Premium Content

Access "The implications for storage of EU data protection regulation "

Published: 13 Oct 2012
Compliance and risk

This article is part of the August 2012 issue of Compliance and risk

With the rapid growth of data within organisations and the upcoming changes to the EU data protection regime, businesses need to become more proactive about their data storage strategies from a compliance point of view. To do that, businesses need to understand the EU data protection regulations they must comply with and their implications for data storage. Data storage regulations in Europe are currently driven by provisions of the EU Data Protection Directive and their respective applications in member states, by provisions relating to national directives around retention periods for financial information and by other requirements stemming out of freedom of information frameworks as well as electronic commerce, cookie and e-discovery requirements.  The current EU data protection regime requires organisations to take “appropriate security measures to protect personal data.” It is based around eight principles driving the data protection regime that dictate how personal data must be acquired, maintained, updated, stored, protected and disposed of. Changes to... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...