Breaking

What is common with CCPA, SHIELD, LGPD, DPB and GDPR?

The world is rushing to secure one expensive currency in recent times, the Data. With its value across verticals, data has become the next deciding factor for businesses to operate across multiple geographical locations successfully.

Need for data protection laws

Considering the importance of the data, most organizations do collect, process, store and delete them as per their business requirements, however certain organizations are yet to make it a habit and develop that into their privacy policy.

Extreme leveraging of the collected data is being displayed by certain fortune 500 companies and considering cases like that and for the welfare of the privacy countries and states have composed their own data protection laws that will help individuals to achieve and sustain their privacy over personal data. 

Data Protection Laws for 2020

On May 25, 2018 General Data Protection Regulation(GDPR) making EU organizations to become compliant with this data protection law. This law alone brought tremendous changes across organizations in redefining their data management routines and procedures.

Now in 2020, more such data protection laws will be practiced in different regions, for example, California Consumer Privacy Act (CCPA) for California State, Stop Hacks and Improve Electronic Data (SHIELD) act for New York, Lei Geral de Proteao de Dados (LGPD) for Brazil and Data Protection Bill (DPB) for India.

Each of these laws will come with their own set of articles and norms that need to be understood by the businesses for implementing the same effectively. Though there are a substantial amount of differences and uniqueness among them their main objective is to safeguard personal data. 

What does CCPA, SHIELD, LGPD, DPB and GDPR have in common?

All these data protection laws are focused in securing personal data of the end users/residents/citizens, and to do that strong norms have to be defined along with huge penalties. One common attribute among them is increasing privacy and imposing penalties. Any breach of these laws may affect the finance and brand reputation of the business but it does not hinder the regular operations. 

The common highlights are, 

  1. Protect personal data.
  2. Makes businesses implement robust cybersecurity practices.
  3. Follow strict access policies.
  4. Inflict penalties in case of non-compliance.
  5. Timeline and process for reporting a data breach.
  6. Consent for data collection.
  7. Data lifecycle management blue print.
  8. Applies to any business that serves the data protection law region.

How to become compliant with all these data protection laws simultaneously

Identify the business’s key area of interest and then formulate data management strategies with the privacy team, after formulating try preaching the teams and employees regarding data security framework, employ strong data management tools, allocate dedicated professionals for data security management, i.e Data Protection Officer (DPO), keep your systems and process updated.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago