Data protection challenges due to new EU regulations

3 April 2024

EU triangle: data protection, data economy and IT security

The implementation of the General Data Protection Regulation (GDPR) continues to pose a major challenge for many companies. In addition, they are now facing new EU regulations in the areas of the digital economy and cyber security.

How do we ensure that we don't lose track of all existing regulations and what role does data protection play in this?

According to a recent survey by German Chamber of Industry and Commerce (DIHK)which was conducted among 4,900 companies, around 80% of the companies surveyed still associate a "high to extreme" level of effort with the implementation of the GDPR. The tension between the GDPR and various EU regulations on the data economy, such as the Data Act, is particularly problematic.

About the author

Dr Marija Stambolieva

Dr Marija Stambolieva

Senior Consultant Compliance Management, Information Security, Data Protection & AI Officer

About the author

Marija Stambolieva

Dr Marija Stambolieva

Senior Consultant Compliance Management, Information Security, Data Protection & AI Officer

EU triangle: data protection, data economy and IT security

The implementation of the General Data Protection Regulation (GDPR) continues to pose a major challenge for many companies. In addition, they are now facing new EU regulations in the areas of the digital economy and cyber security.

How do we ensure that we don't lose track of all existing regulations and what role does data protection play in this?

According to a recent survey by German Chamber of Industry and Commerce (DIHK)which was conducted among 4,900 companies, around 80% of the companies surveyed still associate a "high to extreme" level of effort with the implementation of the GDPR. The tension between the GDPR and various EU regulations on the data economy, such as the Data Act, is particularly problematic.

Tension between the Data Act and GDPR

The Data Actwhich came into force in January 2024 and will apply throughout the EU from 12 September 2025, creates a new legal framework for the exchange and use of data related to connected products or services. This applies to both personal and non-personal data. In the case of personal data, the Data Act supplements the right to data portability in accordance with Art. 20 GDPR.

The transfer of personal data by the data controller from one user (1) to another user (2) or to a third party data recipient poses a particular challenge.

Forwarding of data GDPR

The implementation of data exchange between data owner, user and data recipient, derived from the Data Act, harbours the risk of a breach of the GDPR. At the same time, the refusal of the data access request could potentially violate the Data Act.

According to Article 1(3) of the Data Act, the applicability of previous Union legislation remains unaffected. It is therefore important to determine the legal basis for data processing in accordance with Article 6 (and, if applicable, Article 9) of the GDPR and to draft the contracts between the parties accordingly. Similar to the GDPR, the European Commission will draft non-binding model contractual clauses for data access and use and non-binding standard contractual clauses for cloud computing contracts (under Article 42 of the Data Act, the deadline for this is 12 September 2025) to assist parties in drafting and negotiating contracts with fair, reasonable and non-discriminatory contractual rights and obligations.

Data protection in the service of IT security

Despite the challenges of implementing the GDPR, more than half of companies emphasise the increased importance of data protection, particularly in light of the threat of cyberattacks.

The NIS-2 Directivewhich must be transposed into national law by 17 October 2024, aims to increase cybersecurity in the EU. To this end, companies categorised as operators of essential services in 18 sectors must take appropriate security measures and inform national authorities of serious incidents. Consequently, data protection also plays a special role here, as the protection of personal data may be jeopardised in the event of information security incidents.

Data protection graphic

The competent authorities for network and information systems, central contact points and CSIRTs (Computer Security Incident Response Teams) may process personal data for the necessary purposes of the NIS-2 Directive on the basis of an appropriate legal basis under the GDPR. The requirement to "provide for appropriate and specific measures to protect the fundamental rights and interests of natural persons, including technical restrictions on the further use of such data and the application of state-of-the-art security and data protection measures such as pseudonymisation or encryption [...]" (Recital 121 of the NIS-2 Directive) are compatible with the requirements of the GDPR.

NIS-2

Is your company also affected by the NIS2 Directive? Take our free NIS2 quick test and find out whether your company is affected by the NIS2 Directive:

There is no way around the GDPR

Even if the complexity increases due to the new EU regulations, one thing is clear: there is no way around the GDPR! More than 70% of the companies surveyed in the DIHK survey stated that they would like to see guidelines and recommendations that are practical, clear and precisely formulated. More than half also want specific sample forms and checklists. Our targeted support for GDPR compliance offers exactly that. Find out more at this link:

In this context, the following points from the GDPR must be observed:
DSGVO Check Icon
Determining the legal basis for data processing
(Art. 6, GDPR)

DSGVO Check Icon

Enable the right to data portability

(Art. 20, GDPR)

DSGVO Check Icon

Implement appropriate technical and organisational measures (TOMs)

(Art. 32, GDPR)

DSGVO Check Icon

Conclude corresponding contracts

(e.g. for the purpose of order processing or data transfer to third parties)

Do you have any questions?

If you have any questions about this or would like support with data protection requirements, please contact us.

Your registration could not be saved. Please try again.
Your registration was successful.

Microsoft 365 News

In our newsletter we inform you about the latest Microsoft 365 news, trends and interesting opportunities and present important information from Microsoft in an easily understandable way.

We use Sendinblue as our marketing platform. By Clicking below to submit this form, you acknowledge that the information you provided will be transferred to Sendinblue for processing in accordance with their terms of use

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Analytics

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.