{"id":35388,"date":"2024-12-11T04:59:36","date_gmt":"2024-12-11T04:59:36","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz\/?p=35388"},"modified":"2024-12-11T04:59:37","modified_gmt":"2024-12-11T04:59:37","slug":"data-privacy-emea-regulation-changes","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/data-privacy-emea-regulation-changes\/","title":{"rendered":"Strengthening Data Privacy Amid Regulatory Changes in the EMEA Region"},"content":{"rendered":"\n<p>As Europe adapts to evolving data protection regulations, organisations are under greater pressure to stay compliant while ensuring secure data collaboration and identity protection. With recent <a href=\"https:\/\/commission.europa.eu\/law\/law-topic\/data-protection\/data-protection-eu_en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">regulatory changes<\/a> adding new layers of responsibility for data privacy, companies across the EMEA (Europe, Middle East and Africa) region are finding that compliance now requires robust, multidimensional solutions to extend beyond mere data protection policies.&nbsp;<\/p>\n\n\n\n<p>In this article, we\u2019ll outline the key updates in data privacy laws and offer insights into practical compliance measures, from secure collaboration to identity management.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Data Privacy: The New Standard in EMEA Compliance<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Over the past few years, data privacy has become a top priority for companies in EMEA, especially in light of legislative shifts across Europe. These changes include updates to the General Data Protection Regulation (GDPR) and national data privacy laws, often requiring a more stringent approach to handling sensitive information.&nbsp;<\/p>\n\n\n\n<p>Recent amendments address the security and transparency of data use, placing an increased burden on organisations to not only protect but also document how they manage personal information.&nbsp;<\/p>\n\n\n\n<p>Below are some of the changes in the last 12 months in Europe:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>European Union: <\/strong>The <a href=\"https:\/\/iapp.org\/media\/pdf\/resource_center\/eu-data-act-101-chart.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Data Act went into force in January 2024<\/a>, designed to foster data sharing and clarify data rights across sectors, particularly for non-personal data generated by IoT devices. Its goal is to increase data accessibility while maintaining safeguards for user and business data. The Artificial Intelligence Act is also progressing, with a risk-based framework to regulate AI development and use, aiming to protect users and foster AI transparency.\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>United Kingdom:<\/strong> The <a href=\"https:\/\/bills.parliament.uk\/bills\/3430\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Data Protection and Digital Information (DPDI) Bill<\/a> continues to evolve as a UK-GDPR alternative. It seeks to reduce compliance burdens on businesses, simplify rules and enable more flexibility with data transfers. The Online Safety Bill also introduces new requirements for platforms to handle harmful content, with OFCOM as the regulator overseeing enforcement.\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Switzerland: <\/strong>A <a href=\"https:\/\/www.kmu.admin.ch\/kmu\/en\/home\/facts-and-trends\/digitization\/data-protection\/new-federal-act-on-data-protection-nfadp.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">revamped Federal Act on Data Protection<\/a> (FADP) came into effect on September 1, 2023, aligning Switzerland\u2019s standards more closely with GDPR, including updates to data transfer requirements and data subject rights.\u00a0<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>International Laws Affecting Multinational Businesses<\/strong>&nbsp;<\/h2>\n\n\n\n<p>For businesses operating across borders, these regulations introduce additional complexity. Ensuring data privacy compliance in one country might not fully cover another, as national laws in certain regions now demand higher standards than even the GDPR. Businesses are now tasked with both preventing data breaches and meticulously tracking the processing and sharing of data to ensure transparency and legal compliance.&nbsp;<\/p>\n\n\n\n<p>Here are some national laws that EMEA businesses should take note of if they operate in these countries:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>China\u2019s Personal Information Protection Law (PIPL):<\/strong> The PIPL includes strict requirements for cross-border data transfers, data localization and a unique enforcement mechanism tied to other cybersecurity regulations. This law requires additional steps, including governmental security assessments, for international data transfers. You can find detailed discussions on these provisions from the <a href=\"https:\/\/iapp.org\/resources\/article\/european-strategy-for-data-overview-of-new-regulations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">International Association of Privacy Professionals (IAPP)<\/a>.\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>California Privacy Rights Act (CPRA): <\/strong>The CPRA extends consumer rights in ways not covered by GDPR, such as the right to correct personal information and restrict the use of &#8220;sensitive&#8221; data. It also mandates the creation of a dedicated enforcement agency, the California Privacy Protection Agency (CPPA). For an in-depth look at CPRA&#8217;s provisions, check out sources like Cornell Tech&#8217;s report on data privacy laws and <a href=\"https:\/\/iapp.org\/resources\/article\/european-strategy-for-data-overview-of-new-regulations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">IAPP&#8217;s<\/a>.\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Brazil\u2019s LGPD: <\/strong>The LGPD includes stringent requirements for handling sensitive data and data subject consent that sometimes go beyond GDPR. Enforcement is conducted by Brazil\u2019s National Data Protection Authority (ANPD), which has significant authority over compliance, including the power to impose fines based on violation severity. For more about LGPD specifics, you can refer to resources from <a href=\"https:\/\/iapp.org\/resources\/article\/european-strategy-for-data-overview-of-new-regulations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">IAPP.<\/a>\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Japan\u2019s Act on Protection of Personal Information (APPI):<\/strong> Japan\u2019s APPI has reciprocity with the GDPR, yet has introduced recent updates that tighten data handling requirements, especially for companies operating internationally. The APPI sets high standards for data transfers and requires diligence for data breach notifications and data sharing. More information is available via the <a href=\"https:\/\/iapp.org\/resources\/article\/european-strategy-for-data-overview-of-new-regulations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">IAPP\u2019s report on APPI updates<\/a>.\u00a0<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Elements of a Compliance-Driven Privacy Strategy<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Despite the differences in privacy regulations globally, there are several common technical controls that most of them expect organisations to implement for privacy protection. Adopting these components allows you to build a privacy-first culture.&nbsp;&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Data Encryption<\/strong>: Encrypting personal data both in transit and at rest to protect it from unauthorised access\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Access Controls<\/strong>: Implementing strict access controls to ensure that only authorised personnel can access personal data\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Data Integrity and Confidentiality<\/strong>: Ensuring the ongoing integrity, availability and confidentiality of personal data\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Incident Response Plans<\/strong>: Having plans in place to respond to data breaches and other security incidents promptly\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><strong>Data Minimisation<\/strong>: Collecting and processing only the data that is necessary for the specified purpose\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"6\" class=\"wp-block-list\">\n<li><strong>Regular Audits and Monitoring<\/strong>: Conducting regular audits and continuous monitoring to detect and address vulnerabilities\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"7\" class=\"wp-block-list\">\n<li><strong>Data Subject Rights<\/strong>: Implementing mechanisms to facilitate data subject rights, such as access, correction and deletion of personal data\u00a0<\/li>\n<\/ol>\n\n\n\n<p>For data encryption, access controls and data integrity and confidentiality, organisations could look to adopting controls from a cybersecurity framework.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Control<\/strong>&nbsp;<\/td><td><strong>NIST<\/strong>&nbsp;<\/td><td><strong>CIS&nbsp;<\/strong>&nbsp;<\/td><td><strong>ACSC ISM<\/strong>&nbsp;<\/td><\/tr><tr><td>Data Encryption&nbsp;<\/td><td>Protect (PR.DS-1)&nbsp;<\/td><td>Control 13.1 Encrypt sensitive data&nbsp;&nbsp;<\/td><td><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-1080<\/strong><\/a><strong>: <\/strong>Use an ASD-Approved Cryptographic Algorithm (AACA) or high-assurance cryptographic algorithm when encrypting media.<br><br><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0457<\/strong><\/a><strong>:<\/strong> Use cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile for encrypting media containing OFFICIAL: Sensitive or PROTECTED data.<br><br><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0469<\/strong><\/a><strong>:<\/strong> Use an ASD-Approved Cryptographic Protocol (AACP) or high assurance cryptographic protocol to protect data communicated over network infrastructure.\u00a0<\/td><\/tr><tr><td>Access Controls&nbsp;<\/td><td>Protect (PR.AC-1)&nbsp;<\/td><td>Control 5.1 Establish secure configurations&nbsp;&nbsp;<\/td><td><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0459<\/strong><\/a><strong>:<\/strong> Implement full disk encryption, or partial encryption where access controls only allow writing to the encrypted partition.<br><br><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0462:<\/strong><\/a> Handle IT equipment or media according to its original sensitivity or classification when a user authenticates to the encryption functionality.<br><br><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0507<\/strong><\/a><strong>:<\/strong> Develop, implement and maintain cryptographic key management processes and procedures.\u00a0<\/td><\/tr><tr><td>Data Integrity and Confidentiality&nbsp;<\/td><td>Protect (PR.DS-6)&nbsp;Protect (PR.DS-2)&nbsp;<\/td><td>Control 10.1 Implement secure backups&nbsp;Control 14.1 Protect data in transit&nbsp;<\/td><td><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0465:<\/strong><\/a> Use cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile to protect OFFICIAL: Sensitive or PROTECTED data when communicated over insufficiently secure networks.<br><br><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0467:<\/strong><\/a> Use High Assurance Cryptographic Equipment (HACE) to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks.<br><br><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ISM-0455:<\/strong><\/a> Ensure cryptographic equipment and software provide a means of data recovery to allow for circumstances where the encryption key is unavailable due to loss, damage or failure.\u00a0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Adaptation to Emerging Data Privacy Laws: A Proactive Approach<\/strong>&nbsp;<\/h2>\n\n\n\n<p>One of the major challenges in this rapidly changing landscape is staying ahead of emerging laws. In some EMEA countries, data privacy regulations are stricter than the overarching GDPR, creating a web of obligations that companies must navigate. As regulations continue to evolve, organisations need to remain proactive by conducting frequent audits, training employees and investing in scalable compliance tools.&nbsp;<\/p>\n\n\n\n<p>Businesses should aim to develop a compliance framework that can adapt as new regulations are introduced. By staying informed of regulatory updates and integrating compliance into everyday operations, organisations can avoid penalties and establish themselves as trusted custodians of data.&nbsp;<\/p>\n\n\n\n<p>You can stay abreast of regulatory shifts by subscribing to newsletters and alerts from legislative authorities, law firms and regulatory bodies. Below are some resources you can subscribe to depending on where your business operates.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>REGION<\/strong>&nbsp;<\/td><td><strong>RESOURCE<\/strong>&nbsp;<\/td><\/tr><tr><td rowspan=\"2\">European Union&nbsp;<\/td><td><a href=\"https:\/\/edpb.europa.eu\/%5d(https:\/edpb.europa.eu\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">European Data Protection Board (EDPB)<\/a>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/commission.europa.eu\/strategy-and-policy\/policies\/justice-and-fundamental-rights\/data-protection_en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">European Commission &#8211; Data Protection<\/a>&nbsp;<\/td><\/tr><tr><td rowspan=\"2\">United States&nbsp;<\/td><td><a href=\"https:\/\/www.ftc.gov\/business-guidance\/privacy-security\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Federal Trade Commission (FTC) &#8211; Privacy &amp; Security<\/a>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/cppa.ca.gov\/%5d(https:\/cppa.ca.gov\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">California Privacy Protection Agency (CPPA)<\/a>&nbsp;<\/td><\/tr><tr><td>United Kingdom&nbsp;<\/td><td><a href=\"https:\/\/ico.org.uk\/%5d(https:\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Information Commissioner&#8217;s Office (ICO<\/a>)&nbsp;<\/td><\/tr><tr><td>Australia&nbsp;<\/td><td><a href=\"https:\/\/www.oaic.gov.au\/%5d(https:\/www.oaic.gov.au\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Office of the Australian Information Commissioner (OAIC)<\/a>&nbsp;<\/td><\/tr><tr><td>Canada&nbsp;&nbsp;<\/td><td><a href=\"https:\/\/www.priv.gc.ca\/en\/%5d(https:\/www.priv.gc.ca\/en\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Office of the Privacy Commissioner of Canada (OPC)<\/a>&nbsp;&nbsp;<\/td><\/tr><tr><td>Brazil&nbsp;&nbsp;<\/td><td><a href=\"https:\/\/www.gov.br\/anpd\/%5d(https:\/www.gov.br\/anpd\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">National Data Protection Authority (ANPD)<\/a>&nbsp;&nbsp;<\/td><\/tr><tr><td>Japan&nbsp;<\/td><td><a href=\"https:\/\/www.ppc.go.jp\/en\/%5d(https:\/www.ppc.go.jp\/en\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Personal Information Protection Commission (PPC)<\/a>&nbsp;<\/td><\/tr><tr><td>South Africa&nbsp;<\/td><td><a href=\"https:\/\/www.justice.gov.za\/inforeg\/%5d(https:\/www.justice.gov.za\/inforeg\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Information Regulator (South Africa)<\/a>&nbsp;<\/td><\/tr><tr><td>India&nbsp;&nbsp;<\/td><td><a href=\"https:\/\/www.meity.gov.in\/%5d(https:\/www.meity.gov.in\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Ministry of Electronics and Information Technology (MeitY)<\/a>&nbsp;<\/td><\/tr><tr><td>China&nbsp;&nbsp;<\/td><td><a href=\"http:\/\/www.cac.gov.cn\/%5d(http:\/www.cac.gov.cn\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cyberspace Administration of China (CAC)<\/a>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Looking Ahead: Building Trust in the Data Privacy Era<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Data privacy has shifted from being a compliance requirement to a core component of business strategy, especially in the EMEA region. With stricter regulations on the horizon, decision-makers are encouraged to view privacy as an opportunity to build trust with clients, employees and stakeholders.&nbsp;<\/p>\n\n\n\n<p>Through robust identity management, secure collaboration and transparent documentation, companies can create a secure environment for data, staying compliant with regional laws and protecting their reputations.&nbsp;<\/p>\n\n\n\n<p>Additionally, explorating certification with ISO standards allows organisations to align with regulatory requirements and demonstrate commitment to quality, safety and efficiency.&nbsp;<\/p>\n\n\n\n<p>ISO 27701 certification helps organisations stay up to date with global privacy regulations and obligations by providing a structured framework for managing personal data and demonstrating compliance with various privacy laws. This certification extends ISO\/IEC 27001 and ISO\/IEC 27002 standards to include privacy-specific requirements, creating a comprehensive Privacy Information Management System (PIMS).&nbsp;<\/p>\n\n\n\n<p>By achieving ISO 27701 certification, organisations can systematically identify, assess and mitigate privacy risks, ensuring they adhere to regulations like GDPR, CCPA and others. Additionally, the certification promotes continuous improvement, helping organisations adapt to evolving privacy laws and best practices.&nbsp;<\/p>\n\n\n\n<p>As regulatory landscapes continue to shift, companies that commit to a privacy-first approach will be better positioned to respond to future requirements. By prioritising data security and compliance today, organisations can safeguard their operations and foster trust in a privacy-conscious world.&nbsp;<\/p>\n\n\n\n<p>If you need assistance with your compliance, Insentra is here to help. <a href=\"https:\/\/www.insentragroup.com\/nz\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us today<\/a> to start a conversation.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay compliant with EMEA\u2019s new data privacy laws. Discover key strategies for secure data management and collaboration. Learn more today! <\/p>\n","protected":false},"author":96,"featured_media":35389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-35388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/35388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=35388"}],"version-history":[{"count":3,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/35388\/revisions"}],"predecessor-version":[{"id":35393,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/35388\/revisions\/35393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media\/35389"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=35388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/categories?post=35388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/tags?post=35388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}