Should the U.S. Expect Its Own Version of GDPR?

Conversations around data protection and personal privacy have been ongoing for years, but it has reached a crescendo. Many high-profile tech executives are calling for legislation in the U.S. that is similar to the EU’s GDPR (General Data Protection Regulation). California has already passed new privacy legislation that is among the strongest privacy controls in the nation.

This is a healthy debate and it seeks to put the best interests of consumers forward. This is important for many reasons, including the fact that consumer trust hinges on this debate, and this trust is essential for technological innovation to flourish.

What, if any, federal legislation comes to pass in the U.S. remains to be seen. However, becoming knowledgeable about GDPR and understanding how Intel® can help you position your clients to become responsible stewards of their data is a good idea.

Data Protection That’s All Encompassing

The types of data covered under GDPR are all-encompassing. GDPR covers information stored by human resources, data about consumer purchases and identities, and business contact information. It covers details about website visitor identities, data carried over the network, and any data that discloses details about an individual’s life, records and personal transactions. In addition, businesses must ensure that rights have been granted to collect an individual’s data and permission obtained for processing it.

These stringent rules require companies to reassess their security and data privacy posture. This is good practice even for companies who are not operating in, or with, citizens of the EU. Proactive steps to ensure security and privacy of customers, employees, and suppliers only increase a company’s integrity and elevate their trust quotient.

A Secure Foundation

Security must be pervasive. It must be woven into the very fabric of IT infrastructure from silicon to software and enterprise to endpoints. Intel helps you build a secure foundation by offering security capabilities that start at boot protections embedded in silicon and extend all the way through the software stack. Technologies such as the ones below help protect data in each state: data in use, in transit, and at rest:

A Step in the Right Direction

The best intentions don’t always lead to action. Despite the awareness of regulations and risks, many companies fall short in data security and privacy. Herein could lie your next opportunity to conduct risk assessments, recommend secure hybrid IT, and build an end-to-end security strategy.