{"id":1715,"date":"2010-06-10T00:00:00","date_gmt":"2010-06-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/10\/ireland-considers-detailed-data-loss-disclosure-guidelines\/"},"modified":"2021-12-30T11:39:53","modified_gmt":"2021-12-30T11:39:53","slug":"ireland-considers-detailed-data-loss-disclosure-guidelines","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/10\/ireland-considers-detailed-data-loss-disclosure-guidelines\/","title":{"rendered":"Ireland considers detailed data loss disclosure guidelines"},"content":{"rendered":"<p>The proposed code of practice has been published by the Office of the Data Protection Commissioner on its Web site and is open for public comment through June 18.  The code of practice would require organizations to report a breach within two working days with some exceptions if strong security measures are implemented.  All breaches that result in the loss of personal data affecting more than 100 people would have to be reported unless the personal data was encrypted to a &#8220;high standard&#8221; with a strong password and that password had not been compromised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In comparison, the U.K.&#8217;s disclosure guidelines are less specific than the proposed Irish code of practice, Malcolm said.  However, the U.K.&#8217;s Information Commissioner does expect organizations to report serious data breaches, he said.<\/p>\n<p>In April, the U.K. Information Commissioner for the first time gained the power to fine organizations for violating the Data Protection Act.  The European Union has a data breach disclosure law on the books, but it only applies to telecommunication companies.<\/p>\n<p>http:\/\/news.idg.no\/cw\/art.cfm?id=21BB489B-1A64-6A71-CE1333F9221EF072<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1715","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1715"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1715\/revisions"}],"predecessor-version":[{"id":4202,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1715\/revisions\/4202"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}