{"id":6060,"date":"2018-01-15T23:20:02","date_gmt":"2018-01-15T23:20:02","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6060"},"modified":"2021-07-12T14:26:28","modified_gmt":"2021-07-12T13:26:28","slug":"gdpr-meeting-72-hour-breach-notification-period","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period","title":{"rendered":"GDPR\u2014Meeting the 72-hour breach notification period"},"content":{"rendered":"<blockquote><p><em>Beyond the Earth-Moon system, thousands of asteroids known as Near-Earth Objects (NEOs) are known to exist. These rocks periodically cross Earth\u2019s orbit and make a close flyby of Earth. Over the course of millions of years, some even collide with the Earth, causing mass extinctions. Little wonder then why NASA\u2019s Center for Near Earth Object Studies (CNEOS) is dedicated to monitoring the larger objects that occasionally come close to our planet.<\/em><\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\" alt=\"SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\" width=\"407\" height=\"201\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>If you study astronomy, you\u2019re likely familiar with the concept of NEOs, which are objects that could strike the earth and potentially cause an extinction event. For MSPs, data breaches can have the same effect on their businesses as NEOs can have on the Earth. The\u00a0<a class=\"ext\" href=\"https:\/\/www.eugdpr.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">General Data Protection Regulation (GDPR)<\/a>\u00a0requirement to investigate and report data breaches within a 72-hour window can make data breaches feel just as threatening in terms of potential damages.<\/p>\n<p>The GDPR text can feel vague when it comes to the data breach notification portion. However, what we can say with some certainty is that, at some point, you will likely have a customer who asks you to help them meet the data breach response requirements of GDPR. They might not even approach you\u2014you could be the one to discover the potential breach. As a result, it\u2019s important to know the facts about data breaches to be prepared.<\/p>\n<h3>Statistics and Key Facts on Data Breach Reporting<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/72-hours.jpg\" alt=\"72-hours.jpg\" width=\"409\" height=\"202\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>According to article 33 of GDPR, the information required under GDPR for reporting a data breach includes:<\/p>\n<ul>\n<li>The nature of the breach<\/li>\n<li>The name\/contact details of the organization\u2019s data protection officer<\/li>\n<li>The likely consequences of the breach<\/li>\n<li>The measures taken or proposed to be taken by the data controller to address the breach and mitigate its adverse effects<\/li>\n<\/ul>\n<p>This means you\u2019ll need to determine these as best you can after discovering a breach\u2014and report to the authorities within the 72-hour window if required.<\/p>\n<p>Concerned about the 72-hour deadline? Well, here are two statistics that are even more worrisome:<\/p>\n<ul>\n<li>It takes an average of 191 days to identify a data breach<\/li>\n<li>Fewer than 19% of data breaches are self-detected<\/li>\n<\/ul>\n<p>Fortunately, the 72-hour reporting window starts from the moment the organization becomes\u00a0<em>aware<\/em>\u00a0of the breach. However, it\u2019s pretty difficult to investigate a data breach that took place weeks or months earlier\u2014remember that 191 days is the\u00a0<em>average<\/em>\u00a0time it takes to identify a breach. So, from an incident response perspective, the sooner the potential breach is detected, the better.<\/p>\n<p>Those statistics paint a pretty bleak picture of the current state of data breach detection, investigation, and response. Once in effect, the GDPR will require MSPs to investigate and respond to all data breaches\u2014and this could be made more difficult if they don\u2019t move the detection needle from 191 days to closer to three.\u00a0 To have a fighting chance of meeting this challenge, preparation, tools, and \u201ca plan\u201d is required.<\/p>\n<p>In terms of preparation, please see the GDPR Quick Win Strategy Guide blog post series. These strategies could perhaps aid you in preventing customer data breaches altogether, but the top strategy for MSPs should be to fundamentally reduce the potential risk of a customer data breach in the first place.<\/p>\n<h3>Understanding Threats<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/databreach.jpg\" alt=\"databreach.jpg\" width=\"409\" height=\"202\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Despite your best efforts, a security incident can happen to a customer in an instant through a simple social engineering attack, misconfiguration, or undetected malware. Even a ransomware attack could fall into the category of a data breach, as GDPR defines it as, \u201ca breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data, transmitted, stored or otherwise processed.\u201d Ransomware could fall under the \u201closs of data\u201d category here.<\/p>\n<p>Fortunately, ransomware attacks are pretty blatant and are becoming easier to fix, as backup tools, best practices, and security technology have increasingly focused on this threat. For the vast majority of MSPs, ransomware attacks are likely to be the only security incident they\u2019ll face. The latest numbers suggest 91% of cyberattacks and the resulting data breaches begin with a phishing email attack, and of those attacks, 93% of them are ransomware payloads.<sup>,<\/sup><\/p>\n<p>For almost every other security incident, you will likely need to examine the type of data breach and what type of contact there may have been from the cybercriminals. This may include determining the nature of the data breach or identifying what data was stolen, tampered with, or permanently destroyed. You may also need to determine if the cybercriminals contacted your customer or their customers. If so, then you may be dealing with a law enforcement matter, as it\u2019s possible that an extortion or blackmail attempt may be made against your customer.<\/p>\n<h3>Types of Security Incidents<\/h3>\n<p>A security failure leading to a data breach (other than ransomware, which is pretty obviously a data availability issue) can generally be assigned into one of three categories:<\/p>\n<ul>\n<li>Unauthorized disclosure of data subject\u2019s personal information<\/li>\n<li>Tampering with or altering of a data subject\u2019s personal data by an unauthorized party<\/li>\n<li>Denial of access to a data subject\u2019s personal data<\/li>\n<\/ul>\n<p>Thus, if \u201cBothan\u201d cybercriminals steal the plans to your company\u2019s \u201cDeath Star,\u201d and the Imperial personnel records or Imperial customer\u2019s records were not included or impacted in any way, the good news is,\u00a0 GDPR may not be relevant, even if those \u201cDeath Star\u201d plans were your firm\u2019s life\u2019s work.<\/p>\n<p>If you find data subjects\u2019 personal data was potentially impacted by the data breach, you will need to determine the level of harm and consequences of the breach. SolarWinds MSP\u2019s\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\/wp-gdpr-guidebook\" target=\"_blank\" rel=\"noopener\">GDPR guidebook<\/a>\u00a0can help point you in the right direction on understanding the severity of the situation and the potential impact of the stolen data.<\/p>\n<p>After that, it\u2019s time to help your customer determine what course of action to take. You may need to make changes to process, procedures, and technology, and you may need to contact the customers who have been impacted if required. Once it\u2019s known that personal data was involved, it\u2019s best to be extra meticulous in documentation and action. Your area\u2019s Supervisory Authority may need to be notified of the breach\u2014so you\u2019ll want to have documentation of all your good- faith efforts.<\/p>\n<h3>What to Expect During a Data Breach Incident<\/h3>\n<p>As an MSP\u2014and possibly first responder to a data breach situation\u2014all the work you have done will come under scrutiny. But if you stand by your customer by documenting and performing your due diligence, the 72-hour breach notification will be unlikely to cause an extinction event for your customer.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sources:<\/strong><\/p>\n<p>1. \u201cAstronomers Practice Responding to a Killer Asteroid,\u201d Universe Today.\u00a0<a class=\"ext\" href=\"https:\/\/www.universetoday.com\/137789\/astronomers-practice-responding-killer-asteroid\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.universetoday.com\/137789\/astronomers-practice-responding-killer-asteroid\/<\/a>\u00a0(accessed November 2017).<\/p>\n<p>2. \u201cData Breach Notification Under the GDPR: Issues to Consider,\u201d Browne Jacobson LLP.\u00a0<a class=\"ext\" href=\"https:\/\/www.brownejacobson.com\/training-and-resources\/resources\/legal-updates\/2016\/03\/data-breach-notification-under-the-gdpr-issues-to-consider\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.brownejacobson.com\/training-and-resources\/resources\/legal-updates\/2016\/03\/data-breach-notification-under-the-gdpr-issues-to-consider<\/a>\u00a0(accessed November 2017).<\/p>\n<p>3. \u201cArt. 33 GDPR: Notification of a Personal Data Breach to the Supervisory Authority,\u201d Intersoft Consulting.\u00a0<a class=\"ext\" href=\"https:\/\/gdpr-info.eu\/art-33-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/gdpr-info.eu\/art-33-gdpr\/<\/a>\u00a0(accessed November 2017).<\/p>\n<p>4. \u201c2016 Ponemon Institute Cost of Data Breach Study,\u201d IBM and Ponemon Institute.\u00a0<a class=\"ext\" href=\"https:\/\/www.ibm.com\/security\/data-breach\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ibm.com\/security\/data-breach\/index.html<\/a>\u00a0(accessed November 2017).<\/p>\n<p>5. \u201cThe Data Breach Detention Gap and Strategies to Close It,\u201d Infocyte.\u00a0<a class=\"ext\" href=\"https:\/\/www.infocyte.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.infocyte.com\/breach-detection-gap-conf<\/a>\u00a0(accessed November 2017).<\/p>\n<p>6. \u201cArticle 4: EU GDPR Definitions,\u201d SecureDataService.\u00a0<a class=\"ext\" href=\"https:\/\/www.privacy-regulation.eu\/en\/4.htm\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.privacy-regulation.eu\/en\/4.htm<\/a>\u00a0(accessed November 2017).<\/p>\n<p>7. \u201cEnterprise Phishing Susceptibility and Resliency Report,\u201d PhishMe.\u00a0<a class=\"ext\" href=\"https:\/\/phishme.com\/enterprise-phishing-susceptibility-report\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/phishme.com\/enterprise-phishing-susceptibility-report<\/a>\u00a0(accessed November 2017).<\/p>\n<p>8. \u201c2016 Q1 Malware Report,\u201d PhishMe.\u00a0<a class=\"ext\" href=\"https:\/\/phishme.com\/project\/phishme-q1-2016-malware-review\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/phishme.com\/project\/phishme-q1-2016-malware-review\/<\/a>\u00a0(accessed November 2017).<\/p>\n<p>&nbsp;<\/p>\n<p><em>This document is provided for informational purposes only and should not be relied upon as legal advice or to determine how the EU General Data Protection Regulation (GDPR) may apply to you and your organization. We encourage you to work with a legally qualified professional to discuss GDPR, how it applies to your organization, and how best to ensure compliance. SolarWinds MSP makes no warranty, express or implied, or assumes any legal liability or responsibility for the information contained herein, including the accuracy, completeness, or usefulness of any information.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6060","post","type-post","status-publish","format-standard","hentry","topic-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>GDPR\u2014Meeting the 72-hour breach notification period - N-able<\/title>\n<meta name=\"description\" content=\"With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GDPR\u2014Meeting the 72-hour breach notification period - N-able\" \/>\n<meta property=\"og:description\" content=\"With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-15T23:20:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:26:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"GDPR\u2014Meeting the 72-hour breach notification period\",\"datePublished\":\"2018-01-15T23:20:02+00:00\",\"dateModified\":\"2021-07-12T13:26:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\"},\"wordCount\":1339,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\",\"articleSection\":[\"GDPR\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\",\"name\":\"GDPR\u2014Meeting the 72-hour breach notification period - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\",\"datePublished\":\"2018-01-15T23:20:02+00:00\",\"dateModified\":\"2021-07-12T13:26:28+00:00\",\"description\":\"With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"GDPR\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/gdpr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GDPR\u2014Meeting the 72-hour breach notification period\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"GDPR\u2014Meeting the 72-hour breach notification period - N-able","description":"With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period","og_locale":"pt_BR","og_type":"article","og_title":"GDPR\u2014Meeting the 72-hour breach notification period - N-able","og_description":"With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-01-15T23:20:02+00:00","article_modified_time":"2021-07-12T13:26:28+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"GDPR\u2014Meeting the 72-hour breach notification period","datePublished":"2018-01-15T23:20:02+00:00","dateModified":"2021-07-12T13:26:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period"},"wordCount":1339,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg","articleSection":["GDPR"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period","url":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period","name":"GDPR\u2014Meeting the 72-hour breach notification period - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg","datePublished":"2018-01-15T23:20:02+00:00","dateModified":"2021-07-12T13:26:28+00:00","description":"With GDPR, companies have a 72-hour window to investigate and report data breaches. Here\u2019s what you need to know about data breaches to be prepared.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/01\/SW-MSP_72hr-Reporting-Requirements-GDPR_BlogHeader_BT_v1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/gdpr-meeting-72-hour-breach-notification-period#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"GDPR","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/gdpr"},{"@type":"ListItem","position":2,"name":"GDPR\u2014Meeting the 72-hour breach notification period"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6060"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6060\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}