{"id":5238,"date":"2017-11-30T09:07:27","date_gmt":"2017-11-30T15:07:27","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5238"},"modified":"2017-11-29T16:21:22","modified_gmt":"2017-11-29T22:21:22","slug":"gdpr-and-the-uk-data-protection-bill","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/gdpr-and-the-uk-data-protection-bill\/","title":{"rendered":"GDPR and the UK Data Protection Bill"},"content":{"rendered":"<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/11\/gdpr-law.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5239 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/11\/gdpr-law.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/11\/gdpr-law.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/11\/gdpr-law-150x150.png 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>The GDPR and UK Data Protection Bill have some similar language to the PCI DSS involving keeping track of data and who\/what process is accessing data.<\/p>\n<p>\u00a0<\/p>\n<p>Specifically, <a href=\"https:\/\/gdpr-info.eu\/art-30-gdpr\/\" target=\"_blank\" rel=\"nofollow\">Article 30<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\u00a0indicates data processors \u201c<em><strong>shall maintain a record of all categories of processing activities<\/strong><\/em>\u201c.\u00a0\u00a0Customers are beginning to turn to <a href=\"https:\/\/www.poweradmin.com\/products\/file-sight\/?ref=blog\">PA File Sight<\/a> for help with this.<\/p>\n<p>\u00a0<\/p>\n<p>Specifically, PA File Sight\u2019s ability to <a href=\"https:\/\/www.poweradmin.com\/products\/file-sight\/product-information\/information-leak-protection\/\">detect file copy<\/a> operations is valuable in helping prevent critical data leaks.\u00a0 In addition, <a href=\"https:\/\/www.poweradmin.com\/products\/file-sight\/product-information\/audit-file-access\/\">records of who accessed what files<\/a>\u00a0is also helpful for keeping GDPR compliance.<\/p>\n<p>\u00a0<\/p>\n<p>If you couple the detection with the new <a href=\"https:\/\/www.poweradmin.com\/help\/latestfshelp.aspx?page=action-add-to-blocked-users-list.aspx\">Add to Blocked Users List action<\/a>\u00a0which can block user access you end up with a prevention solution.<\/p>\n<p>\u00a0<\/p>\n<p>DETECT &gt; PREVENT<\/p>\n<p>\u00a0<\/p>\n<p>PA File Sight makes detecting file copy operations possible, and in coming versions it will be even easier.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The GDPR and UK Data Protection Bill have some similar language to the PCI DSS involving keeping track of data and who\/what process is accessing data. \u00a0 Specifically, Article 30\u00a0indicates data processors \u201cshall maintain a record of all categories of processing activities\u201c.\u00a0\u00a0Customers are beginning to turn to PA File Sight for help with this. \u00a0 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5239,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-5238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5238"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5238\/revisions"}],"predecessor-version":[{"id":5244,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5238\/revisions\/5244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5239"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}