{"id":30746,"date":"2017-08-03T21:00:00","date_gmt":"2017-08-03T21:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/4127121"},"modified":"2017-08-03T21:00:00","modified_gmt":"2017-08-03T21:00:00","slug":"is-your-company-ready-for-the-general-data-protection-regulation-cloudexpo-cloud-security-analytics","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/is-your-company-ready-for-the-general-data-protection-regulation-cloudexpo-cloud-security-analytics\/","title":{"rendered":"Is Your Company Ready for the General Data Protection Regulation? | @CloudExpo #Cloud #Security #Analytics"},"content":{"rendered":"<p>Remember the Y2K bug, the computer coding flaw that was predicted to cause global havoc when the two-digit dates embedded in software rolled over from 1999 to 2000? After organizations around the world spent a year checking and upgrading their systems to deal with the issue, few major problems ended up occurring.<br \/>\nThe world is now on the brink of what could be called the Y2K bug of data privacy \u2013 the European Union\u2019s General Data Protection Regulation (GDPR), tough rules that require companies to be more transparent about the information they collect on individuals and how it is used.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/4127121\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remember the Y2K bug, the computer coding flaw that was predicted to cause global havoc when the two-digit dates embedded in software rolled over from 1999 to 2000? After organizations around the world spent a year checking and upgrading their systems to deal with the issue, few major problems ended up occurring.<br \/>\nThe world is now on the brink of what could be called the Y2K bug of data privacy &ndash; the European Union&rsquo;s General Data Protection Regulation (GDPR), tough rules that require companies to be more transparent about the information they collect on individuals and how it is used.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/4127121\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-30746","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/30746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=30746"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/30746\/revisions"}],"predecessor-version":[{"id":30747,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/30746\/revisions\/30747"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=30746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=30746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=30746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}