What are Data Breach Notification Requirements?

Thales eSecurity Provides the Answers to your Cybersecurity Questions

What are Data Breach Notification Requirements?

Data breach disclosure law notification requirements following loss of personal information have been enacted by governments around the globe. They vary by jurisdiction, but almost universally include a “safe harbour” clause, which means that if the stolen data is undecipherable and meaningless to whomever steals it, the breached organization does not need to report the breach. Consequently, data-centric protection, such as encryption, is considered best practice, because it renders data meaningless without the keys to decrypt or detokenize it.

Data Breach Disclosure Laws Widespread

National data breach disclosure laws include the UK Data Protection ActEU General Data Protection Regulation (GDPR)South Korea’s Personal Information Protection ActAustralian Privacy Act and others.

Prevention of Data Breaches a Complex Task

Data breach protection and prevention is not as simple as implementing hardware level disk encryption or OS level encryption within systems. Attacks are increasingly able to penetrate perimeter defenses, compromise accounts, and mine data without targets even being aware of the attack. With this kind of activity, simple encryption schemes won’t prevent a data breach – attackers will access accounts that allow them to decrypt and extract personal data. Driving this are criminal groups willing and able to pay for stolen personal information that has direct monetary value.

Data-Centric Focus

A data-centric security strategy for complying with data breach disclosure laws requires:

  1. Encryption of personal data wherever it resides – including file systems databases, web repositories, cloud environments, big data environments and virtualization implementations.
  2. Policy-based access controls to assure that only authorized accounts and processes can see the data.
  3. Monitoring of authorized accounts accessing data, to ensure that these accounts have not been compromised.

Related Articles