21
Sat, Dec
3 New Articles

Why the IBM i Community Needs to Pay Attention to GDPR

Compliance / Privacy
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Carol explains why it’s likely you could be affected by GDPR…even if you don’t think you are now or will be later.

There are two reasons that the IBM i community needs to pay attention to the EU’s General Data Protection Regulation, better known as GDPR. This article explores both.

First, GDPR applies only if your business is located in the EU, right? Wrong. The regulation is all about the personal data of the EU’s citizens. And it applies to your organization even if you’re not located in the EU but you process private information that identifies any of its citizens or offers services to any them. As long as those citizens reside in the EU, their data falls under the protections and requirements of GDPR, regardless of the country in which it’s stored.

Second, California has just passed a law that looks and smells remarkably like GDPR: AB 375, the California Consumer Privacy Act of 2018. As California goes, so goes the rest of the U.S. typically—at least as far as security and privacy-related laws go.

If you were one of those organizations that knew you were affected by GPDR and had to scramble to meet the May 25, 2018, implementation deadline or you’ve noticed a plethora of enhanced privacy notifications as you’ve visited websites or opened apps on your phone, you know that GPDR requires work to ensure compliance.

Maybe you’re one of those organizations that’s just realizing that you are affected by GPDR, or perhaps your organization does business with residents of California, or you simply want to be prepared. What do you do? Here are the simple premises of GDPR and the new California law that you should be aware of and prepare for:

  • Find the personal information you’re storing. This means any information that could uniquely identify an individual on its own or in conjunction with other pieces of information. The obvious examples include bank account, driver’s license, and passport numbers. Other, not-so-obvious examples include IP addresses, browsing history, biometric information, and geolocation information. Once you find that information, evaluate whether you are actually using that information. If you’re not using it, delete it and stop collecting it. If you aren’t using this private information and can purge it from your systems, doing so will save you immense amounts of time and money.
  • Once you identify and find the personal information you must retain, you need to protect it. In other words, you should encrypt it. That’s the safest way to protect this information. Because if this data is lost or stolen, your organization could incur huge fines. Organizations are strongly encouraged to implement additional security technologies such as installing antivirus software, enforcing role-based access, securing network ports and services, and configuring access controls to be “deny by default”…to name a few.
  • Again, once you’ve identified the information you’re retaining, be prepared to explain to individuals what information is being retained and what it’s being used for. This is because both laws allow citizens to request this information, and you’re required to provide it.
  • If you collect personal information and then sell that information to a third party, you’ll have to explain to individuals what is sold and to whom. Individuals will have to explicitly opt in (no more default or preselected checkboxes that automatically opt in participants). In addition, you’ll have to provide individuals with the ability to opt out of this collection. Buyers of the information will not be able to contact individuals on the list, because the permission to collect and use the information cannot be passed on, even if the seller received permission. And the California law is quite explicit that if someone opts out, you cannot penalize them in any way. In other words, if I were to opt out of your data-sharing practices, you must provide the same level of service to me as you would to someone allowing their data to be sold or shared. Here are the EU’s rules for third-party information exchange.
  • Be prepared to entertain requests from individuals to be “forgotten.” In other words, be prepared to delete individuals’ data and all information about them. A couple exceptions to this requirement exist. If there are legal reasons you need to retain information—for example, financial transactions often have to be retained for seven years—you will not be required to delete the transactions that fall into that legal requirement. Another exception will be granted if it’s technically infeasible to remove the information. For example, many IBM i audit journal entries contain IP addresses. Because it’s impossible to modify the contents of an individual audit journal entry or remove an individual record, you will not be required to delete this information under GDPR. The California law also allows for retention of data if it’s used to detect security incidents.
  • Once this personal information is no longer required by the business, GDPR requires that the data be deleted from the system. This underscores the need for organizations to have—and implement—a data retention policy.
  • Another requirement is that organizations have both a security policy that supports these requirements as well as an incident response plan should this data be lost or stolen. I assert that organizations need to plan for more than private data being lost or stolen, but this is a good place to start if no incident response plan exists today.

As I said earlier, the California law has the same look and feel as GDPR. Assuming that the appeals for applying this law don’t result in major changes, many organizations will be affected and will need to be in compliance by January 1, 2020. Organizations already in compliance with GDPR will have few (if any) additional steps to be in compliance with the California law in its current form. If you’re not in compliance with GDPR, I encourage you to learn from the experiences of organizations that are already compliant. Implementing this type of regulation takes time and effort, and you’ll want to plan and budget for its implementation sooner rather than later.

Summary

I hope you see the importance of paying attention to both GDPR and its U.S. cousin, California’s Consumer Privacy Act of 2018. I encourage you to take these laws seriously, do research to determine whether your organization is affected, and start the implementation early.

Many thanks to my colleague Donnie MacColl, Director of EMEA Services and resident GDPR expert at HelpSystems, for his contributions to this article.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: