BitDepthFeatured

Building a company data protection regime

4 Mins read

Above: Veneto’s Julian Hayes.

BitDepth#1404 for May 01, 2023

“Now is the key time to prepare, to set the groundwork in implementing a good data protection and cybersecurity strategy in anticipation for a change in the regulatory environment,” said Julian Hayes, Managing Director of Veneto Privacy Services, based in Dublin, Ireland.

Hayes has done consultancies in Jamaica when businesses in that country came to terms with the robust legislation in place to protect data and customers.

Jamaica brought its Data Protection Act into law in June 2020 and by December 2021 had appointed Celia Barclay as its first Information Commissioner.

Jamaica gave businesses operating in that country two years to become compliant and register with the Office of the Information Commissioner.

During that time, Barclay will be bringing the operations of her new office into force.

“The biggest thing that concerns businesses in Jamaica is not being prepared for a cyberattack,” Hayes explained.

“There’s an expectation from customers that the business is fully up to speed and prepared to prevent cyber attacks because of regulatory fines.”
“Criminal attacks are a primary threat, but the reputation of the business is important, and it’s critical to maintain the best position to respond to cyber attack.”

Jamaica’s data protection act legislates fines up to $222,000 (JA$5m) and prison terms of up to ten years for infractions under its laws.

Barbados appointed its Data Protection Commissioner in July 2021.

Trinidad and Tobago’s Parliament recently granted the Government an 18-month extension – over the objections of the Opposition – to prepare amendments to local data protection law. It’s been 12 years since the first laws for data protection were partially proclaimed.

Among the services, that Veneto provides for businesses is the Data Protection Officer as a Service.

“Some companies obviously have a preference to have an internal officer, but
depending on the sector that you’re in, a services company can provide the services of a data protection officer.”

It’s been 12 years since Trinidad and Tobago partially proclaimed its Data Protection Act, the government is currently working toward completion in 18 months.

Veneto’s remote officers monitor compliance within an organisation, and provide solutions to enhance privacy rights, training employees, minimising the data that the business collects and implementing appropriate security controls across the data sets that the company is using.

When Veneto discusses cybersecurity services, there’s usually some awareness of potential weaknesses and liabilities.

“Clients are already looking to get a solution. They might want a better briefing on the law and what it means for their sector specifically. Whether it’s the banking sector or a retail operator, there will be different data protection risks relating to the data they are handling.”

“They are definitely preparing and not at the wait-and-see stage. They want to make an investment but they don’t want to be oversold.

“I’ve talked to two business in the region and they don’t want to be oversold on something that’s going to exceed their needs. They want a critical baseline in good monitoring and detection capability for threats and then have very efficient countermeasures for any sustained attacks, but also they often seek advice for basic business continuity activities like backups and information to be able to keep the business running if they were to suffer a serious attack.”

“You need to make an investment that’s suitable to the proportion of risk that you face. If you’re a medical company and you’re handling very sensitive medical data for hundreds of thousands of patients, you’re going to be a prime target. Here in Ireland, we had a major cyberattack three years ago on the state health care service and they shut down the health service for about two weeks.”

Hayes has found that many businesses overlook affordable, straightforward protections for their networks that are relatively easy to implement.

“On the last project I did, there was a big issue around endpoint encryption. There was no device encryption for laptops and there were a lot of staff working remotely with no protection for the laptop if it got lost or stolen. The data could be easily taken off the drive if the device was taken.”

“We recommended installing very basic endpoint security which didn’t amount to any more than US$15 per license for each machine. But that gave that assurance that information was backed up and the device was secured.”

Illustration by goodstocker/DepositPhotos

“Another client who operates remotely had many of their employees on the road and they weren’t using secure connections. They might be using Wi-Fi in public places or hot-spotting off their phone but never over an encrypted communication channel.”

“So we implemented the rollout of a Virtual Private network (VPN).
Again very basic. End user cost is like US$5 for each user, but these are excellent protection measures that can thwart most local attacks.”

Hayes recommends that the first step for businesses is to map the processes within the organisation.

“If you’re a pharmacy provider, you have retail presence, you’re going to have data collection within the stores, you’re going to be receiving prescription information from doctors. Map each of these processes and be clear which are low-risk and which are high-risk.”

“If you have CCTV in the store, that’s also capturing personal data with images. You need to understand where it’s being stored who has access to it and how secure it is.”

“Map your organisation’s data processing, make a basic worksheet so you can understand where you are and can explain what you do.”

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Press Releases

mMoney and Sign Global partner for Barbados asset distribution system

1 Mins read
A cornerstone of the partnership is the development of Bajan Chain, a sovereign Layer 2 blockchain,
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
BitDepthFeatured

Jamaica's digital transformation journey

3 Mins read
“Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan.”
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

What's happening with regional data protection legislation?

0
Share your perspective in the comments!x
()
x