How to Prepare to Be GDPR Compliant

How to Prepare to Be GDPR Compliant

On May 25, 2018, the General Data Protection Regulation (GDPR) goes into effect. This will be Europe’s biggest change to data protection law since the 1995 European Union (EU) Data Protection Directive (Directive 95). GDPR is elevating the requirements for data protection, security, and compliance. The GDPR will impact all companies that collect and process personal data from EU citizens, and JumpCloud is taking a number of steps to prepare to be GDPR compliant. We’ve put together a series of posts that looks at the 6 core components of GDPR and how JumpCloud is approaching these aspects of GDPR. If you are interested in a specific area of GDPR, below is a list of the blog posts that cover each component in detail:  

Read the rest of this post for a quick snapshot of what this GDPR series covers.

GDPR (General Data Protection Regulation) & JumpCloud

Prepare to Be GDPR Compliant: JumpCloud and the GDPR

EU Data protection laws have been in need of an update considering the transformation technology has undergone over the last two decades. This was one of the incentives behind the GDPR. The GDPR addresses changes in technology by expanding the scope of who has to comply with EU data protection law, strengthening EU citizen rights, and raising the bar when it comes to personal data privacy and security. Read this post if you would like to gain a better understanding of how the GDPR is making general changes to data protection law, and how JumpCloud is prepared to be GDPR compliant by the May 2018 deadline.

GDPR: Privacy and Security by Design

Prepare to Be GDPR Compliant: Privacy by design

While not necessarily a new concept, the GDPR presents new requirements regarding privacy and security by design. In the past, organizations had to have privacy and security by design, but the EU 1995 Directive didn’t specify at what point in the data collection process it needed to be fulfilled. It allowed organizations to treat privacy (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm