logo

Data Protection Regulations

Evaluate the different discovery rules for the United States and European Union under the General Data Protection Regulation (GDPR).

7 Pages1026 Words82 Views
   

Added on  2023-04-22

About This Document

This document discusses the General Data Protection Regulation (GDPR) and its principles, as well as the challenges faced by EU and US investigators during e-discovery investigations. It covers the treatment of EU investigators and the basic principles of GDPR, including integrity and confidentiality, storage limitations, accuracy, data minimization, purpose limitations, and lawfulness, fairness, and transparency. The challenges of cross-border data transfer and compliance obligations are also discussed.

Data Protection Regulations

Evaluate the different discovery rules for the United States and European Union under the General Data Protection Regulation (GDPR).

   Added on 2023-04-22

ShareRelated Documents
Running head: DATA PROTECTION REGULATIONS
Data Protection Regulations
Name of the Student
Name of the University
Author Note:
Data Protection Regulations_1
2DATA PROTECTION REGULATIONS
Table of Contents
1 Introduction...................................................................................................................................3
2.1 General Data Protection Regulation..........................................................................................3
2.2 Treatment of European Union (EU) investigators e-discovery investigation...........................3
2.3 Basic principles under the General Data Protection Regulation of 2018..................................4
2.4 Challenges faced by both EU and U.S. investigators................................................................5
3 Conclusion....................................................................................................................................5
4 Reference......................................................................................................................................6
Data Protection Regulations_2
3DATA PROTECTION REGULATIONS
1 Introduction
The paper intends to focus on the general data protection regulations which saves the data
from any illegal activities. The paper will also present the opinion of the European Opinion
investors about the data handling of the citizens (Finklea & Theohary, 2015). The fundamental
principles of the GDPR will be also stated in the paper. The challenges faced by EU and US
investors for transportation of e-discovery evidence across international borders will be
presented in this paper as well.
2.1 General Data Protection Regulation
The General Data Protection Act activated in May 25th 2018, for the protection of
personal data against the illegal data alteration. This act is very much helpful for the protection
of information from the cyber criminals. The growth and development of the organization
depends upon the data protection protocols followed by the organization as data is considered as
an asset in most of the global organizations in the recent years.
2.2 Treatment of EU investigators e-discovery investigation.
The EU investors treats all the data of the citizens with the help of a legal framework in
the first place during the electronic discovery investigation process. Their second option is the
European Data Protection Directive which is also very much effective during the transportation
of data between the citizens of communities (Philouze, 2017). The standard contractual clauses
are also used by the EU investors for the protection of the personal and sensitive data of the
citizens.
Data Protection Regulations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Right to Privacy for EU Citizens
|9
|1697
|445

APA and GDPR | Professional Computing Practice
|8
|2533
|37

Importance of General Data Protection Act in Contemporary Management Theory at PS COUTURE LTD
|8
|2250
|105

Professional Veterinary Nursing Responsibilities
|5
|732
|49

Managing Information System - Desklib
|10
|2915
|386

Sample Assignment on Cyber security
|42
|14266
|35