{"id":482,"date":"2018-04-09T08:00:59","date_gmt":"2018-04-09T06:00:59","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=482"},"modified":"2020-07-24T12:20:56","modified_gmt":"2020-07-24T10:20:56","slug":"general-data-protection-regulation","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/","title":{"rendered":"General Data Protection Regulation \u2013 is your protection in place?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-480 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png\" alt=\"iStock-534223551\" width=\"400\" height=\"266\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/istock-534223551.png 400w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/istock-534223551-300x200.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><span style=\"color: #626161;\">The EU General Data Protection Regulation (EU GDPR) takes effect on May 25, 2018, and hardly a day goes by without some news about it \u2013 and that&#8217;s the way it should be! As demonstrated by a DSAG member survey of SAP users just a few weeks ago, only just over half of all the companies (53%) have a roadmap. To say nothing of full implementation of the new requirements.<\/span><\/p>\n<p><span style=\"color: #626161;\">Michael Muellner, Head of Security &amp; Compliance at AKQUINET, discusses helps to make this topic accessible to you by building a bridge from the statutory requirements to steps in operations and concrete tips.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #626161;\"><strong>Mr. M\u00fcllner, take one look at the status of companies with regard to the GDPR and you might get the impression that many people have massively underestimated this issue. Is the situation really that dramatic?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"> <em>\u201cFrom an Austrian and a German perspective, companies have a crucial advantage that plays right into their hands: The fact that our previous legal situation has already been relatively strict as compared to the rest of Europe. This means that companies that have kept up-to-date in the past with respect to the relevant data protection regulations valid at that time have a much easier time of closing the gap to the new legal situation as compared with companies that have largely ignored this subject.\u201d<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Naturally, data protection is not a topic that affects companies&#8217; SAP areas alone. Why is it still important for SAP decision makers to keep the key aspects of the new regulation on their radar?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"> <em>\u201cIt is not a surprise that data protection affects companies as a whole. However, a great deal of personal data at companies is processed in SAP systems in particular, automatically putting the spotlight on these systems. This is why the SAP Security &amp; Compliance Team at AKQUINET is specifically concentrating on what the regulation means for our customers&#8217; SAP systems and users.\u201d<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>We could probably spend days talking about the various stops on the way to compliance with the GDPR. Let&#8217;s walk things back a bit, though. What is the basic idea behind the new regulation?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"> <em>\u201cThe EU considers the basic idea behind the changes to the law as a way to provide end users with transparency where their personal data is concerned. The idea is to ensure that companies no longer permitted to save, process or share personal data any way they want.<\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> What this means for us now is the following: Everyone has a right to request information on which personal data is available to a respective company and to request that incorrect data is adjusted or request that personal data be deleted. If there is no longer a purpose or legal basis for the company to keep the data for any longer.\u201d<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Hardly a day goes by now without a newsletter about the GDPR. Why is this such a hot-button issue right now and nearly impossible to avoid?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;That&#8217;s an easy one: penalties! Noncompliance with the statutory requirements brings penalties of up to 4% of a company&#8217;s revenues. Such a high penalty has certainly not been seen in this context \u2013 not even in Austria or Germany. The authorities have announced that they intend to strictly enforce the regulation. Of course, the leading case will show us what this means in practice.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>How can companies identify whether the information in their systems is considered personal data under the EU GDPR?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;This is actually the first question that customers ask us. There are three crucial components you can use to figure this out:<\/em><\/span><br \/>\n<span style=\"color: #626161;\"> <em><strong>1) Processing component<\/strong><\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> Is data processed fully or partially automatically or not automatically saved in a file system? If no, the functional area of application of the GDPR is not affected and the test ends here.<\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> <strong>2) Content component<\/strong><\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> Is there data that refers to a (living) person or that can be connected with a person? Some examples of this typically include names, addresses, birth dates, or sometimes information about religion or other particularly sensitive information. If no, then you have anonymous or anonymized data that is not subject to the GDPR.<\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> <strong>3) Identity component<\/strong><\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> Is the person to whom the data refers identified or is it likely that one could generally identify the person based on the information? Specifically, could you infer who the specific person is based on the data under the content component. If no, then you again have anonymous or anonymized data that is not subject to the GDPR.<\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> If the answer to this three questions is &#8220;YES&#8221;, then this is personal data within the meaning of Article 4 (1).<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><em>The approach using these three components has been tried and tested to help our customers separate the wheat from the chaff with respect to data stored in their SAP systems.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Now, the GDPR is naturally not restricted to collection or processing of personal data. It provides clear guidelines about what must happen in the case of lost or stolen data. What is your advice for companies?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;It is only possible to quickly report a data loss or theft from a company to the authorities in good time if the situation has been actually identified. In particular, unauthorized data outflows containing personal data from a core system must therefore be monitored reliably. This also applies to read-only access to data!<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><em>With respect to data leakage prevention, customers using our SAST SUITE have two modules that provide ideal support: SAST Download Management and SAST HCM Read Access Monitoring.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Why is it important to log read-only accesses of HR data, too?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;Privileged users in an SAP system, like administrators, need full access to sensitive data, including sensitive employee data. An appropriate &#8220;Emergency User Concept&#8221; can therefore provide an audit-proof way to document when data is opened, edited and downloaded. This is often not the case at companies with regard to purely displaying SAP HCM data. The lack of logs mean that confidential personal data is not protected here. The module HCM Read Access Monitoring in our SAST SUITE eliminates this vulnerability and in turn helps make data loss or forwarding much more difficult.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>The SAP standard also offers a number of features for protecting SAP systems from data theft. Isn&#8217;t this protection enough for most companies?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;The SAP standard offers rather modest options, especially when you consider that data protection must be for the company as a whole. This means that personal data in accordance with the GDPR is not the only critical data in SAP systems. That list also includes vendor data, company data like financial data or prices, and of course technical drawings or formulations. And these must also be protected, meaning that companies must be able to prevent undesired access to and especially downloads of this data.<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><em>By contrast, the SAST Download Management allows companies to detect file downloads above a defined size and contain certain key words such as &#8220;Price List&#8221;, the &#8220;$&#8221; sign or others, and whether data is sent to certain e-mail addresses. And this all takes place in real time. For example, our customers have the option to take immediate action in response. This is because you can immediately identify who is trying to download what and when. Of course, there is no such thing as 100% protection against data theft. Nevertheless, we can greatly limit the likelihood of data leakage and in the worst case scenario immediately identify the guilty party.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>In articles about the GDPR, you often read about concepts such as &#8220;privacy by design&#8221; and &#8220;privacy by default&#8221;. What is this exactly?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;That just means that the technology is designed in a way that makes it easier to protect data, for example via data protection-friendly default settings. Or in other words: Privacy and data protection are embedded throughout the entire life cycle of technologies, from the early design stage to their deployment, use and ultimate disposal.<\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> This is a statement that shows you just how far-reaching the issue of data protection will be for all business done by a company and that the issue is not exclusively relevant to IT.<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><em><strong>My tip<\/strong> is therefore to set up a process to implement all the obligations in good time and to think about both privacy and data protection right from the start when creating and operating data processing systems, while always aiming to follow the principle of minimizing data.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Is there anything else you&#8217;d like to pass on to us before we finish up?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;There is something that is not limited to the SAP area and is relevant for the whole company. That is to maintain a directory containing all processing activities. What do I mean by that? <\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em>The responsible persons should maintain a directory that tracks &#8220;processing activities under its responsibility&#8221;. The purpose is to create a transparent overview of all personal data at a company, for use by both internal and external auditors. <\/em><\/span><br \/>\n<span style=\"color: #626161;\"><em> For example, such an index should cover which data is processed using which processing activities and for which purposes. This document will play a central role in upcoming audits, no matter whether you create it in an Excel file or use a database.<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><em><strong>A tip from our experience:<\/strong> Adding a column that directly links you to the relevant application where the data is found has proven to be useful again and again. This makes it considerably easier for companies to answer incoming questions as to where, across various system, you can find the data about a specific person.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>What about the nearly 50% of companies that said they do not yet have a mature GDPR roadmap? How can you and your colleague help?<\/strong><\/span><br \/>\n<span style=\"color: #626161;\"><em>&#8220;First, we recommend evaluating the degree of maturity and to then develop a company-specific GDPR catalog of actions based on this. This is followed by an identification of the necessary actions and, of course, we\u2019re also happy to support you to put them into operation.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Thank you for talking with us and providing some really helpful insights.<\/strong><\/span><\/p>\n<h6><span style=\"color: #626161;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-481\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/michaelmc3bcller_akquinet-e1522922003201.png\" alt=\"MichaelM\u00fcller_akquinet\" width=\"130\" height=\"172\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/michaelmc3bcller_akquinet-e1522922003201.png 381w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/michaelmc3bcller_akquinet-e1522922003201-227x300.png 227w\" sizes=\"auto, (max-width: 130px) 100vw, 130px\" \/><\/span><br \/>\n<span style=\"color: #626161;\"> Michael Muellner<\/span><br \/>\n<span style=\"color: #626161;\"> Head of Security &amp; Compliance Services at AKQUINET (Austria)<\/span><\/h6>\n<p><span style=\"color: #626161;\">You&#8217;d like more tips and recommendations for the General Data Protection Regulation? Take advantage of an opportunity to discuss this with us, for example at our <a href=\"https:\/\/www.akquinet.de\/en\/sap-webinars\" target=\"_blank\" rel=\"noopener noreferrer\">GDPR webinar<\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The EU General Data Protection Regulation (EU GDPR) takes effect on May 25, 2018, only just over half of all the companies (53%) have a roadmap. To say nothing of full implementation of the new requirements. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[25,156,80],"class_list":["post-482","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-cyber-attack","tag-cyber-security","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>General Data Protection Regulation \u2013 is your protection in place?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"General Data Protection Regulation \u2013 is your protection in place?\" \/>\n<meta property=\"og:description\" content=\"The EU General Data Protection Regulation (EU GDPR) takes effect on May 25, 2018, only just over half of all the companies (53%) have a roadmap. To say nothing of full implementation of the new requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-09T06:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T10:20:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"General Data Protection Regulation \u2013 is your protection in place?\",\"datePublished\":\"2018-04-09T06:00:59+00:00\",\"dateModified\":\"2020-07-24T10:20:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/\"},\"wordCount\":1700,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/istock-534223551.png\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"SAP Security\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/\",\"name\":\"General Data Protection Regulation \u2013 is your protection in place?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/istock-534223551.png\",\"datePublished\":\"2018-04-09T06:00:59+00:00\",\"dateModified\":\"2020-07-24T10:20:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/istock-534223551.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/istock-534223551.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/09\\\/general-data-protection-regulation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General Data Protection Regulation \u2013 is your protection in place?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"General Data Protection Regulation \u2013 is your protection in place?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/","og_locale":"en_US","og_type":"article","og_title":"General Data Protection Regulation \u2013 is your protection in place?","og_description":"The EU General Data Protection Regulation (EU GDPR) takes effect on May 25, 2018, only just over half of all the companies (53%) have a roadmap. To say nothing of full implementation of the new requirements.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/","og_site_name":"SAST BLOG","article_published_time":"2018-04-09T06:00:59+00:00","article_modified_time":"2020-07-24T10:20:56+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"General Data Protection Regulation \u2013 is your protection in place?","datePublished":"2018-04-09T06:00:59+00:00","dateModified":"2020-07-24T10:20:56+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/"},"wordCount":1700,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png","keywords":["Cyber Attack","Cyber Security","SAP Security"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/","name":"General Data Protection Regulation \u2013 is your protection in place?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png","datePublished":"2018-04-09T06:00:59+00:00","dateModified":"2020-07-24T10:20:56+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/istock-534223551.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/09\/general-data-protection-regulation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"General Data Protection Regulation \u2013 is your protection in place?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=482"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/482\/revisions"}],"predecessor-version":[{"id":1283,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/482\/revisions\/1283"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}