Three ways in which GDPR impacts authentication

被引:1
|
作者
McDowell, Brett [1 ]
机构
[1] FIDO Alliance, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 02期
关键词
Online systems - Sensitive data;
D O I
10.1016/S1361-3723(19)30019-3
中图分类号
学科分类号
摘要
The General Data Protection Regulation (GDPR) has been enforced across the European Union (EU) since late May, and is widely considered the single most significant change to data protection law in two decades, impacting a countless number of organisations across the globe that collect and process information from EU citizens.1 This very much includes those in charge of online authentication, given the sensitive nature of the data being protected by those authentication systems, and the regulatory consequences of providing inadequate protections for that data. The General Data Protection Regulation (GDPR) is widely considered the most significant change to data protection law in two decades, impacting organisations across the globe. This includes those in charge of online authentication. Businesses previously focused on implementing informed consent to comply with the GDPR need to also look at implementing stronger authentication that improves their users’ experience while complying with the GDPR's rigorous requirements, explains Brett McDowell of the FIDO Alliance. © 2019 Elsevier Ltd
引用
收藏
页码:9 / 12
相关论文
共 50 条
  • [1] Historicity of the ways in which knowledge production impacts practice
    Coelho de Souza Padilha, Maria Itayra
    [J]. REVISTA LATINO-AMERICANA DE ENFERMAGEM, 2017, 25
  • [2] THREE WAYS IN WHICH LOGIC MIGHT BE NORMATIVE
    Steinberger, Florian
    [J]. JOURNAL OF PHILOSOPHY, 2019, 116 (01): : 5 - 31
  • [3] HOW GDPR IMPACTS ENGINEERING
    Shah, Agam
    [J]. MECHANICAL ENGINEERING, 2018, 140 (10) : 24 - 24
  • [4] Three ways in which midline regions contribute to self-evaluation
    Flagan, Taru
    Beer, Jennifer S.
    [J]. FRONTIERS IN HUMAN NEUROSCIENCE, 2013, 7
  • [5] GDPR Compliance IoT Authentication Model for Smart Home Environment
    Merzeh, Hisham Raad Jafer
    Kara, Mustafa
    Aydin, Muhammed Ali
    Balik, Hasan Huseyin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (03): : 1953 - 1970
  • [6] A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR
    Blue, Juanita
    Furey, Eoghan
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018), 2018,
  • [7] WHICH WAYS UP
    STIEGLER, SA
    [J]. INTERNET WORLD, 1994, 5 (08): : 8 - 8
  • [8] How does the GDPR impacts real estate transactions?
    Gutiu, Simona
    [J]. BUILDING AN ADAPTED BUSINESS LAW, 2022, : 114 - 122
  • [9] Objection, purpose and normality: three ways in which the courts have inhibited safeguarding
    Hewitt, David
    [J]. JOURNAL OF ADULT PROTECTION, 2012, 14 (06): : 280 - 286
  • [10] Stay wet or else:: three ways in which plants can adjust hydraulically to their environment
    Maseda, Pablo H.
    Fernandez, Roberto J.
    [J]. JOURNAL OF EXPERIMENTAL BOTANY, 2006, 57 (15) : 3963 - 3977