In this episode, we discuss some of the laws designed to protect the privacy of personal information. Visit https://www.absolute.com/solutions/use-cases/gdpr-compliance/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise to learn more. The most well-known is the EU’s General Data Protection Regulation (GDPR). Under GDPR, an organization must demonstrate that security safeguards are active, up-to-date, and working effectively. Or risk substantial fines. GDPR has set the standard for other regulations around the world, but Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) comes pretty close. Most notable with PIPEDA is the need to prove your security posture was airtight when the incident happened, not just whether data was stolen. What about data privacy laws in the US? Well, we find laws such as HIPAA (for health information) and S-P and S-ID statutes for financial records, enforced by the SEC. There is also the California Consumer Privacy Act (CCPA). But no national privacy standard. Yet. Data Privacy is today's greatest challenge for IT and security teams, and with 35% of sensitive data out-of-sight on endpoints, there has never been a stronger need for persistent endpoint visibility and control. ---- Want to learn more about how to reduce your risk exposure? Arm your organization against potential threats with the steps outlined in this eBook: “3 Overlooked Data Privacy Considerations”: https://www.absolute.com/customer-resources/ebooks/3-overlooked-data-privacy-considerations/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise Find out more about how Absolute Software can help you protect the privacy of your data: https://www.absolute.com/solutions/use-cases/prove-compliance/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise ---- Watch more episodes of the Cybersecurity Insights series: #1 - HIPAA Privacy Rule - https://www.youtube.com/watch?v=FtdvOVh3u28&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #2 - HIPAA Security Rule: https://www.youtube.com/watch?v=cMI_JyiMR9Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=2 #3 - HITRUST Cybersecurity Framework: https://www.youtube.com/watch?v=QLu9zcclHo4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=3 #4 - NIST Cybersecurity Framework: https://www.youtube.com/watch?v=hBpB5Z-Wl6w&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=4 #5 - NIST CSF - Identify: https://www.youtube.com/watch?v=2pCNYNPs-70&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=5 #6 - NIST CSF - Protect: https://www.youtube.com/watch?v=gdWv3NJKzSs&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=6 #7 - NIST CSF - Detect: https://www.youtube.com/watch?v=0VdtW3Ue3F8&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=7 #8 - NIST CSF - Respond: https://www.youtube.com/watch?v=7VwS3HTAW1M&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=8 #9 - NIST CSF - Recover: https://www.youtube.com/watch?v=94ED4iPB36o&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=9 #10 - Lost/Stolen Device: https://www.youtube.com/watch?v=QYgYTZPnU-Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=10 #11 - Data Privacy explained: https://www.youtube.com/watch?v=3YIPQrEWOeY&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=11 #12 - Data Privacy laws: https://www.youtube.com/watch?v=v9I8iDLFtqE&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #13 - Data Privacy Tips: https://www.youtube.com/watch?v=KyAyni3SJmU&index=1&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW #14 - Top Cybersecurity Threats: https://www.youtube.com/watch?v=ZZ5R1diN0OI&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: https://www.youtube.com/watch?v=aOy9SQxnHKA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained https://www.youtube.com/watch?v=r-PRBdsEQZA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #17 - Zero Trust Explained: https://www.youtube.com/watch?v=7Oeo1A5gncQ&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #18 - 5 Most Devastating Cyber Attacks: https://www.youtube.com/watch?v=IJc3viPKXk4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #19 - Dealing with IT Complexity: https://www.youtube.com/watch?v=6kvas8uqMuk&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1