Pop music has more in common now with data security, thanks to the new Czech cyber-security law and an amended Californian data protection code. After all, “Caught in a landslide, no escape from reality”, the line from Queen’s "Bohemian Rhapsody," is a timely description of data breaches and the new wave of legislation.

But first the facts: The new Czech cyber-security legislation (zákon o kybernetické bezpečnosti) falls squarely within the context of the EU Cyber-security Strategy  with its goal of securing the country’s IT backbone and establishing a CERT center. 

It comes into effect in 2015 and is one of the first cyber-security laws passed following the European Parliament’s approval of the draft Network and Information Security Directive (known as the Cyber-security Directive).

Three pillars for your data

Even if you never step foot in the Czech Republic, the Czech law shows what is coming within the larger European context with its three pillar structure:

1.    Standardization – Establishing a defined list of security standards
2.    Announcement – Listing security events that organizations are required to detect, react to, and announce to the relevant authorities.
3.    Countermeasures – Defining needed actions after the announcement of a security incident.

Within these three pillars, the new law divides cyber-security into technical and organizational measures. This division is needed as many technical measures such as firewalls and antivirus are well known (although others, like Data Leak Prevention, are not) but the benefits to incorporating security measures within the organizational structure such as ISO 270001 or Safetica  are significantly under appreciated.  The Czech law will directly influence the activities of many state, financial, health, and IT sector organizations once it comes into effect, and is also positioned to help influence other, cyber security laws within the EU.

"Open your eyes, look up to the skies and see," sings Freddy Mercury. Yes, it's time for Czechs and Europeans to take a much closer look at their security measures on the ground and in the clouds.

California dreamin' of data privacy

And now for California: “I'd be safe and warm if I was in L.A.,” harmonizes The Mommas and the Poppas. That is not exactly true, as your data is still at risk in California. But, this state – home of early restrictions on everything from car exhaust, smoking and soft drinks – is still trying to be at the forefront of data protection. And by the way, California legislation has a tendency to be copied elsewhere.

Assembly Bill No. 1710 amends several sections of the California Civil Code that cover information privacy. While some changes such as prohibiting the sale of social security numbers seem like no-brainers, the amendment effectively ups the cost of a data breach. Organizations will be required to provide identity theft prevention and mitigation services to individuals for one year if their private details are leaked.

Keep eyes open for 'reasonable security'

The amendment also expands the requirement for organizations to secure sensitive data. It is no longer limited to organizations that "own or license" personal information on a California resident. The expanded laws now apply to organizations that just "maintain" personal information about a California resident. And as White& Case points out, organizations will need to keep an eye out for what constitutes "reasonable" security”. We just hope that this includes ISO-type process controls and security solutions that help with data leak protection, encryption, regulatory compliance, or activity monitoring such as Safetica provides. After all, data security shouldn't be just "California dreamin' on such a winter's day."

Author
Petra Voženílková
HR Manager @Safetica

She devotes herself to the people who make up Safetica and excitedly introduces it to those who might become a part of it one day.

Next articles

Data Loss Prevention, Guide for 2022

Data is a company’s most precious asset, from copyrights and client lists to sensitive information about employees. Most data is now in electronic form. It is created and accessed through software, databases, and other tools, making it vulnerable to loss and theft.

Infotech: Safetica Product Scorecard

Product scorecards prepared by SoftwareReviews covers Net promoter score and planned renewal rates, feature and vendor capability breakdown, version and module satisfaction levels and comparisons by organization size, usage, and role.

2021 DLP Data Quadrant led by Safetica

SoftwareReviews named Safetica as award winner in 2021 Data Loss Prevention Data Quadrant. Get the in-depth report with DLP vendors comparison bellow.