Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
- 14.1 Introduction: Dilemmas of Cybersecurity Service Providers
- 14.1.1 Example: Dealing with Governmental Malware
- 14.2.1 Customer Data Handling
- 14.2.2 Information About Breaches
- 14.2.3 Threat Intelligence Activities
- 14.2.4 Vulnerability-Related Information
- 14.2.5 Data Sharing with Peers
- Quiz 14.2 5 questions
Well done!
You have completed (UPI) Chapter 14: Best Practices and Recommendations for Cybersecurity Service Providers!
Instruction
14.2.1 Customer Data Handling
Data handling is a fairly heavily regulated domain, especially if personal data is involved. Cybersecurity service providers operating under the regime of the General Data Protection Regulation (GDPR) of the EU have to fulfill the principles stated within, in particular transparency. Cybersecurity vendors need to inform their customers of what data they collect, how they process it, for what pu...