="wlgck6yehmd9">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> sets out the principles of the GDPR that organisations must follow when processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-f32r8zk7jtn6" data-node="f32r8zk7jtn6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-pc8s63b9lxrh" data-node="pc8s63b9lxrh">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1><strong>Principles of the GDPR</strong></h1>
<p>Here is a simplified guide to the 7 Core Principles of the GDPR (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1">Article 5</a>).</p>
<p>Think of these not just as codes, but as the "Golden Rules" for how you handle data. If you violate these principles, you are violating the GDPR, even if your security is technically perfect.</p>
<p>&nbsp;</p>
<h2>Lawfulness, Fairness, and Transparency</h2>
<p><strong>Your Obligation:</strong> You must be honest and open about what you are doing.</p>
<p><strong>Lawful:</strong> You cannot process data just because you want to. You need a valid legal reason (like Consent or a Contract).</p>
<p><strong>Fair:</strong> You shouldn't do things with data that people wouldn't expect or that could mislead them. You must give them control over their information.</p>
<p><strong>Transparent:</strong> You can't hide in the shadows. You must provide clear, accessible information (usually a Privacy Notice) explaining exactly how you process their data.</p>
<p>&nbsp;</p>
<h2>Purpose Limitation</h2>
<p><strong>Your Obligation:</strong> Be specific about why you need the data and stick to that reason.</p>
<p><strong>The Rule:</strong> You must collect data for "specified, explicit, and legitimate purposes".</p>
<p><strong>No "Scope Creep":</strong> You cannot collect data for one reason (e.g., "to deliver a pizza") and then use it for a completely different reason later (e.g., "to sell their address to a gym"), unless you get fresh consent or have another clear legal reason.</p>
<p><strong>Communication:</strong> You must tell the individual this purpose at the start.</p>
<p>&nbsp;</p>
<h2>Data Minimisation</h2>
<p><strong>Your Obligation:</strong> Collect only what you strictly need.</p>
<p><strong>The Rule:</strong> Data must be adequate, relevant, and limited to what is necessary for your specific purpose.</p>
<p><strong>Practical Step:</strong> If you don't need someone's date of birth to sell them a book, don't ask for it. Avoid hoarding "just in case" data.</p>
<p>&nbsp;</p>
<h2>Accuracy</h2>
<p><strong>Your Obligation:</strong> Keep the data correct and up to date.</p>
<p><strong>The Rule:</strong> You must take reasonable steps to ensure data is not incorrect or misleading.</p>
<p><strong>Correction:</strong> If you find out data is wrong, you must fix it or erase it without delay. You should also give individuals an easy way to update their own records.</p>
<p>&nbsp;</p>
<h2>Storage Limitation</h2>
<p><strong>Your Obligation:</strong> Don't keep data forever.</p>
<p><strong>The Rule:</strong> You must not keep personal data for longer than you actually need it for your stated purpose.</p>
<p><strong>Guidance:</strong> There may be a statutory requirement for a retention period (e.g. Revenue), or a supervisory body providing guidance. If neither exist, then set your own retention period and document the justification for it.</p>
<p><strong>Retention Policy:</strong> You need a clear policy that says when you will delete data. When that time comes, you must securely erase or anonymise it.</p>
<p>&nbsp;</p>
<h2>Integrity and Confidentiality (Security)</h2>
<p><strong>Your Obligation:</strong> Keep the data safe.</p>
<p><strong>The Rule:</strong> You must protect data against unauthorised access, accidental loss, destruction, or damage.</p>
<p><strong>Measures:</strong> This isn't just about firewalls. It includes organisational measures like taking data backups, restricting access so only the staff who need to see the data can see it, amongst other things.</p>
<p>&nbsp;</p>
<h2><em><strong>Accountability</strong></em></h2>
<p><strong>Your Obligation:</strong> Prove it.</p>
<p><strong>The Rule:</strong> It is not enough to just comply with these principles. You must be able to demonstrate that you comply.</p>
<p><strong>Documentation:</strong> This requires you to have written policies, records of your processing activities, and internal procedures in place to show regulators that you take these rules seriously.</p>
<h2><strong style="color: #ff0000; font-size: 16px;"><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></h2>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-6skdhpegzwc0" data-node="6skdhpegzwc0">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rights of an Individual</title>
		<link>https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 13:46:30 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Individual's Rights]]></category>
		<category><![CDATA[Rights of an individual]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2732</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) provides strong rights of an individual, whose personal data is being processed by organisations. Download Detailed Guidance Here The Rights of an Individual The right to be informed Article 13 and Article 14. Your Obligation: You must be completely transparent about how you use personal data. You cannot collect&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2732 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2732"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-pyocfb5ue2r4" data-node="pyocfb5ue2r4">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2161-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> provides strong rights of an individual, whose personal data is being processed by organisations.</p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-noqujwizr2fs" data-node="noqujwizr2fs">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-2rfcs1d89elm" data-node="2rfcs1d89elm">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1>The Rights of an Individual</h1>
<h2><a name="_Toc484164476"></a><a name="_Toc132378641"></a>The right to be informed</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2254-1-1">Article 13</a> and <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2355-1-1">Article 14</a>.</p>
<p><strong>Your Obligation:</strong> You must be completely transparent about how you use personal data. You cannot collect data in secret; you must provide "fair processing information," typically through a Privacy Notice.</p>
<p><strong>What to include:</strong> You must detail your identity and contact info (and that of your DPO), why you are processing the data and the legal basis for doing so, how long you will keep it, and who else will receive it. You must also list the users' rights, including their right to withdraw consent or lodge a complaint.</p>
<p><strong>Format:</strong> The information must be concise, transparent, intelligible, easily accessible, and free of charge. It must be written in clear, plain language—especially if addressed to a child.</p>
<p><strong>Timing:</strong></p>
<ul>
<li><strong>Direct Collection:</strong> If you got the data straight from the individual, give them this info at the time you collect it.</li>
<li><strong>Indirect Collection:</strong> If you got the data from elsewhere, you must inform the individual within a reasonable period (maximum one month), or at the point you first communicate with them or share the data with someone else.</li>
</ul>
<p>The table below summarises the information you should supply to individuals where the personal data has been obtained either directly from the data subject or by another means.</p>
<table>
<tbody>
<tr>
<td width="301">Identity and contact details of the controller (and where applicable, the controller’s representative) and the data protection officer.</td>
<td width="301">The existence of automated decision making, including profiling and information about how decisions are made, the significance and the consequences.</td>
</tr>
<tr>
<td width="301">Any recipient or categories of recipients of the personal data.</td>
<td width="301">Purpose of the processing and the legal basis for the processing.</td>
</tr>
<tr>
<td width="301">The right to lodge a complaint with a supervisory authority.</td>
<td width="301">The existence of each of data subject’s rights.</td>
</tr>
<tr>
<td width="301">Retention period or criteria used to determine the retention period.</td>
<td width="301">Details of transfers to a different country and what safeguards apply.</td>
</tr>
<tr>
<td width="301">The right to withdraw consent at any time, where relevant.</td>
<td width="301">The legitimate interests of the controller or third party, where applicable.</p>
<p>&nbsp;</td>
</tr>
</tbody>
</table>
<p>If the personal data was obtained directly from the data subject, then you should provide them with the above information at the time you get the personal data.</p>
<p>The next table summarises the information you should supply to individuals where the personal data has not been obtained directly from the data subject.</p>
<table>
<tbody>
<tr>
<td width="301">The source the personal data originates from and whether it came from publicly accessible sources.</td>
<td width="301">Categories of personal data.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><a name="_Toc484164478"></a><a name="_Toc132378642"></a>The right of access (Subject Access Requests)</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2513-1-1">Article 15</a>.</p>
<p><strong> </strong><strong>Your Obligation:</strong> You must allow individuals to verify that their data is being processed lawfully. If asked, you must confirm you are processing their data and provide a copy of it.</p>
<p><strong> </strong><strong>Deadlines:</strong> You must respond without delay, and at the latest within one month.</p>
<p><strong> </strong><strong>Extension:</strong> You can extend this by two months if the request is complex or numerous, but you must notify the individual within the first month and explain why.</p>
<p><strong> </strong><strong>Fees:</strong> You generally cannot charge a fee.</p>
<p style="padding-left: 40px;"><strong><em>Exception:</em></strong> You may charge a "reasonable fee" based on administrative costs only if the request is "manifestly unfounded or excessive" (e.g., repetitive) or for additional copies.</p>
<p><strong> </strong><strong>Verification:</strong> You must verify the identity of the requester using reasonable means before handing over data.</p>
<p style="padding-left: 40px;"><strong>Suggested ways:</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Ask the individual to confirm details only they would know based on the data you already hold. Ask 2-3 specific questions:
<ul>
<li>"Please confirm the amount of your last transaction with us."</li>
<li>"What is the reference number on your most recent bill?"</li>
<li>"Please confirm the phone number we have on file for you."</li>
</ul>
</li>
<li>Require the user to log in to their secure account area to submit the request.</li>
<li>If you must ask for photo ID, ask them to redact unnecessary information – e.g. “Please send a photo of your driving licence, but please black out your licence number and date of birth. We only need to see your name and photo”</li>
</ul>
</li>
</ul>
<p><strong> </strong><strong>Format:</strong> If the request is made electronically, you should provide the data in a commonly used electronic format.</p>
<p><a name="_Toc484164485"></a><strong> </strong></p>
<h2><a name="_Toc132378643"></a>The right to rectification</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2599-1-1">Article 16</a>.</p>
<p><a name="_Toc484164487"></a><a name="_Toc132378644"></a><strong> </strong><strong>Your Obligation:</strong> You must correct inaccurate or incomplete personal data upon request.</p>
<p><strong>Third Parties:</strong> If you have shared this data with other organisations, you must inform them of the correction if possible.</p>
<p><strong>Deadlines:</strong> You have one month to comply. This can be extended by two months for complex requests, provided you notify the individual.</p>
<p><strong>Refusal:</strong> If you decide not to take action, you must explain why and inform the individual of their right to complain to a supervisory authority.</p>
<p>&nbsp;</p>
<h2>The right to erasure ("Right to be Forgotten")</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2606-1-1">Article 17</a>.</p>
<p><a name="_Toc484164492"></a><strong> </strong><strong>Your Obligation:</strong> You must delete personal data when there is no compelling reason to keep it. <strong><u>BUT</u></strong> this is not an absolute right. You are quite likely to refuse this one, as its scope is quite narrow.</p>
<p><strong>When to delete:</strong> You must act if:</p>
<ol>
<li>consent is withdrawn</li>
<li>the data is no longer needed for its original purpose</li>
<li>it was processed unlawfully</li>
<li>if there is a legal obligation to delete it</li>
</ol>
<p>Special attention is required for data collected from children online.</p>
<p><strong>Public Data:</strong> If you have made the data public (e.g., on a website), you must take reasonable steps to inform other controllers processing that data to erase links to or copies of it.</p>
<p><strong>Exceptions:</strong> You can refuse deletion if the processing is necessary for freedom of expression, public health, contractual, legal obligations, or the defence of legal claims.</p>
<p>&nbsp;</p>
<h2><a name="_Toc132378645"></a>The right to restrict processing</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2700-1-1">Article 18</a>.</p>
<p><a name="_Toc484164494"></a> <strong>Your Obligation:</strong> In specific circumstances, you must stop using the data but keep it stored. You can retain just enough info to ensure the restriction is respected in the future.</p>
<p><strong>When to restrict:</strong> You must apply this if an individual contests the accuracy of data (while you verify it), if they object to processing (while you verify your legitimate grounds), or if the processing is unlawful but the individual prefers restriction over deletion.</p>
<p><strong>Notification:</strong> You must inform any third parties you shared the data with about the restriction. You must also tell the individual before you lift the restriction.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378646"></a>The right to data portability</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2753-1-1">Article 20</a>.</p>
<p><a name="_Toc484164498"></a> <strong>Your Obligation:</strong> You must allow individuals to obtain and reuse their data across different services by providing it in a format that allows easy transfer.</p>
<p><strong>Format:</strong> Provide the data in a structured, commonly used, and machine-readable form (e.g., CSV files) so software can extract the data.</p>
<p><strong>Scope:</strong> This applies only to data the individual provided to you, processed by automated means, based on consent or a contract.</p>
<p><strong>Direct Transfer:</strong> If the individual asks and it is technically feasible, you should transfer the data directly to another organisation.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378647"></a>The right to object</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2803-1-1">Article 21</a>.</p>
<p><a name="_Toc484164503"></a> <strong>Your Obligation:</strong> You must respect an individual's right to say "no" to processing in certain cases.</p>
<p><strong>Direct Marketing:</strong> If an individual objects to direct marketing, you must stop immediately. There are no exemptions or grounds to refuse.</p>
<p><strong>Legitimate Interests/Public Task:</strong> If they object to processing based on these grounds, you must stop unless you can demonstrate "compelling legitimate grounds" that override their rights, or if it is for legal claims.</p>
<p><strong>Communication:</strong> You must explicitly bring this right to their attention at the point of first communication and in your privacy notice, keeping it separate from other information.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378648"></a>Rights in relation to automated decision making and profiling</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2838-1-1">Article 22</a>.</p>
<p><strong>Your Obligation:</strong> You must provide safeguards against potentially damaging decisions made solely by computers without human intervention.</p>
<p><strong>The Right:</strong> Individuals can refuse to be subject to automated decisions that have legal or significant effects on them.</p>
<p><strong>Safeguards:</strong> If you use automated decision-making, you must allow the individual to obtain human intervention, express their point of view, and obtain an explanation of the decision so they can challenge it.</p>
<p><strong>Profiling:</strong> If you use profiling (analysing personal aspects like performance, health, or location), you must be transparent about the logic involved and the significance of the consequences. You must use appropriate mathematical procedures and secure the data to prevent errors or discrimination.</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-p687qt9i0vao" data-node="p687qt9i0vao">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>#WeekendWisdom 085 Vaccination Status Data Protection Concerns</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-085-vaccination-status-data-protection-concerns/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 02 Jul 2021 01:15:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Concerns]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Vaccination Status]]></category>
		<category><![CDATA[Vaccination Status Data Protection Concerns]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2558</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 85. This week we&#8217;re going to talk about vaccination status data protection concerns. What is so important about somebody&#8217;s vaccination status? As the vaccination program continues to roll out across the country for the COVID-19 virus, people are getting vaccines on a wide scale. Now I just want to make sure&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-085-vaccination-status-data-protection-concerns/">#WeekendWisdom 085 Vaccination Status Data Protection Concerns</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 85. This week we&#8217;re going to talk about vaccination status data protection concerns.<span id="more-2558"></span></p>
<p><div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2558-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-085-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-085-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-085-lo.mp4</a></video></div></p>
<h3>What is so important about somebody&#8217;s vaccination status?</h3>
<p>As the vaccination program continues to roll out across the country for the COVID-19 virus, people are getting vaccines on a wide scale.</p>
<p>Now I just want to make sure that everybody is aware that somebody&#8217;s vaccination status is actually medical information and as such is classified as a special category data and so it needs to be protected.</p>
<h3>Who has Vaccination Status Data Protection Concerns?</h3>
<p>The Data Protection Commission issued some guidance recently, which is <a href="https://www.dataprotection.ie/sites/default/files/uploads/2021-06/Processing%20COVID-19%20Vaccination%20Data%20in%20the%20context%20of%20Employment_0.pdf" target="_blank" rel="noopener">available here</a>. In that they reiterated that except in very limited circumstances, employers are not allowed to ask employees or capture or store information relating to their employees&#8217; vaccination status.</p>
<h3>Why is that the case?</h3>
<p>That is because there is no current public health advice stating that there is a good purpose for doing so. This is the crucial thing, that it has to be public health advice that has to give a good reason otherwise there is no actually legal basis for capturing and storing somebody&#8217;s vaccination status.</p>
<h3>Is there a wider concern here?</h3>
<p>That guidance was applicable to employers and employees but as the country opens up and there is all this talk about people showing their vaccination status to get into pubs and restaurants and things like that. I think that there will continue to be this limitation. Unless public health authorities come out and say otherwise, pubs, restaurants, hotels, anywhere that people can gather, I don&#8217;t believe that capturing somebody&#8217;s vaccination status will be permitted.</p>
<p>So watch out for any updates from public health authorities only and not from the likes of the restaurants association, the vintners, hotels federation, etc.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-085-vaccination-status-data-protection-concerns/">#WeekendWisdom 085 Vaccination Status Data Protection Concerns</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-085-lo.mp4" length="38686439" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 081 Smartphone Messages and GDPR</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-081-smartphone-messages-and-gdpr/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 01:15:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Subject Access Request]]></category>
		<category><![CDATA[DSAR]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[SAR]]></category>
		<category><![CDATA[Smartphone Messages]]></category>
		<category><![CDATA[Smartphone Messages and GDPR]]></category>
		<category><![CDATA[Subject Access Request]]></category>
		<category><![CDATA[Text Messages]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[WhatsApp Messages]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2535</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 81. This week we&#8217;re going to talk about Smartphone Messages and GDPR. This sounds data protectiony This is a rare data protection post by me. I was reminded this week of a rare enough situation which most my clients don&#8217;t ever come across this before. One of them received a subject&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-081-smartphone-messages-and-gdpr/">#WeekendWisdom 081 Smartphone Messages and GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 81. This week we&#8217;re going to talk about Smartphone Messages and GDPR.<span id="more-2535"></span></p>
<p><div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2535-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-081-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-081-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-081-lo.mp4</a></video></div></p>
<h3>This sounds data protectiony</h3>
<p>This is a rare data protection post by me. I was reminded this week of a rare enough situation which most my clients don&#8217;t ever come across this before.</p>
<p>One of them received a subject access request from somebody whose personal data they were processing. Now the scope of this access request was the person wanted access to copies of emails and messages &#8211; text messages, WhatsApp messages &#8211; that were relating to them. My client called me up and asked</p>
<blockquote><p>&#8220;Are they entitled to get access to our messages on our phones?&#8221;</p></blockquote>
<h3>Smartphone Messsages and GDPR &#8230; Really?</h3>
<p>I explained to them a message on WhatsApp or on a text message is kinda just like an email. It&#8217;s the record of somebody&#8217;s personal data. If they&#8217;re included in there somehow, someway their personal data is there. That would be a valid scope for a subject access request.</p>
<p>So, Yes text messages would form part of a subject access request and therefore the individuals are entitled to get a copy of them.</p>
<h3>What should you do about this</h3>
<p>So keep that in mind when you&#8217;re building your data protection policies or your reviewing them, to make sure you might have already covered off dealing with email but also make sure you cover off things like WhatsApp messages and text messages as well because they&#8217;re also in scope.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-081-smartphone-messages-and-gdpr/">#WeekendWisdom 081 Smartphone Messages and GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-081-lo.mp4" length="30465210" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 038 Shadow IT</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 23:05:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Amazon S3 Bucket]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Breach]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Internet Hotspot]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[USB Memory Sticks]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2233</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT. What is shadow IT? It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples: Used for risky Internet access&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT.<span id="more-2233"></span></p>
<p><div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2233-3" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4</a></video></div></p>
<h3>What is shadow IT?</h3>
<p>It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples:</p>
<h3>Used for risky Internet access</h3>
<p>One would be where staff might use their mobile phones as an internet hotspot to be able to access the internet unrestricted, through their phone rather than through maybe a tightly controlled firewall on their local network. The risk here is that they may be able to access sites that may bring malware into the network and effectively they&#8217;re bridging the insecure internet to your local network.</p>
<h3>USB memory sticks &#8211; burn them with fire</h3>
<p>There&#8217;s always the risks as well associated with the use of USB memory sticks, that people are picking up at conferences and things like that. With no idea where they&#8217;re coming from. What&#8217;s on them. So there&#8217;s always been a risk around those.</p>
<h3>Cloud Storage &#8211; it&#8217;s only as secure as you can make it</h3>
<p>Finally if Staff were to use personal cloud storage services like a Dropbox or a Google drive or an Amazon S3 bucket, the organisation if they are unaware that, they don&#8217;t know how well secured those platforms are. They don&#8217;t know whether the data could be potentially breached from those cloud storage services. So there is a risk there.</p>
<h3>What&#8217;s the real problem that Shadow IT creates?</h3>
<p>And with all these technologies, the main risk here is in fact that they&#8217;re probably going to give you a breach of the GDPR in that you&#8217;re not in control of your IT security.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We can conduct an audit on your infrastructure and look for signs of Shadow IT. When we find it, we can provide guidance on how to remediate it to everyone&#8217;s satisfaction.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4" length="25454938" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 034 Ransomware Case Study</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-034-ransomware-case-study/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 25 Jun 2020 23:15:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Report]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware Case Study]]></category>
		<category><![CDATA[Ransomware Incident]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2166</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 34. This week we&#8217;re going to talk about a ransomware case study. Where did this ransomware case study come from? Earlier this week the data protection commission issued a report on the first two years of the GDPR and their regulatory activity within it. It is quite an interesting report for&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-034-ransomware-case-study/">#WeekendWisdom 034 Ransomware Case Study</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 34. This week we&#8217;re going to talk about a ransomware case study.<span id="more-2166"></span></p>
<p><div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2166-4" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4</a></video></div></p>
<h3>Where did this ransomware case study come from?</h3>
<p>Earlier this week the <a href="https://www.dataprotection.ie/" target="_blank" rel="noopener noreferrer">data protection commission</a> issued <a href="https://www.dataprotection.ie/sites/default/files/uploads/2020-06/DPC%20Ireland%202018-2020%20Regulatory%20Activity%20Under%20GDPR.pdf" target="_blank" rel="noopener noreferrer">a report</a> on the first two years of the GDPR and their regulatory activity within it.</p>
<p>It is quite an interesting report for privacy professionals and I read through it with a great deal of interest. And I came across a case study about a ransomware incident that a sports and leisure company had suffered. It was interesting in that data protection commission had gone back to the company after being told about the breach and they asked for quite a detailed list of items from that company. You can see this list here.</p>
<h3>What did the Data Protection Commission want to know?</h3>
<p>So you can see that they wanted to know:</p>
<ul>
<li>The chronology of the events that led up to the incident.</li>
<li>They wanted a description of the hardware and software that the company used.</li>
<li>What was the source and the attack vector of that ransomware</li>
<li>What was the variant</li>
<li>Was there some audit logs</li>
<li>What was the demand notice for the ransomware</li>
<li>Very important of course, whether there were backups available to recover from and</li>
<li>finally what types of measures that company have put in place to try and prevent this from occurring in the first place</li>
</ul>
<h3>That seems like a lot for a ransomware incident.</h3>
<p>That&#8217;s quite a detailed list of items and if you couldn&#8217;t answer those questions right now in your business, then you need some help. You need to have things like:</p>
<ul>
<li>A data breach handling procedure</li>
<li>Need to have a asset registers for your hardware and software</li>
<li>Your security setup and</li>
<li>Your backups</li>
</ul>
<p>All of these things you need to have those put in place in case this ever happens to you. So feel free to reach out if you need any assistance or advice on that.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training.</p>
<p>We can also provide assistance on implementing mitigation measures to help protect your business from #Ransomware.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-034-ransomware-case-study/">#WeekendWisdom 034 Ransomware Case Study</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4" length="25023185" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 030 Thermal Imaging Cameras</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-030-thermal-imaging-cameras/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 29 May 2020 08:25:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Covid19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Screening employees]]></category>
		<category><![CDATA[Thermal Cameras]]></category>
		<category><![CDATA[Thermal Imaging]]></category>
		<category><![CDATA[Thermal Imaging Cameras]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2018</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 30. This week we&#8217;re going to talk about thermal imaging cameras. Earlier this week I co-hosted an online event where we talked about the &#8220;Return to work safely protocol&#8221; and data protection aspects in regards to that. If you want to watch it back go to YouTube and search for &#8220;breaking&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-030-thermal-imaging-cameras/">#WeekendWisdom 030 Thermal Imaging Cameras</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 30. This week we&#8217;re going to talk about thermal imaging cameras.<span id="more-2018"></span></p>
<p><div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2018-5" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-030-lo.mp4?_=5" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-030-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-030-lo.mp4</a></video></div></p>
<p>Earlier this week I co-hosted an online event where we talked about the &#8220;Return to work safely protocol&#8221; and data protection aspects in regards to that. If you want to watch it back go to YouTube and search for &#8220;breaking bad data protection practices&#8221;.</p>
<p>Now if anything I&#8217;m about to say here gives you cause for concern or questions, please feel free to contact me on <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<h3>What&#8217;s wrong with Thermal Imaging Cameras?</h3>
<p>So because thermal imaging cameras are actually processing health data, you need to carry out a data protection impact assessment. This must be done on the whole set up, BEFORE you consider installing it. You can get guidance on www.DataProtection.ie for doing a data protection impact assessment or DPIA.</p>
<h3>Who can I screen?</h3>
<p>You have the right to screen your employees. What you don&#8217;t have is the right to screen any member of the public or people who are not your employees. You just simply do not have that right.</p>
<h3>What about visual and audible alerts?</h3>
<p>Are you thinking about using any visual or audible alerts from the equipment? If so these must be placed in a very private location where there is only the subject being screened can be aware of these alerts.</p>
<h3>Saving the data to the cloud is OK &#8211; yeah?</h3>
<p>Do the cameras come with cloud storage capability? If so I&#8217;d be very reluctant to use it until you&#8217;re absolutely certain that the data is not taken outside of the EU.</p>
<h3>I can get the clips emailed to my phone. That&#8217;s secure isn&#8217;t it?</h3>
<p>And finally, you&#8217;re processing health data, it needs to be protected, so if the cameras have the capability of emailing video clips, don&#8217;t use them because email is not the most secure method for transmission of data.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<h3>Follow us on Social media:</h3>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-030-thermal-imaging-cameras/">#WeekendWisdom 030 Thermal Imaging Cameras</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-030-lo.mp4" length="25503108" type="video/mp4" />

			</item>
		<item>
		<title>Practical GDPR for Small Business Training</title>
		<link>https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:56:45 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Documentation]]></category>
		<category><![CDATA[GDPR for Small Business]]></category>
		<category><![CDATA[GDPR for SME]]></category>
		<category><![CDATA[GDPR for SMEs]]></category>
		<category><![CDATA[GDPR Policies]]></category>
		<category><![CDATA[GDPR Procedures]]></category>
		<category><![CDATA[GDPR Training]]></category>
		<category><![CDATA[Practical GDPR]]></category>
		<category><![CDATA[Practical GDPR for Small Business]]></category>
		<category><![CDATA[Practical GDPR Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2113</guid>

					<description><![CDATA[<p>Practical GDPR for Small Business/Charity Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Practical Data Protection Training, in an online and in-person format. Title: Practical GDPR for Small Business/Charity Training. Learning objective: The purpose of this programme is to equip the learner with the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/">Practical GDPR for Small Business Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2113 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2113"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Practical GDPR for Small Business/Charity Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Practical-GDPR-for-Small-Business-Charity.pdf" target="_self" class="pp-button" role="button" download="Practical-GDPR-for-Small-Business-Charity.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea854a15d08" data-node="5eea854a15d08">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Practical%20GDPR%20for%20Small%20Business%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20practical%20GDPR%20for%20small%20business%20training,%20please.%0A" target="_self" class="pp-button" role="button" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Practical Data Protection Training, in an online and in-person format.</p>
<h2>Title: Practical GDPR for Small Business/Charity Training.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the practical knowledge to implement policies and procedures in their organisation. They will also understand the requirements for record keeping.</p>
<h2>Content of the Practical GDPR for Small Business/Charity Training:</h2>
<p>There are three separate modules in this training:</p>
<h3>1.   Module 1 – The basic requirements</h3>
<ul>
<li>Quick question – do you need a Data Protection Officer (DPO)?</li>
<li>Interpreting the GDPR’s principles</li>
<li>Creating a simple Data Inventory</li>
<li>Establishing a Data Protection Policy</li>
</ul>
<h3>2.   Module 2 – The crucial documentation</h3>
<ul>
<li>What needs to be included in a right-to-be-informed page</li>
<li>Producing procedures to handle an individual’s rights</li>
<li>Knowing the kind of records you need to keep</li>
</ul>
<h3>3.   Module 3 – The stuff most people forget about</h3>
<ul>
<li>Understanding Data Processing Agreements</li>
<li>When it hits the fan – using a Data Breach handling procedure</li>
<li>Securing the business with an Information Security Policy</li>
</ul>
<h2>Duration:</h2>
<p>Each Module is 60 minutes, including ample time for Questions and Answers</p>
<h2>Audience:</h2>
<p>Small Business Owners or Data Protection Administrators in small businesses and charities who need to put in place policies, procedures and records keeping for the GDPR in their organisation.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/">Practical GDPR for Small Business Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>#WeekendWisdom 010 Ransomware Breaches</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-010-ransomware-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 10 Jan 2020 16:20:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware Breaches]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1810</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 10. This week we are talking about Ransomware Breaches. TravelEx ransomware breach Over the last several weeks, there have been an increasing number of ransomware incidents occurring, all across the globe. Most concerning of recent times has been the TravelEx company in the UK. They are a currency exchange company. They&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-010-ransomware-breaches/">#WeekendWisdom 010 Ransomware Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 10. This week we are talking about Ransomware Breaches.<span id="more-1810"></span></p>
<p><div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1810-6" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-010-lo.mp4?_=6" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-010-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-010-lo.mp4</a></video></div></p>
<h3>TravelEx ransomware breach</h3>
<p>Over the last several weeks, there have been an increasing number of ransomware incidents occurring, all across the globe. Most concerning of recent times has been the TravelEx company in the UK. They are a currency exchange company. They were hit with a ransomware incident on New Year&#8217;s Eve and they have been down now for more than 10 days. They only advised in the last couple of days that it was ransomware that hit them. They are now processing transactions on pen and paper with calculators to do calculations.</p>
<h3>The GDPR consideration</h3>
<p>If you were processing personal data of EU residents and you get hit with ransomware incident, you have got a GDPR exposure because the data has been unlawfully altered. Now because you may not understand what the risk situation is to the individuals and because once you become aware of a data breach you must report it to the data protection authorities within 72 hours, if there is a risk to the rights and freedoms of the individuals, you would be well advised to report the ransomware incident to the data protection authorities. If you process some sensitive data on individuals, you would also need to be notifying them as well about the ransomware breach.</p>
<h3>Does paying work?</h3>
<p>Some say that people should pay to get their data back because it&#8217;s often cheaper than recovering the data and the systems themselves. That can be the case but again recently some of the decryptors that the ransomware creators have made haven&#8217;t been working properly and people have actually lost data even though they have paid for to get the data back. So that is significant risk that you really don&#8217;t want to take on board.</p>
<h3>What if they leak your data?</h3>
<p>Another concern is that, again a fairly recent development, is that the ransomware criminals are actually getting the data, they&#8217;re stealing the data downloading it from your systems before they scramble it, so then once your data is scrambled and they&#8217;re looking for the ransom if you say &#8220;I&#8217;m not going to pay the ransom&#8221;, they will say &#8220;OK, well if you don&#8217;t pay the ransom we&#8217;re going to leak the data onto the internet and let everybody see the data.&#8221; So you will have a significant problem there. So you really don&#8217;t want to get caught out with ransomware in the first place.</p>
<h3>Backups, tested backups and offline backups</h3>
<p>So the best protection against ransomware is always having good reliable tested and secure backups. You want to make sure you have tested the backups. This is really important that you test the backups quite frequently and nowadays my advice would be to test your backups at least monthly, no less than quarterly testing of the backups and restore the data. Use the cloud for an offsite copy of the data, the cloud is fine for that. But you do need to have an offline copy of your data, maybe on an external hard drive or some kind of mechanism that you can disconnect from your computer when the backup isn&#8217;t taking place. So if you get hit with ransomware and local data is corrupted and maybe even you&#8217;re cloud data could be corrupted, you have a local copy on a hard disk that you can recover from.</p>
<p>So that&#8217;s it for this week. Let&#8217;s be careful out there and we&#8217;ll talk to you again next week.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-010-ransomware-breaches/">#WeekendWisdom 010 Ransomware Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-010-lo.mp4" length="48580083" type="video/mp4" />

			</item>
	</channel>
</rss>
