<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.secompass.au/blogs/tag/privacy/feed" rel="self" type="application/rss+xml"/><title>SeComPass = Security+Compliance+Assurance - SeComPass Industry Blog #Privacy</title><description>SeComPass = Security+Compliance+Assurance - SeComPass Industry Blog #Privacy</description><link>https://www.secompass.au/blogs/tag/privacy</link><lastBuildDate>Thu, 12 Mar 2026 16:13:07 +1100</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Why It's a Must to have an Assessment of Business CyberSecurity]]></title><link>https://www.secompass.au/blogs/post/Why-it-is-a-must-to-have-an-Assessment-of-Business-CyberSecurity</link><description><![CDATA[<img align="left" hspace="5" src="https://www.secompass.au/Images/AdobeStock_356869117.jpeg"/>SeComPass have created a light-weight framework to do a business CyberSecurity Assessment. Our industry expert consultants can provide focused advice to New Zealand businesses on their top cyber risks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Zzo1-uJPS1uHDNbVPL3RVA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MdWq-gPiToKEprczzhHrZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8HaBL_JsQQeoXAlqwmsQXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8HaBL_JsQQeoXAlqwmsQXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;font-size:11pt;color:inherit;">Why Assess Cybersecurity</span><br></p><div style="color:inherit;"><p style="font-size:11pt;">Cybersecurity is a hot topic. And we have seen big cybersecurity and privacy gaps in organisations who previously didn't have any compliance obligations. This is especially true for small businesses who hold a lot of confidential/personal/financial information or intellectual property (patents).</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;"><span style="font-weight:bold;font-size:11pt;color:inherit;">CyberSecurity for Businesses in NZ vs Australia</span></p><p style="font-size:11pt;">Currently in New Zealand, there are no security compliance obligations by authorities. Albeit in Australia, the Federal Government has mandated ISO27001 for any organisation to work with them. This will come down to New Zealand sooner rather than later, so be ready.</p><p style="font-size:11pt;">In Australia, the last few months have been quite challenging for the businesses where the breaches went to a new high, e.g., Optus and Medibank breaches among others.</p><p style="font-size:11pt;">In New Zealand also, the breaches have been touching a new high e.g.,&nbsp;<span style="font-size:11pt;color:inherit;">Mercury IT,&nbsp;</span><span style="font-size:11pt;color:inherit;">Pinnacle Health,&nbsp;</span><span style="font-size:11pt;color:inherit;">Air New Zealand,&nbsp;</span><span style="font-size:11pt;color:inherit;">Reserve Bank of New Zealand,&nbsp;</span><span style="font-size:11pt;color:inherit;">Waikato DHB (now a bit old),&nbsp;</span><span style="font-size:11pt;color:inherit;">New Zealand Stock Exchange.</span></p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;"><span style="font-weight:bold;">3 Benefits of doing ABC assessment</span></p><ul><li style="vertical-align:middle;"><span style="font-size:11pt;">Know your top business cybersecurity risks without breaking the bank.</span></li><li style="vertical-align:middle;"><span style="font-size:11pt;">Get an assessment aligned with an international framework&nbsp; (ISO27001).</span></li><li style="vertical-align:middle;"><span style="font-size:11pt;">Make sure you implement some easy ways to reduce the business cybersecurity risks.</span></li></ul><p style="font-size:11pt;"><br></p><p style="font-size:11pt;">SeComPass has been working with organisations in New Zealand, Australia and the US. When talking to small businesses, we felt that they didn't have a lot of money to spend on cybersecurity. So&nbsp;<span style="color:inherit;font-size:11pt;">SeComPass has specially created this assessment framework and as a result, ABC Assessment is a unique way to assess the gaps and risks, thus attaining a better level of understanding within days rather than weeks and months and without breaking the bank.</span></p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;"><span style="font-weight:bold;">Sign-up Process for ABC assessment</span></p><ul><li style="vertical-align:middle;"><span style="font-size:11pt;">We intake&nbsp; only 5 organisations&nbsp; every 3 months.</span></li><li style="vertical-align:middle;"><span style="font-size:11pt;">Once you are offered a place, we do an initial chat to get to know your specific needs as we don't take a cookie-cutter approach.</span></li><li style="vertical-align:middle;"><span style="font-size:11pt;">After the initial chat, we complete the ABC Assessment with the top management.</span></li><li style="vertical-align:middle;"><span style="font-size:11pt;">After that, we discuss the assessment results including the top 5 ways you can reduce the risks.</span></li></ul><p style="font-size:11pt;">&nbsp;</p></div><p><span style="font-size:11pt;color:inherit;">If you want to know more, you can register your interest by clicking below and know what it could mean to you and your business.</span></p><div style="color:inherit;"><div style="color:inherit;"></div></div></div>
</div><div data-element-id="elm_KgTOYQ9GSp6i3MJh1AszHw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_KgTOYQ9GSp6i3MJh1AszHw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_KgTOYQ9GSp6i3MJh1AszHw"] .zpbutton.zpbutton-type-primary{ background-color:#3004EA !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://survey.secompass.co.nz/zs/bqBcyU" target="_blank" title="Register Your Interest"><span class="zpbutton-content">Register your Interest.</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 30 Jan 2023 07:39:00 +1100</pubDate></item><item><title><![CDATA[Is Blockchain Technology GDPR Compliant?]]></title><link>https://www.secompass.au/blogs/post/Is-blockchain-technology-GDPR-compliant</link><description><![CDATA[<img align="left" hspace="5" src="https://www.secompass.au/blockchain.jpg"/>Blockchain Technology brings the ease of use but also brings the compliance challenge. This blog article talks about the GDPR compliance requirements for Blockchain technology and its application in crypto currencies like Bitcoin and Monero.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Zzo1-uJPS1uHDNbVPL3RVA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_Zzo1-uJPS1uHDNbVPL3RVA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MdWq-gPiToKEprczzhHrZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_MdWq-gPiToKEprczzhHrZw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_FH8kFeiRGDEV1t60mkRgkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FH8kFeiRGDEV1t60mkRgkQ"].zpelem-text { font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; border-radius:1px; } [data-element-id="elm_FH8kFeiRGDEV1t60mkRgkQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="font-size:11pt;"><span style="font-weight:bold;font-size:11pt;color:inherit;">Spoiler Alert: Whoever is thinking of using the blockchain in their technology and systems, needs to understand their compliance obligations especially GDPR.</span></p></div><div>The new privacy regulation by the European Union known as the General Data Protection Regulation (GDPR) &nbsp;took effect in 2018 and then NZ Privacy Act came into effect in 2020. But it seems that most of the companies are still in state of denial and burying their heads in the sand, waiting until the last moment and hoping for a miracle to happen where their governments will relinquish the alignment of the national legislation with those GDPR and NZ Privacy Act requirements.&nbsp;<br></div><div><div><br></div><div>While there are many privacy implications for various companies around the world, we are more interested in one particular GDPR case, namely in companies that offer solutions based on blockchain technology, given that it was one of the most emerging technologies in 2017. Many promising implementations have been catapulted the last years ranging from new cryptocurrencies, tokens, company shares representation, identity directory to copyright and intellectual property protection. Some of these new solutions should also meet the GDPR requirements if they are going to be used by European residents. From the above examples of blockchain technology implementations, let’s take a closer look at how cryptocurrencies, and in specific the leading cryptocurrency Bitcoin and the privacy oriented cryptocurrency Monero, are impacted by GDPR. While there are many requirements in GDPR we will look only at a few key requirements to show the impact of GDPR. </div></div></div>
</div><div data-element-id="elm_QrErtmrl9crPSI4OKOiYKw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_QrErtmrl9crPSI4OKOiYKw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_n3RubR7vlA7IxAAAbHmcVA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_n3RubR7vlA7IxAAAbHmcVA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4p--BAaLlpYwTbCzuIrrjw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4p--BAaLlpYwTbCzuIrrjw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_o9sHTJWF4OKCgMZ1DJRtXA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_o9sHTJWF4OKCgMZ1DJRtXA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Confidentiality</span></h2></div>
<div data-element-id="elm_kusH2OzEZw2VFe04HgI5gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kusH2OzEZw2VFe04HgI5gQ"].zpelem-text { font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; border-radius:1px; } [data-element-id="elm_kusH2OzEZw2VFe04HgI5gQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">According to GDPR you must have appropriate security to prevent the personal data you hold being accidentally or deliberately compromised (Article 5(1)(f) of the GDPR). Any information relating to an identifiable person who can be directly or indirectly identified in particular by reference to an identifier is considered personal data (GDPR article 4). This means that a crypto wallet address can be regarded as an identifier that directly relates to information on the blockchain of an individual. Bitcoin is fully traceable and doesn’t ensure confidentiality. If you know the wallet address – you can check the existing balance and all transactions history of anyone. Monero on the other hand, is designed with privacy in mind. Even if someone knows your wallet address, they cannot check your balance or transactions history.</span><br></p></div>
</div></div><div data-element-id="elm_oqeI1wrJjEQaI5F4Ji2R5g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oqeI1wrJjEQaI5F4Ji2R5g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"] .zpimage-container figure img { width: 500px ; height: 333.33px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"] .zpimage-container figure img { width:500px ; height:333.33px ; } } @media (max-width: 767px) { [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"] .zpimage-container figure img { width:500px ; height:333.33px ; } } [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/agile_small.jpg" width="500" height="333.33" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_sqMaZ3b2resTmqF3h9fxmA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_sqMaZ3b2resTmqF3h9fxmA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1hvpQJ7CVSWsES9yiEiJaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1hvpQJ7CVSWsES9yiEiJaw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_bMhEKiqF1zfbX59tX2Tcxw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_bMhEKiqF1zfbX59tX2Tcxw"].zprow{ border-radius:1px; margin-block-start:19px; } </style><div data-element-id="elm_4372NX_zLfipxQcyAZeIow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4372NX_zLfipxQcyAZeIow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JRPfoYksyiNjBoNbGhb4pQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JRPfoYksyiNjBoNbGhb4pQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Right to access</span></h2></div>
<div data-element-id="elm_tpu4vR5RQ9aWeRcLcaR64Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tpu4vR5RQ9aWeRcLcaR64Q"].zpelem-text { font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; border-radius:1px; } [data-element-id="elm_tpu4vR5RQ9aWeRcLcaR64Q"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; } </style><div class="zptext zptext-align-left " data-editor="true">According to GDPR Individuals have the right to access their personal data and supplementary information (see Articles 12 and 15 and Recital 63). Bitcoin meets this requirement as content is fully traceable and you can access your personal data and supplementary information anytime. The downside is that your data is not only for you accessible but for everyone. Monero, like bitcoin, is also fully traceable and you can access all your data at any time. But with Monero no one else than you can access your data. </div>
</div></div><div data-element-id="elm_8mAoQyi6x5lrSaD7PpHHew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_8mAoQyi6x5lrSaD7PpHHew"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4MB5iz6EjKFuT94EInt-Sg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_4MB5iz6EjKFuT94EInt-Sg"] .zpimage-container figure img { width: 350px ; height: 233.33px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4MB5iz6EjKFuT94EInt-Sg"] .zpimage-container figure img { width:723px ; height:482.00px ; } } @media (max-width: 767px) { [data-element-id="elm_4MB5iz6EjKFuT94EInt-Sg"] .zpimage-container figure img { width:415px ; height:276.67px ; } } [data-element-id="elm_4MB5iz6EjKFuT94EInt-Sg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/blockchain.jpg" width="415" height="276.67" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_X6TNrPNWLfXrmSIZOvYAZA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_X6TNrPNWLfXrmSIZOvYAZA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_pN1OYwn67y34DHsSvldNcA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_pN1OYwn67y34DHsSvldNcA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BFzYJlutDN-S2Erq8S7q8w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_BFzYJlutDN-S2Erq8S7q8w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_W2uvGkQ7RuIi_dQgoo3opw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W2uvGkQ7RuIi_dQgoo3opw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Right to erasure</span></h2></div>
<div data-element-id="elm_egUBP1tcuG4DxMvRwSX6BQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_egUBP1tcuG4DxMvRwSX6BQ"].zpelem-text { font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; border-radius:1px; } [data-element-id="elm_egUBP1tcuG4DxMvRwSX6BQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; } </style><div class="zptext zptext-align-left " data-editor="true">The GDPR introduces a right for individuals to have their personal data erased (see articles 6, 9, 12, 17 and Recitals 65, 66). This is also called the right to “be forgotten”. Meeting this GDPR requirement is impossible when using Bitcoin. In fact, blockchain has not been designed to “be forgotten”, but rather to remember all transaction data since the genesis of a blockchain. In Monero also the right to be forgotten is extremely simplified. If you want to be forgotten, just “delete” all your keys. </div>
</div><div data-element-id="elm_vxKM4EodkoUgE8_pnYc9UA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_vxKM4EodkoUgE8_pnYc9UA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div><div data-element-id="elm_G6fkpFPpQ3a_Fbs448y2Pg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_G6fkpFPpQ3a_Fbs448y2Pg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_RE6WcdpiZ4dLy8NcAFnBYQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RE6WcdpiZ4dLy8NcAFnBYQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_qpzGXNN0jN3-fSB_TqDZBQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qpzGXNN0jN3-fSB_TqDZBQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Right to rectification </span></h2></div>
<div data-element-id="elm_GSQHFKnS02rZeNZmFgFzag" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GSQHFKnS02rZeNZmFgFzag"].zpelem-text { font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; border-radius:1px; } [data-element-id="elm_GSQHFKnS02rZeNZmFgFzag"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; } </style><div class="zptext zptext-align-left " data-editor="true">The GDPR includes a right for individuals to have inaccurate personal data rectified, or completed if it is incomplete (see articles 5, 12, 16 and 19). Both cryptocurrencies do not meet this requirement, since both of them are subject to the second restrictive blockchain characteristic: immutability. This means that you cannot modify existing blocks in the chain as this will affect the control sum of all next blocks. While Monero strictly doesn’t meet this requirement, it doesn’t necessarily expose a risk since no one has visibility or can access your (wrong or incomplete) data. </div>
</div><div data-element-id="elm_DF0MB59lakeV5_K0wscT1w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_DF0MB59lakeV5_K0wscT1w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div><div data-element-id="elm_DHaAhkygeNyVRkVXjoIaKQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_DHaAhkygeNyVRkVXjoIaKQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3uLzxmBpMJOEH5RZhX3fTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3uLzxmBpMJOEH5RZhX3fTA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2nWvDXrNva8uBs68dV74_Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2nWvDXrNva8uBs68dV74_Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Privacy by design </span></h2></div>
<div data-element-id="elm_YRYAmWK6qSdIF9x_V4WmxA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YRYAmWK6qSdIF9x_V4WmxA"].zpelem-text { font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; border-radius:1px; } [data-element-id="elm_YRYAmWK6qSdIF9x_V4WmxA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-size:15px; font-weight:400; } </style><div class="zptext zptext-align-left " data-editor="true">GDPR requires you to consider and implement technical and organisational data protection measures and to integrate them into your processing activities during the design phase (article 25 GDPR). As for Bitcoin, it wasn’t developed with privacy in mind and any new application relying on Bitcoin will have to deal with this caveat. It’s worth noting that hundreds of other blockchain projects, whether launched via an ICO or not, have currently similar privacy problems. Monero on the other hand, was designed with privacy in mind. With the recent move to protect the blockchain against centralization and ASICS, they once again have shown and applied “privacy and security by design”.<br></div>
</div><div data-element-id="elm_g1BE4O8KkOa5JQxGuuljcA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_g1BE4O8KkOa5JQxGuuljcA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_72oW0hkfSYAw9t_o8x6_-Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_72oW0hkfSYAw9t_o8x6_-Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Conclusion</h2></div>
<div data-element-id="elm_ykS6ESopGydeNaNh6x-AwA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ykS6ESopGydeNaNh6x-AwA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>I<span style="font-size:15px;color:inherit;">n conclusion, applications based on block chain technology, such as Bitcoin, by default don’t meet GDPR requirements and will have to put extra effort to compensate for certain fundamental properties of blockchain technology such as transparency, immutability and recording to align their solutions with GDPR. Some, however, like Monero have been designed with privacy and security in mind and are more compliant with GDPR than others by default. Note that in this article we have only looked to a few GDPR requirements and that full compliance with GDPR would require many other technical and organisational measures to be considered.</span></p></div>
</div><div data-element-id="elm_aLtcWvPSN5EyxA79ZlCXJw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_aLtcWvPSN5EyxA79ZlCXJw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;">The discussion above is based on our experience and should open some discussion points to your next stand-up. If you have succeeded in using blockchain technology successfully while integrating compliance in the design process itself, please share with us and the world your revelations..&nbsp;<div><br></div><div><span style="font-weight:bold;font-style:italic;">If you want to know more about how we have done this with our customers and saved them effort, book a free consultation by clicking below.</span></div></div></div>
</div><div data-element-id="elm_xoCP4Mt1kA934H1olg8Leg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_xoCP4Mt1kA934H1olg8Leg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_xoCP4Mt1kA934H1olg8Leg"] .zpbutton.zpbutton-type-secondary{ background-color:#3004EA !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-secondary zpbutton-size-lg zpbutton-style-oval " href="https://booking.secompass.com" target="_blank" title="Book a Free Consultation"><span class="zpbutton-content">Book a Free Consultation.</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Dec 2021 14:07:00 +1100</pubDate></item><item><title><![CDATA[Do you need a Data Protection/Privacy Officer (DPO)]]></title><link>https://www.secompass.au/blogs/post/Do-you-need-a-Data-Protection-Officer21</link><description><![CDATA[<img align="left" hspace="5" src="https://www.secompass.au/Images/dpo_small.jpg"/>GDPR and New Zealand Privacy Act requires (in certain cases) companies to designate a data protection/privacy officer (DPO). Tailored to your privacy ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Zzo1-uJPS1uHDNbVPL3RVA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MdWq-gPiToKEprczzhHrZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_8HaBL_JsQQeoXAlqwmsQXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8HaBL_JsQQeoXAlqwmsQXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:18px;"><span style="color:inherit;">GDPR and New Zealand Privacy Act requires (in certain cases) companies to designate a data protection/privacy officer (DPO). Tailored to your privacy needs, SeComPass provides a Virtual Data Protection Officer (vDPO) service. The vDPO will support you by informing, advising, monitoring compliance and acting as your point of contact for the supervisory authorities</span></span><br></p><p><span style="color:inherit;"><span style="font-size:18px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14.08px;"><br></span></span></p></div>
</div><div data-element-id="elm_2NC8eAYX-4w-gpfjWyJVnA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_2NC8eAYX-4w-gpfjWyJVnA"] .zpimage-container figure img { width: 881px !important ; height: 866px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_2NC8eAYX-4w-gpfjWyJVnA"] .zpimage-container figure img { width:881px ; height:866px ; } } @media (max-width: 767px) { [data-element-id="elm_2NC8eAYX-4w-gpfjWyJVnA"] .zpimage-container figure img { width:881px ; height:866px ; } } [data-element-id="elm_2NC8eAYX-4w-gpfjWyJVnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/dpo-1.png" width="881" height="866" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_pxKkBEKFSxrZElm9gMHcSQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pxKkBEKFSxrZElm9gMHcSQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;">The flowchart above is based on our experience and should open some discussion points to your next stand-up. If you have implemented privacy successfully in your organisation while keeping the costs low, please share with us and the world your revelations.<div><br></div><div><span style="font-weight:bold;font-style:italic;">If you want to know more about how we have done this with our customers and saved them effort, book a free consultation by clicking below.</span></div></div></div>
</div><div data-element-id="elm_KgTOYQ9GSp6i3MJh1AszHw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_KgTOYQ9GSp6i3MJh1AszHw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_KgTOYQ9GSp6i3MJh1AszHw"] .zpbutton.zpbutton-type-primary{ background-color:#3004EA !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://booking.secompass.com" target="_blank" title="Book a Free Consultation"><span class="zpbutton-content">Book a Free Consultation</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 15 Dec 2021 14:07:00 +1100</pubDate></item><item><title><![CDATA[How to make Agile and Security Work together]]></title><link>https://www.secompass.au/blogs/post/Do-you-need-a-Data-Protection-Officer1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.secompass.au/agile_small.jpg"/>&nbsp;If you ask any random chosen person from the security industry you will very likely hear – “Agile and security don’t work together”.&nbsp; But we ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Zzo1-uJPS1uHDNbVPL3RVA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MdWq-gPiToKEprczzhHrZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_MdWq-gPiToKEprczzhHrZw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_7iH6gdFfRZye8K2Ea-vwXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_FH8kFeiRGDEV1t60mkRgkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FH8kFeiRGDEV1t60mkRgkQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">&nbsp;If you ask any random chosen person from the security industry you will very likely hear – “Agile and security don’t work together”.&nbsp;</span></p><p>But we think that <span style="font-style:italic;">Agile and Security can work together.</span> Let us discuss how we can make it work together.</p><p><br></p><p>Constant pressure from executives to deliver results faster at lower costs has made Agile to very popular the last years. Even the Australian Prime Minister recommended to use Agile methodology in government projects. But is Agile really so good? Or maybe &nbsp;there's a hidden catch?<br></p><div> The answer depends on who is being asked those questions.&nbsp;</div></div>
</div><div data-element-id="elm_n3RubR7vlA7IxAAAbHmcVA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_n3RubR7vlA7IxAAAbHmcVA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4p--BAaLlpYwTbCzuIrrjw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4p--BAaLlpYwTbCzuIrrjw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Ww6IdGAZMLc8I35zLFC4YQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ww6IdGAZMLc8I35zLFC4YQ"].zpelem-text { font-family:'Poppins',sans-serif; font-weight:400; line-height:22px; border-radius:1px; } [data-element-id="elm_Ww6IdGAZMLc8I35zLFC4YQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Poppins',sans-serif; font-weight:400; line-height:22px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div style="color:inherit;"><div><span style="color:inherit;">Here is why:</span><br></div></div></div><ul><li>Lack of Design&nbsp;<br></li><li>Lack of Security Architecture </li><li>Constant and Frequent Changes </li><li>Security is Considered &amp; Implemented as the Last Thing </li><li>No Security Owners within Agile Squads </li></ul></div>
</div></div><div data-element-id="elm_oqeI1wrJjEQaI5F4Ji2R5g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oqeI1wrJjEQaI5F4Ji2R5g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"] .zpimage-container figure img { width: 500px ; height: 333.33px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"] .zpimage-container figure img { width:500px ; height:333.33px ; } } @media (max-width: 767px) { [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"] .zpimage-container figure img { width:500px ; height:333.33px ; } } [data-element-id="elm_WZTN4RNHROT4vKcIK3CO3w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/agile_small.jpg" width="500" height="333.33" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_jxVNRldnOkgqYBW0rNl9mQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_jxVNRldnOkgqYBW0rNl9mQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Nl9TWSv6N05OfZ4OfkrW1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Nl9TWSv6N05OfZ4OfkrW1A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_D8lZlX5EHY7BikNs3bt67w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_D8lZlX5EHY7BikNs3bt67w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true">&nbsp;Since every Agile project is different, you could face one or all of these issues at once. Taking the above points&nbsp;<span style="color:inherit;">into consideration</span>, they may (and very often simply do) lead to a security cataclysm. The definition of the security cataclysm is very wide – from a security breach, through revoking the certification for the whole company (i.e., PCI-DSS), up to compromising a government agency. The belief that Agile and security cannot work together is so strong that it’s hard to find security experts who are willing to take the challenge and make it happen. <span style="font-weight:bold;">Fortunately</span>, there are a few things that we can do and may change that perception.<br><br>1. The first measure is to assign a security consultant to all agile squads. Let him/her attend all the stand ups, planning &amp; grooming session, retrospection meetings, and be responsible for security. This should allow him or her to address any security or compliance issues before they are implemented, in other words this is a preventive activity. The maximum successful ratio is one consultant per four agile squads.<br><br>2. But that is not enough. Security also has to work closely with the scrum master and together enforce design works – addressed as product backlog item (PBI’s). This second measure will allow the project to perform security reviews based on the designs. These early reviews will lower the cost of any required penetration testing activities later prior the “go live” event. You will need to assign a security assessment subtask to each PBI to perform a security review. By doing this, you should minimize the mitigation costs, and address immediately security &amp; compliance requirements. Another benefit from having a design is higher accuracy and better results from penetration testing. After 2 or 3 months, you should see the first results. Penetration testing should identify less vulnerabilities, less compliance failures to national or industry standards and the security posture should grow within your environment.<br><br>Let's say that with the above measures security can be agile. But you will say - it is expensive. Is it? Maybe. There is always a cost attached to improving security. But you can lower the costs by for example creating additional features i.e. a checkbox for penetration testing in JIRA. This will enable the team to coordinate release plan with penetration testing schedule, resulting in decreased number of engagements with a security company. You may encourage squad members to learn practices from the security consultant and introduce cross-quad security assessments. The cross-squad security assessment will also ensure the segregation of duties principle.<br><br>However, despite all propositions above, there is still one crucial thing missing. In this approach the security consultant doesn’t have a holistic view of the products and/or environment. This is key for security to be able to assess and provide valuable input to the project. Since that is not available in agile projects, the security consultant starts her/his engagement with a gap analysis against the desired security standard. The desired state and input from some architects is all (s)he needs. Reassessing the gap from time to time (i.e., every 6 months) is recommended here as projects requirements and the desired state change frequently&nbsp;<span style="color:inherit;">in agile</span>.<br><br>The proposed solutions above are not based on the laws of physics, but should bring security and the agile dogma closer to each other. If you have succeeded in bringing those two enemies together by other means please share with us and the world your revelations.<div><br></div><div><span style="font-weight:bold;font-style:italic;">If you want to know more about how we have done this with our customers and saved them effort, book a free consultation by clicking below.</span></div></div>
</div><div data-element-id="elm_k9AmbwKHKXuybm5f0FnjXg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_k9AmbwKHKXuybm5f0FnjXg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_k9AmbwKHKXuybm5f0FnjXg"] .zpbutton.zpbutton-type-secondary{ background-color:#3004EA !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-secondary zpbutton-size-lg zpbutton-style-oval " href="https://booking.secompass.com" target="_blank" title="Book a Free Consultation"><span class="zpbutton-content">Book a Free Consultantion </span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 15 Dec 2021 14:07:00 +1100</pubDate></item></channel></rss>