{"id":60667,"date":"2022-12-16T15:57:42","date_gmt":"2022-12-16T07:57:42","guid":{"rendered":"https:\/\/version-2.com\/?p=60667"},"modified":"2023-02-22T14:31:35","modified_gmt":"2023-02-22T06:31:35","slug":"data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/12\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\/","title":{"rendered":"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"60667\" class=\"elementor elementor-60667\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article class=\"is-type-body-default is-important\"><p><em>\u201cThe house of every one is to him as his Castle and Fortress as well for defense against injury and violence\u2026\u201d<\/em><em><\/em><em>\u2014 <\/em><em>Sir Edward Coke, English judge and jurist.<\/em><\/p> <p>Coke uttered the famous words across the pond <a href=\"https:\/\/www.bookbrowse.com\/expressions\/detail\/index.cfm\/expression_number\/423\/a-mans-home-is-his-castle\" target=\"_blank\" rel=\"noreferrer noopener\">more than 400 years<\/a> ago. For centuries, the legal precedent has underpinned the right to freedom from intrusion.&nbsp;<\/p> <p>One can only imagine what Coke would think about today\u2019s ongoing privacy debate between consumers, big tech, and legal systems.&nbsp;<\/p> <p>No longer are homes the only places we store personal information. Today\u2019s companies have multiple options (and incentives) for collecting, storing, and sharing data.&nbsp;<\/p> <p>As the IT admin of a <a href=\"https:\/\/jumpcloud.com\/blog\/overcome-top-sme-cybersecurity-challenges\">small-to-medium-sized enterprise (SME)<\/a>, what do these developments mean for you? And what are the essential things you need to know about data privacy laws?<\/p> <p>Keep reading to learn more about data security versus data protection, the history of data privacy laws, and the most relevant laws in the U.S. and Europe. In addition, we\u2019ll share our best tips on how to strengthen your compliance efforts.&nbsp;<\/p> <h2 id=\"heading1\">Data Privacy Laws and Why They Exist<\/h2> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"288\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg\" alt=\"A low angle view on a blue digital key made to resemble a circuit and placed on a surface with encrypted text.\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key-300x169.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72957\"><\/figure> <p>The topic of data privacy entered the world stage in 2018. That\u2019s when the<a href=\"https:\/\/www.cnbc.com\/2018\/04\/10\/facebook-cambridge-analytica-a-timeline-of-the-data-hijacking-scandal.html\" target=\"_blank\" rel=\"noreferrer noopener\"> Facebook-Cambridge Analytica<\/a> scandal flashed across news headlines around the world.<a href=\"https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election\"><\/a>The<a href=\"https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/cambridge-analytica-trump-campaign.html#click=https:\/\/t.co\/UAg1Q5t1BG\" target=\"_blank\" rel=\"noreferrer noopener\"> New York Times<\/a> reported that the company harvested the Facebook profiles of 50 million users, without their permission, for nefarious political purposes.&nbsp;<\/p> <p>Shortly after, several high-profile data breaches further emphasized the need for enhanced data privacy and security regulations. Google+ developers<a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2018\/10\/09\/google-plus-breach-what-happened-who-was-impacted-and-how-to-delete-your-account\/?sh=2e3108fa6491\" target=\"_blank\" rel=\"noreferrer noopener\"> discovered a breach<\/a> that allowed 438 external apps to access 500,000 Google+ users\u2019 data, including names, emails, addresses, occupations, genders, and ages. The result?&nbsp;<\/p> <p>Lawmakers and regulators worldwide are now taking data privacy seriously. Several laws and regulations have popped up in recent years to protect people\u2019s privacy. The most notable and expansive of these are the <em>General Data Protection Regulation (GDPR)<\/em> in the European Union and the <em>California Consumer Privacy Act (CCPA)<\/em> in the United States. We\u2019ll dive into these regulations in a moment, but first, let\u2019s define data privacy laws.&nbsp;<\/p> <h2 id=\"heading2\">What Are Data Privacy Laws?&nbsp;<\/h2> <p><strong>Data privacy laws<\/strong> are mandates that govern how organizations can collect, use, and share personal information. The laws exist to protect individuals from having their personal data mishandled or misused.<\/p> <p>In addition, data privacy laws set standards for how organizations must handle and secure data and give data subjects rights over their information. This often includes the right to know and permit what information is collected, the right to have it erased, and the right to object to its use.&nbsp;<\/p> <p>The specifics of data privacy laws vary from country to country. But they all aim to achieve the same goal: to protect people\u2019s information from falling into the wrong hands.<\/p> <h3>Benefits of Data Privacy Laws<\/h3> <p>The benefits of data privacy laws for individual data subjects are self-evident. However, they may seem somewhat burdensome for corporations.<\/p> <p>After all, complying with data privacy laws requires significant time, resources, and money investments. But make no mistake, adhering to data privacy laws is not only the right thing to do, but it\u2019s also good for business.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"288\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/code.jpeg\" alt=\"Encryption your data. Binary code and digital Lock. Hacker attack and data breach. Big data with encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration.\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/code.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/code-300x169.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72959\"><\/figure> <h4>1. Enhance Consumer Trust (and Credibility)<\/h4> <p>In a world where data breaches are becoming increasingly common, customers want to work with companies they can trust.&nbsp;<\/p> <p>In fact, 71% of respondents<a href=\"https:\/\/www.mckinsey.com\/~\/media\/McKinsey\/Business%20Functions\/Risk\/Our%20Insights\/The%20consumer%20data%20opportunity%20and%20the%20privacy%20imperative\/The-consumer-data-opportunity-and-the-privacy-imperative.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> in a 2020 McKinsey survey<\/a> stated they would take their business elsewhere if a company released sensitive information without permission. Complying with data privacy regulations sends a strong signal to stakeholders that you take privacy seriously and do everything you can to protect their data.&nbsp;<\/p> <h4>2. Level the Playing Field<\/h4> <p>Submitting all companies to the same standards means the differentiating factor would be products and service quality, not who has the most lenient data privacy practices. This is particularly important for SMEs that lack the resources of larger corporations and would be at a competitive disadvantage if there were no data privacy regulations.<\/p> <h3>Understanding Data Sovereignty<\/h3> <p>As noted earlier, different countries have different nuances on data privacy laws, making the discussion on data sovereignty ever-important.<\/p> <p><strong>Data sovereignty<\/strong> is the concept that data should be stored and managed in compliance with the laws of its country of origin. This is especially critical for companies that operate in multiple countries, as they need to ensure that their data complies with the laws of each country.<\/p> <p>It also extends to the idea that organizations should store data originating from a country in the same country to avoid subjecting individuals\u2019 privacy to a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Microsoft_Corp._v._United_States\" target=\"_blank\" rel=\"noreferrer noopener\">foreign government\u2019s jurisdiction<\/a>.<\/p> <p>Data sovereignty has immense relevance in cloud storage applications as companies sometimes host servers in different countries from where the data is collected. Data sovereignty will become even more critical as the internet grows and expands.<\/p> <h2 id=\"heading3\">Data Security vs. Data Protection&nbsp;<\/h2> <p>People often use the terms data security and data protection interchangeably without realizing they are two completely different concepts.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"342\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/device.jpeg\" alt=\"person in deep mind solutions\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/device.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/device-300x200.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72960\"><\/figure> <h3>Data Security<\/h3> <p><strong>Data security<\/strong> is the practice of restricting access to data. This includes ensuring that only certain users can obtain data and that information is not modified or destroyed without authorization.&nbsp;<\/p> <p>Data security is vital for both individuals and organizations, as it helps protect information from being misused or stolen. Examples of data security strategies include<a href=\"https:\/\/jumpcloud.com\/blog\/fde-compliance\"> encryption<\/a>, firewalls, and<a href=\"https:\/\/jumpcloud.com\/blog\/it-password-security\"> password protection<\/a>.&nbsp;<\/p> <p>Organizations can use an IT toolkit like the <a href=\"https:\/\/jumpcloud.com\/why-jumpcloud\" target=\"_blank\" rel=\"noreferrer noopener\">JumpCloud Directory Platform<\/a> to streamline data security compliance, oversee device management in heterogeneous environments, provision\/deprovision users, and enforce password controls.&nbsp;<\/p> <h3>Data Protection<\/h3> <p><strong>Data protection<\/strong> involves safeguarding data from loss or damage. It includes measures such as backing up data and storing it in a secure location to ensure that important data is not lost in the event that security measures fail.&nbsp;<\/p> <p>For example, suppose cyberattackers seize control of an organization\u2019s server in a ransomware attack. In that case, data protection measures ensure that the organization can still access its data.&nbsp;<\/p> <p>Though relevant as the last line of defense in a wider security strategy, data protection is also handy for other reasons besides malicious attacks. For example, it helps businesses recover from data loss due to technical failures or human error.&nbsp;<\/p> <p>Also, if different locations house data (e.g., on premises and in the cloud), data protection helps ensure critical systems don\u2019t grind to a halt if one storage location goes down.&nbsp;<\/p> <h2 id=\"heading4\">The Four Basic Data Privacy Protections&nbsp;<\/h2> <p>Oftentimes, implementing data privacy policies is challenging for organizations because they don\u2019t approach it as a baseline for operations.&nbsp;<\/p> <p>Instead, they treat it as an afterthought and only focus on meeting regulatory compliance when required. At JumpsCloud, we\u2019ve seen SMEs take a similar approach with <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-it-compliance\">IT security compliance<\/a> measures to their own detriment.&nbsp;<\/p> <p>Organizations seeking to take a proactive approach to data privacy should have the following protective measures in place as mandated by the <a href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">General Data Protection Regulation<\/a> and other similar laws:<\/p> <ol><li>Data Collection and Sharing Rights<\/li><\/ol> <p>Your privacy approach should include letting users know what types of data you collect, how you use it, who you\u2019ll share it with, and what purpose you\u2019ll use it for.<\/p> <p>It should also inform and enable them to exercise their rights over their data, such as the right to access, delete, or correct their data.<\/p> <p>They should also have the right to deny third-party access to some or all of their data.<\/p> <ol start=\"2\"><li>Opt-In (Consent)<\/li><\/ol> <p><em>What\u2019s better than letting your users know what data you handle?<\/em> Asking their permission for how you intend to handle it.<\/p> <p>It\u2019s common for websites to have pre-ticked boxes that allow users to opt out of cookies or the collection of certain information. This is neither good practice nor in line with the laws, such as the GDPR\u2019s cookie consent requirements.<\/p> <p>Require your customers to take clear and proactive action to indicate that they agree to have their data collected.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"482\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/11\/coworkers-in-server-room.jpg\" alt=\"coworkers in sever room looking at a tablet\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/11\/coworkers-in-server-room.jpg 724w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/11\/coworkers-in-server-room-300x200.jpg 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" class=\"wp-image-71612\"><\/figure> <ol start=\"3\"><li>Data Minimization and Storage Limitation<\/li><\/ol> <p>Only collect and store the data that is necessary for you to fulfill your<a href=\"https:\/\/www.termsfeed.com\/blog\/data-minimization-cpra-gdpr\/\" target=\"_blank\" rel=\"noreferrer noopener\"> business purpose<\/a>. For example, suppose you\u2019re a business that sells products. In that case, you\u2019ll need to store data such as the customer\u2019s name, shipping address, and payment information.&nbsp;<\/p> <p>Don\u2019t store data such as visitor browsing history on your site or the sites they visit after leaving yours. Furthermore, limit the amount of time you keep data. For instance, you can delete customer data once they haven\u2019t interacted with your site for a certain period, such as 12 months.<\/p> <p>Perhaps, the most shocking cautionary tale is the double-header case of<a href=\"https:\/\/www.hypr.com\/security-encyclopedia\/adultfriendfinder-security-breach\" target=\"_blank\" rel=\"noreferrer noopener\"> AdultFriendFinder<\/a>, where a dating website got hacked twice, and very private information of users was made available on the dark web. What was already a sticky situation became even worse. It turned out that the data of former users who had deleted their accounts were still being kept and were among those leaked.<\/p> <ol start=\"4\"><li>Nondiscrimination and No Data-Use Discrimination<\/li><\/ol> <p>This protection requires you <em>not<\/em> to engage in<a href=\"https:\/\/www.adlawaccess.com\/2020\/04\/articles\/the-ccpa-non-discrimination-right-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\"> discriminatory behavior<\/a> against individuals who choose to exercise their data privacy rights.<\/p> <p>For example, you cannot charge a higher price, refuse service, or give them a lower quality service because they exercised their right to access or delete their data. Also, you can\u2019t use collected data to<a href=\"https:\/\/www.brookings.edu\/research\/solving-the-problem-of-racially-discriminatory-advertising-on-facebook\/\" target=\"_blank\" rel=\"noreferrer noopener\"> profile individuals<\/a> along discriminatory lines.<\/p> <p>For instance, using data to target ads or content to individuals based on their race, ethnicity, gender, religion, disability, or other discriminating factors could violate your data subjects\u2019 rights.<\/p> <h2 id=\"heading5\">Evolution of Data Privacy<\/h2> <p>As referenced in our introduction, the notion of privacy has been around long before the digital age. Here\u2019s some additional fun facts for the history buffs out there:&nbsp;<\/p> <ul><li>In 1890, two Americans, Samuel Warren and Louis Brandeis wrote \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Right_to_Privacy_(article)\" target=\"_blank\" rel=\"noreferrer noopener\">The Right to Privacy<\/a>.\u201d The article advocated individuals \u201cbe left alone\u201d and not have their lives turned into public spectacles. With time, the need to protect people\u2019s information became more apparent as the technological landscape changed.<\/li><li>In 1967, an interesting development to the U.S. constitution\u2019s fourth amendment arose in <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/389\/347\/\" target=\"_blank\" rel=\"noreferrer noopener\">Katz v. The U.S.<\/a>, where investigators had recorded a gambler\u2019s conversations on a public telephone. The court held that the right to privacy extended beyond a person\u2019s house, papers, and effects to include areas where a person has a reasonable expectation of privacy, such as a telephone booth, as in this case.<\/li><li>Katz vs. The U.S. accelerated the movement toward data privacy, and in time, Sweden enacted the first<a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_Act_(Sweden)#Problems_and_succession\" target=\"_blank\" rel=\"noreferrer noopener\"> national data privacy law<\/a> in 1973.&nbsp;<\/li><li>The 1980s saw the Organisation for Economic Co-operation and Development (OECD) release<a href=\"http:\/\/www.oecdprivacy.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"> data privacy guidelines<\/a> which then and till today, form the basis for many data privacy laws around the world.<\/li><li>Then came the internet, which made it easier for organizations to store more information than ever. In response, the European Union (EU) passed the Data Protection Directive in 1995.<\/li><li>During the Wild West days of the internet, data privacy concerns took the backseat while data security rode shotgun. However, this soon changed with the rise of big data firms such as Google, Amazon, and Facebook in the 2000s.<\/li><\/ul> <p>The massive data these organizations collected, coupled with high-profile privacy scandals, made it inevitable that data privacy would come to the forefront again.<\/p> <p>As previously mentioned, several countries have enacted data privacy laws reflecting its greater importance. Meanwhile, only time can tell what new technologies will develop and what concerns and responses to data privacy they might bring.<\/p> <h2 id=\"heading6\">U.S. Data Privacy Laws&nbsp;<\/h2> <p>The United States does not have a single, all-encompassing data privacy law. Instead, it relies on a patchwork of federal and state laws and industry-specific regulations.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"310\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/work.jpeg\" alt=\"woman holding coffee standing in front of her home office\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/work.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/work-300x182.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72961\"><\/figure> <h3>National Privacy Legislation<\/h3> <p>There are several pieces of U.S. federal legislation that deal with data privacy. Perhaps the most popular are the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and the Children\u2019s Online Privacy Protection Act (COPPA).<\/p> <p><a href=\"https:\/\/www.hhs.gov\/hipaa\/for-individuals\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a> establishes national standards to protect people\u2019s medical information. It applies to healthcare providers, health plans, and other medical information organizations.<\/p> <p><a href=\"https:\/\/www.ftc.gov\/business-guidance\/privacy-security\/gramm-leach-bliley-act\" target=\"_blank\" rel=\"noreferrer noopener\">The GLBA<\/a> requires financial organizations to safeguard sensitive information and explain their information-sharing procedures to customers. It also demands that they respect the customer\u2019s right to opt out of any data sharing with unaffiliated parties.<\/p> <p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Children%27s_Online_Privacy_Protection_Act\" target=\"_blank\" rel=\"noreferrer noopener\">COPPA<\/a> protects the online privacy of children under 13 by prohibiting website operators from collecting personal information from children without parental consent.<\/p> <h3>State Privacy Legislation&nbsp;<\/h3> <p>Several states also have data privacy laws. For example, <a href=\"https:\/\/www.ispartnersllc.com\/blog\/what-is-massachusetts-data-protection-act\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Massachusetts Data Privacy Law<\/a> is one of the most comprehensive state data privacy laws. It requires businesses to take reasonable security measures to protect personal information. It imposes harsh penalties for companies that suffer data breaches.<\/p> <p>California has the<a href=\"https:\/\/www.csoonline.com\/article\/3292578\/california-consumer-privacy-act-what-you-need-to-know-to-be-compliant.html\" target=\"_blank\" rel=\"noreferrer noopener\"> California Consumer Privacy Act<\/a> (CCPA), which came into effect in 2020. The act contains residents\u2019 right to know what personal information is being collected about them, the right to delete that information, and the right to opt out of its sale. With few exceptions, the CCPA contains as many measures as the GDPR.<\/p> <p>There is also the<a href=\"https:\/\/cookie-script.com\/legal-information\/nevada-privacy-law-and-what-it-means-for-your-organization\" target=\"_blank\" rel=\"noreferrer noopener\"> Nevada Internet Privacy Law<\/a>, with similar provisions to the CCPA but limited to online and web services only.<\/p> <h2 id=\"heading7\">EU Data Privacy Laws<\/h2> <p>The European Union has one of the world\u2019s most comprehensive data privacy laws. The EU\u2019s General Data Protection Regulation (GDPR) came into effect in 2018 and builds on the EU\u2019s 1995 Data Protection Directive.<\/p> <p>The GDPR requires businesses to get explicit consent from individuals before collecting, using, or sharing their personal data. It also gives individuals the right to know what private data organizations collect about them, the right to have that data erased, and the right to object to its use.<\/p> <p>The GDPR applies to data processes irrespective of whether the data is collected online or offline; or whether or not the business is in the EU.<\/p> <p><a href=\"https:\/\/www.itgovernance.co.uk\/dpa-and-gdpr-penalties\" target=\"_blank\" rel=\"noreferrer noopener\">Companies that violate<\/a> the GDPR can receive a fine of 4% of their annual global revenue or \u20ac20 million, whichever is greater.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"341\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/device-2.jpeg\" alt=\"woman behind a laptop toggling on the mouse\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/device-2.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/device-2-300x200.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72962\"><\/figure> <h2 id=\"heading8\">Data Privacy Quick Tips for SMEs<\/h2> <p>So, what can SMEs do to comply with data privacy laws? Here are some quick tips:<\/p> <ul><li><strong>Get rid of dark patterns<\/strong>: You know how easy it is to use those complicated menus to frustrate users and discourage them from using the opt-out button. Or how easy it is to place confusing words like \u201cDon\u2019t Not Sell My Personal Information\u201d beside the \u201cI agree\u201d checkbox. Well, don\u2019t use them.<a href=\"https:\/\/www.termsfeed.com\/blog\/dark-patterns\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Dark patterns<\/a> are not only annoying to your user; specific instances of them could also be illegal under relevant laws.<\/li><\/ul> <ul><li><strong>Implement privacy by design<\/strong>: This means building privacy into your products and services from the ground up. It starts with understanding what personal data you are collecting and why. Do you really need it? Can you get by with an email address? Once you\u2019ve decided what data you need, figure out how to collect it to minimize the risk of exposure. For example, if you\u2019re managing sensitive information like health data, consider using encryption to keep this information safe both during and after collection.<\/li><\/ul> <ul><li><strong>Communicate changes in policy<\/strong>: If you change your privacy policy, communicate these changes to your users. Also, ensure you provide an option for users to opt into the new policy. It goes without saying that you should also make it easy for users to find your privacy policy on your website or app.<\/li><\/ul> <ul><li><strong>Data privacy is more than the internet<\/strong>: Remember that privacy laws also apply to offline data collection. This includes data collected through paper forms, over the phone, or in person. So, if you collect this type of information, take steps to protect this information from exposure and use it only for the purpose it was collected.<\/li><\/ul> <h2 id=\"heading9\">Improve IT Security Hygiene with JumpCloud&nbsp;<\/h2> <p>Data privacy laws are constantly evolving, and businesses must keep up to date with the latest changes. By understanding the basics of data privacy, you can ensure your organization complies with relevant laws and protects your customers\u2019 personal information.<\/p> <p>Did you know that instituting and enforcing IT hygiene policies helps improve organizational data privacy, security, and protection posture?Learn how organizations can adopt data-hygienic practices, improve data privacy, and avoid breaches in<a href=\"https:\/\/jumpcloud.com\/resources\/data-compliance-guide\" target=\"_blank\" rel=\"noreferrer noopener\"> The IT Manager\u2019s Guide to Data Compliance Hygiene.<\/a><\/p> <div class=\"blog-post-tags m-t-2\"><ul class=\"blog-post-topics-list\"><li class=\"blog-post-topics-list-item\"><a href=\"\/en\/blog\/?topics=best-practices\" class=\"blog-post-topics-list-link is-type-body-default is-important is-type-weight-semi-bold has-text-navy\">Best Practices<\/a><\/li><\/ul> <ul class=\"blog-post-collections-list\"><li class=\"blog-post-collections-list-item\"><a href=\"\/en\/blog\/?collections=it-admins\" class=\"blog-post-collections-list-link is-type-body-tiny is-type-weight-semi-bold is-important it-admins\">IT Admins<\/a><\/li><li class=\"blog-post-collections-list-item\"><a href=\"\/en\/blog\/?collections=security\" class=\"blog-post-collections-list-link is-type-body-tiny is-type-weight-semi-bold is-important security\">Security<\/a><\/li><\/ul><\/div><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"57539\" class=\"elementor elementor-57539\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About JumpCloud<\/strong><br \/>At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u201cThe house of every one is to him as his Castle and For [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,1016,61],"tags":[489,1017],"class_list":["post-60667","post","type-post","status-publish","format-standard","hentry","category-488","category-jumpcloud","category-press-release","tag-489","tag-jumpcloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u201cThe house of every one is to him as his Castle and For [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-16T07:57:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-22T06:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond\",\"datePublished\":\"2022-12-16T07:57:42+00:00\",\"dateModified\":\"2023-02-22T06:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\\\/\"},\"wordCount\":2719,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/key.jpeg\",\"keywords\":[\"2022\",\"JumpCloud\"],\"articleSection\":[\"2022\",\"JumpCloud\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\\\/\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes\",\"name\":\"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/key.jpeg\",\"datePublished\":\"2022-12-16T07:57:42+00:00\",\"dateModified\":\"2023-02-22T06:31:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#primaryimage\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/key.jpeg\",\"contentUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/key.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/data-privacy-laws-smes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes","og_locale":"en_US","og_type":"article","og_title":"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond - Version 2","og_description":"\u201cThe house of every one is to him as his Castle and For [&hellip;]","og_url":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes","og_site_name":"Version 2","article_published_time":"2022-12-16T07:57:42+00:00","article_modified_time":"2023-02-22T06:31:35+00:00","og_image":[{"url":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/12\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond","datePublished":"2022-12-16T07:57:42+00:00","dateModified":"2023-02-22T06:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/12\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\/"},"wordCount":2719,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg","keywords":["2022","JumpCloud"],"articleSection":["2022","JumpCloud","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/12\/data-privacy-laws-for-smes-stay-compliant-in-2023-and-beyond\/","url":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes","name":"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg","datePublished":"2022-12-16T07:57:42+00:00","dateModified":"2023-02-22T06:31:35+00:00","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#primaryimage","url":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg","contentUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/key.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Data Privacy Laws for SMEs: Stay Compliant in 2023 and Beyond"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fMv","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/60667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=60667"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/60667\/revisions"}],"predecessor-version":[{"id":60674,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/60667\/revisions\/60674"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=60667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=60667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=60667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}