{"id":9982,"date":"2018-12-13T08:17:55","date_gmt":"2018-12-13T07:17:55","guid":{"rendered":"https:\/\/www.techregulation.com\/security-of-personal-data\/"},"modified":"2018-12-13T08:17:55","modified_gmt":"2018-12-13T07:17:55","slug":"security-of-personal-data","status":"publish","type":"post","link":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/","title":{"rendered":"Security of Personal Data"},"content":{"rendered":"<p>Security of Personal Data can be achieved when the data is protected by the appropriate controls in relation to the sensitivity of the data. The GDPR does not prescribe exactly what level of security that is required but provides guidelines.\u00a0\u00a0 Reading time: 2 minutes. What is security of personal data Organizations using personal data must&#8230;<\/p>\n<p> Read the full article at the site dedicated to GDPR: <a href=\"https:\/\/www.gdprsummary.com\/security-of-personal-data\/\" target=\"_blank\" rel=\"noopener\">GDPR Summary<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Security of Personal Data can be achieved when the data is protected by the appropriate controls in relation to the sensitivity of the data. The GDPR does not prescribe exactly what level of security that is required but provides guidelines.\u00a0\u00a0 Reading time: 2 minutes. What is security of personal data Organizations using personal data must&#8230; [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9983,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-9982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security of Personal Data - Tech Regulation Hub<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security of Personal Data\" \/>\n<meta property=\"og:description\" content=\"Security of Personal Data can be achieved when the data is protected by the appropriate controls in relation to the sensitivity of the data. The GDPR does not prescribe exactly what level of security that is required but provides guidelines.\u00a0\u00a0 Reading time: 2 minutes. What is security of personal data Organizations using personal data must&#8230; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Regulation Hub\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-13T07:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techregulation.com\/wp-content\/uploads\/2018\/12\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"485\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"gdprsummary\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/gdprsummary\" \/>\n<meta name=\"twitter:site\" content=\"@techreghub\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"gdprsummary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/\"},\"author\":{\"name\":\"gdprsummary\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#\\\/schema\\\/person\\\/0a87c3577244c3effa8a61a48415ec4d\"},\"headline\":\"Security of Personal Data\",\"datePublished\":\"2018-12-13T07:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/\"},\"wordCount\":70,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg\",\"articleSection\":[\"GDPR\"],\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/\",\"url\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/\",\"name\":\"Security of Personal Data - Tech Regulation Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg\",\"datePublished\":\"2018-12-13T07:17:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#\\\/schema\\\/person\\\/0a87c3577244c3effa8a61a48415ec4d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg\",\"width\":485,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/security-of-personal-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/?page_id=139&preview_id=139\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security of Personal Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#website\",\"url\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/\",\"name\":\"Tech Regulation Hub\",\"description\":\"Empowering Compliance in the Digital Age\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#\\\/schema\\\/person\\\/0a87c3577244c3effa8a61a48415ec4d\",\"name\":\"gdprsummary\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g\",\"caption\":\"gdprsummary\"},\"sameAs\":[\"https:\\\/\\\/www.gdprsummary.com\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/gdprsummary\",\"https:\\\/\\\/www.youtube.com\\\/@GDPRSummary\"],\"url\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/author\\\/gdprsummary\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security of Personal Data - Tech Regulation Hub","robots":{"index":"noindex","follow":"follow"},"og_locale":"sv_SE","og_type":"article","og_title":"Security of Personal Data","og_description":"Security of Personal Data can be achieved when the data is protected by the appropriate controls in relation to the sensitivity of the data. The GDPR does not prescribe exactly what level of security that is required but provides guidelines.\u00a0\u00a0 Reading time: 2 minutes. What is security of personal data Organizations using personal data must&#8230; [&hellip;]","og_url":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/","og_site_name":"Tech Regulation Hub","article_published_time":"2018-12-13T07:17:55+00:00","og_image":[{"width":485,"height":360,"url":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2018\/12\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg","type":"image\/jpeg"}],"author":"gdprsummary","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/gdprsummary","twitter_site":"@techreghub","twitter_misc":{"Skriven av":"gdprsummary"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#article","isPartOf":{"@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/"},"author":{"name":"gdprsummary","@id":"https:\/\/www.techregulation.com\/sv\/#\/schema\/person\/0a87c3577244c3effa8a61a48415ec4d"},"headline":"Security of Personal Data","datePublished":"2018-12-13T07:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/"},"wordCount":70,"commentCount":0,"image":{"@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2018\/12\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg","articleSection":["GDPR"],"inLanguage":"sv-SE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/","url":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/","name":"Security of Personal Data - Tech Regulation Hub","isPartOf":{"@id":"https:\/\/www.techregulation.com\/sv\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#primaryimage"},"image":{"@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2018\/12\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg","datePublished":"2018-12-13T07:17:55+00:00","author":{"@id":"https:\/\/www.techregulation.com\/sv\/#\/schema\/person\/0a87c3577244c3effa8a61a48415ec4d"},"breadcrumb":{"@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#primaryimage","url":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2018\/12\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg","contentUrl":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2018\/12\/samuel-zeller-118195-unsplash-485x360-4nYyVG.jpeg","width":485,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.techregulation.com\/sv\/security-of-personal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techregulation.com\/sv\/?page_id=139&preview_id=139"},{"@type":"ListItem","position":2,"name":"Security of Personal Data"}]},{"@type":"WebSite","@id":"https:\/\/www.techregulation.com\/sv\/#website","url":"https:\/\/www.techregulation.com\/sv\/","name":"Tech Regulation Hub","description":"Empowering Compliance in the Digital Age","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techregulation.com\/sv\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Person","@id":"https:\/\/www.techregulation.com\/sv\/#\/schema\/person\/0a87c3577244c3effa8a61a48415ec4d","name":"gdprsummary","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/secure.gravatar.com\/avatar\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g","caption":"gdprsummary"},"sameAs":["https:\/\/www.gdprsummary.com\/","https:\/\/x.com\/https:\/\/twitter.com\/gdprsummary","https:\/\/www.youtube.com\/@GDPRSummary"],"url":"https:\/\/www.techregulation.com\/sv\/author\/gdprsummary\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/posts\/9982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/comments?post=9982"}],"version-history":[{"count":0,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/posts\/9982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/media\/9983"}],"wp:attachment":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/media?parent=9982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/categories?post=9982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/tags?post=9982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}