{"id":10920,"date":"2019-04-23T11:28:22","date_gmt":"2019-04-23T09:28:22","guid":{"rendered":"https:\/\/www.overkiz.com\/?p=10920"},"modified":"2021-09-09T06:34:00","modified_gmt":"2021-09-09T04:34:00","slug":"data-collection-sharing-and-security-what-does-the-law-say","status":"publish","type":"post","link":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/","title":{"rendered":"Data collection, sharing and security: what does the law say?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Development of the Internet of Things, if it proves to be a provider of innovative and practical solutions for a vast majority of users, both individual and professional, raises an ethical question, which is the source of many debates; what is exactly the case with personal data? Who can collect this data? To what extent is it possible to share this data? What are the real risks involved? <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Why a data security law?<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even if the discussion and debate seem endless, the law has decided. Of course, a text of law is made to be enriched as people evolve over time. And it is clear that the combination of <a href=\"https:\/\/www.missionsecure.com\/markets\/smart-cities\">smart cities and cyber security<\/a> or the opposition of transparency and intimacy will continue to fuel conversations. However, the legislator must set rules to standardize and facilitate exchanges, regulate the practice and implementation of the Internet of Things, to enable everyone to better understand the framework within which they operate. Some may find the rules reassuring when others may perceive them as restrictive. And we return inexorably to the eternal philosophical debate between freedom and security, even if these two notions are not always intended to be opposed. With the help of <a href=\"https:\/\/orca.security\/partners\/technology\/amazon-web-services-aws\/\">AWS cloud security scanner<\/a> one can get a better security system and protect all their data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>What personal data should be protected?<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To understand the scope of the law, it is necessary to start by recognizing a personal data. Under French law, personal data is information that makes it possible to identify a natural person precisely, whether the information is direct or not. Directly, we can see what it is: surname, first name, social security number, photo, social network profile, driving license, etc. In practice, the debate is more about the indirect nature of information. A telephone number is personal information that can be indirectly linked to its owner. So far so good. But what about daily habits such as those recorded in a connected watch, a home automation box, or an on-board computer in a car? Or even data entrusted to his employer or to a company via the Internet?<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>What does the Data Protection Act say?<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The law applies to everyone in the European Union, and includes different aspects:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Enhanced consent and the right to transparency. All requests for personal data must be explicitly justified. They can be rectified at any time and it is possible to simply object to their use. It must be possible to access it in a simple and clear way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; The right to data portability. Everyone must be able to retrieve their data and transfer it to the right person.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; The right to forget. Everyone must be able to delete their data at any time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; The right to notification. In the event of a data breach, the data owner must be notified as soon as possible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; The right to compensation for material or moral damage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; The group actions. In case of legal recourse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies are subject to a general security and confidentiality obligation as well as an obligation to provide information. You should also know that the law has defined the numerical majority at 15 years of age. From this age, parental consent is no longer required.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Development of the Internet of Things, if it proves to be a provider of innovative and practical solutions for a vast majority of users, both individual and professional, raises an ethical question, which is the source of many debates; what<\/p>\n","protected":false},"author":3,"featured_media":10915,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"class_list":["post-10920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data collection, sharing and security: what does the law say? - Overkiz<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data collection, sharing and security: what does the law say? - Overkiz\" \/>\n<meta property=\"og:description\" content=\"Development of the Internet of Things, if it proves to be a provider of innovative and practical solutions for a vast majority of users, both individual and professional, raises an ethical question, which is the source of many debates; what\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\" \/>\n<meta property=\"og:site_name\" content=\"Overkiz\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-23T09:28:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-09T04:34:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"498\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasna Musanovic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasna Musanovic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\"},\"author\":{\"name\":\"Jasna Musanovic\",\"@id\":\"https:\/\/www.overkiz.com\/#\/schema\/person\/d6ebf05846af98bc38c0e261fe76f103\"},\"headline\":\"Data collection, sharing and security: what does the law say?\",\"datePublished\":\"2019-04-23T09:28:22+00:00\",\"dateModified\":\"2021-09-09T04:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\"},\"wordCount\":551,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.overkiz.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg\",\"articleSection\":[\"NEWS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\",\"url\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\",\"name\":\"Data collection, sharing and security: what does the law say? - Overkiz\",\"isPartOf\":{\"@id\":\"https:\/\/www.overkiz.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg\",\"datePublished\":\"2019-04-23T09:28:22+00:00\",\"dateModified\":\"2021-09-09T04:34:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage\",\"url\":\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg\",\"contentUrl\":\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg\",\"width\":1024,\"height\":498},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.overkiz.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data collection, sharing and security: what does the law say?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.overkiz.com\/#website\",\"url\":\"https:\/\/www.overkiz.com\/\",\"name\":\"Overkiz\",\"description\":\"Expert en solutions IoT pour logements et b\u00e2timents connect\u00e9s\",\"publisher\":{\"@id\":\"https:\/\/www.overkiz.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.overkiz.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.overkiz.com\/#organization\",\"name\":\"Overkiz\",\"url\":\"https:\/\/www.overkiz.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.overkiz.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2018\/12\/OVERKIZ_VERTICAL_RVB_914e.png\",\"contentUrl\":\"https:\/\/www.overkiz.com\/wp-content\/uploads\/2018\/12\/OVERKIZ_VERTICAL_RVB_914e.png\",\"width\":2400,\"height\":1476,\"caption\":\"Overkiz\"},\"image\":{\"@id\":\"https:\/\/www.overkiz.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/overkiz\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.overkiz.com\/#\/schema\/person\/d6ebf05846af98bc38c0e261fe76f103\",\"name\":\"Jasna Musanovic\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data collection, sharing and security: what does the law say? - Overkiz","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/","og_locale":"en_US","og_type":"article","og_title":"Data collection, sharing and security: what does the law say? - Overkiz","og_description":"Development of the Internet of Things, if it proves to be a provider of innovative and practical solutions for a vast majority of users, both individual and professional, raises an ethical question, which is the source of many debates; what","og_url":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/","og_site_name":"Overkiz","article_published_time":"2019-04-23T09:28:22+00:00","article_modified_time":"2021-09-09T04:34:00+00:00","og_image":[{"width":1024,"height":498,"url":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg","type":"image\/jpeg"}],"author":"Jasna Musanovic","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jasna Musanovic","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#article","isPartOf":{"@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/"},"author":{"name":"Jasna Musanovic","@id":"https:\/\/www.overkiz.com\/#\/schema\/person\/d6ebf05846af98bc38c0e261fe76f103"},"headline":"Data collection, sharing and security: what does the law say?","datePublished":"2019-04-23T09:28:22+00:00","dateModified":"2021-09-09T04:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/"},"wordCount":551,"commentCount":0,"publisher":{"@id":"https:\/\/www.overkiz.com\/#organization"},"image":{"@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage"},"thumbnailUrl":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg","articleSection":["NEWS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/","url":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/","name":"Data collection, sharing and security: what does the law say? - Overkiz","isPartOf":{"@id":"https:\/\/www.overkiz.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage"},"image":{"@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage"},"thumbnailUrl":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg","datePublished":"2019-04-23T09:28:22+00:00","dateModified":"2021-09-09T04:34:00+00:00","breadcrumb":{"@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#primaryimage","url":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg","contentUrl":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2019\/04\/News1-.jpg","width":1024,"height":498},{"@type":"BreadcrumbList","@id":"https:\/\/www.overkiz.com\/en\/data-collection-sharing-and-security-what-does-the-law-say\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.overkiz.com\/en\/"},{"@type":"ListItem","position":2,"name":"Data collection, sharing and security: what does the law say?"}]},{"@type":"WebSite","@id":"https:\/\/www.overkiz.com\/#website","url":"https:\/\/www.overkiz.com\/","name":"Overkiz","description":"Expert en solutions IoT pour logements et b\u00e2timents connect\u00e9s","publisher":{"@id":"https:\/\/www.overkiz.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.overkiz.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.overkiz.com\/#organization","name":"Overkiz","url":"https:\/\/www.overkiz.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.overkiz.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2018\/12\/OVERKIZ_VERTICAL_RVB_914e.png","contentUrl":"https:\/\/www.overkiz.com\/wp-content\/uploads\/2018\/12\/OVERKIZ_VERTICAL_RVB_914e.png","width":2400,"height":1476,"caption":"Overkiz"},"image":{"@id":"https:\/\/www.overkiz.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/overkiz"]},{"@type":"Person","@id":"https:\/\/www.overkiz.com\/#\/schema\/person\/d6ebf05846af98bc38c0e261fe76f103","name":"Jasna Musanovic"}]}},"_links":{"self":[{"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/posts\/10920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/comments?post=10920"}],"version-history":[{"count":5,"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/posts\/10920\/revisions"}],"predecessor-version":[{"id":19621,"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/posts\/10920\/revisions\/19621"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/media\/10915"}],"wp:attachment":[{"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/media?parent=10920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.overkiz.com\/en\/wp-json\/wp\/v2\/categories?post=10920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}