• Expert Comments
  • Security Articles
  • News
  • Study & Research
  • How To
  • ISBuzz Expert Panel
    • InfoSec Expert Biographies
  • Security Videos
  • Security Education
  • Information Security Buzz

    Information Security Buzz

--

  • April 22, 2018
  • Follow us on Facebook
  • Follow us on Twitter
  • Follow us on YouTube
  • Follow us on Pinterest
  • Follow us on Linkedin
  • Events and Conferences
  • InfoSec Companies
  • InfoSec Training Providers
  • Cyber Insurance Providers
  • Advertise With Us
  • Free Resources
  • home
  • Hacked
  • IoT
  • Cloud Security
  • Mobile Security
  • Network Security
  • Application Security



  • Information Security Buzz
  • Expert Comments
  • Security Articles
  • News
  • Study & Research
  • How To
  • ISBuzz Expert Panel
    • InfoSec Expert Biographies
  • Security Videos
  • Security Education

Headline Grabbing Proclamation That Teenagers Have Right To Be Forgotten Already Enshrined Under GDPR

By Richard Lack
May 19, 2017

Following the news that Prime Minister Theresa May has announced that Facebook users will have the right to permanently delete information about them before they turned 18, Richard Lack, EMEA Managing Director at Gigya commented below.

Richard Lack, EMEA Managing Director at Gigya:

“Mrs May’s headline grabbing proclamation that teenagers will be afforded the right to be forgotten on social media platforms is interesting, since this right is already enshrined in the EU’s new General Data Protection Regulation from May 25th 2018, which will be signed into UK law and which Elizabeth Denham, the UK Information Commissioner has already stated will be “essentially equivalent” in the safeguards it offers post Brexit, and regardless of age.

“Equally, the acceptability of e-signatures was settled under UK Law since the Electronic Communications Act, which is now 17 years passed. During this period the business world has witnessed a mass extinction of the fax machine, while the failed and frustrating Government Gateway is cited globally as an example of how not to design and online service. Hint – it’s not ‘online’ if you need to activate by post.”


OUR INFORMATION SECURTIY NEWS CHANNEL





RECOMMENDED CONTENTS






Recent Posts

  • cyber-attack-3-1-165x60.jpg
    SANS Experts Share Five Most Dangerous New Attack Techniques
    SANS 
  • it-governance-165x60.jpg
    Teen Charged In Nova Scotia Government Breach
    Aaron Zander
  • Encryption-1-165x60.jpg
    WinMagic’s Latest Software Delivers Unified Encryption And Key Management With…
    WinMagic
  • Cyber-fraud-165x60.jpg
    Asia And Middle East Are Hotbeds For Malicious Cyber Activity
    Chris Doman
  • data-protection-7-165x60.jpg
    Data Visibility: The Antidote To Snake-Bites
    Matthias Maier

InfoSec Jobs From ISbuzz Dot Jobs
What Is Extreme File Transfer (XFT)?
Previous
Adylkuzz Cyrptocurrency Mining Malware
Next

isbuzz logo

Information Security Buzz (aka ISBuzz News) is an independent resource that provides the best in breaking news for the information security community.


Follow Us

Connecting InfoSec with News

ABOUT US

CONTACT US

CONTRIBUTING AUTHORS

Connecting You with InfoSec

ADVERTISE WITH US

BE PART OF OUR INFOSEC AUTHOR COMMUNITY

DIRECTORY LISTING (INFOSEC COMPANIES TO WATCH)

PUBLISH YOUR INFOSEC EVENT OR CONFERENCE

TRENDING THIS WEEK

  • March 2018’s Most Wanted Malware: Cryptomining Malware That Works Outside…
    Check Point
  • SANS Experts Share Five Most Dangerous New Attack Techniques
    SANS 
  • Botnets Remain A Persistent Cyber Threat
    CenturyLink
  • Russian Cyber Threat
    Security Experts
Back to top
  • Expert Comments
  • Security Articles
  • News
  • Study & Research
  • How To
  • ISBuzz Expert Panel
  • Security Videos
  • Security Education

Copyright © 2016 ISBuzz News.