Data Breach

Blue glowing GDPR concept withh digital fingerprint, computer generated abstract background, 3D rendering

Do you leave your home without set the lock, and hope the theft never find out? Do you leave your work without lock your system and close your door? Data is your property, protect it before you lost it. Use Opal Lock for your data protection.

Data Breach” is defined in the Wikipedia as a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Hard drive or USB drives are the potential target for the data breach. Lost or stolen computers can cost significant damage to the owners and the owner’s organizations.

According to current CCPA (California Consumer Protection Act) regulation, the damage can be in an amount not less than $100 and not greater than $750 per consumer per incident, or actual damages, whichever is greater. This data breach will greatly impact the business financially and reputation. A mandatory notification and cure are required by the data breach party in the incident of a breach.

Based on the GDPR (General Data Protection Regulation, EU) regulation, the encrypted data can be an exception to report the data breach incidence. Under the law if the controller has implemented appropriate technical and organizational protection measures, such as the sufficient encryption of the involved personal data. Then the notification to affected data subjects is not necessary.

“The communication to the data subject referred to in paragraph 1 shall not be required if any of the following conditions are met: (a) the controller has implemented appropriate technical and organisational protection measures, and those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorized to access it, such as encryption; (GDPR Article 34)”

Opal Lock enable the FDE (Full Drive Encryption) function of a storage devices, either USB or internal hard drives or SSD. Drives implements TCG Opal specification can use this Opal Lock software to lock the drive with AES 256 encryption technology. This will prevent the data to be leaked in the event of device lost or stolen.

Do you know that setting password on your notebook is to prevent unauthorized user to access your account, but the data on the computer is not protected/encrypted? External USB drives usually are not encrypted either. Using a TCG Opal drives, without a setup software such as Opal Lock, the drive is still not protected/encrypted. Diligent users should take advantage of Opal hardware and Opal enable software to secure their data. This is not only to protect your own data, but also your organizational data from lost or stolen. The stake of data loss is very high compare with the cost of Opal Lock software.

To lean more about the GDPR and CCPA, please reference to the links embedded. To start use the Opal Lock to protect your data, please click here to download and setup the Opal Lock software.

[1] Other terms are unintentional information disclosure, data leak, information leakage, and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice (black hats), organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media.

Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a “leak”.

Leave a Reply

Your email address will not be published. Required fields are marked *