Site icon Graylog

CLM and Turkish KVKK Personal Data Protection Law

Data’s role in business processes continues to evolve. Today, organizations collect, store, process, and transmit more personal data than ever before, and legislative bodies respond by updating privacy laws.

Türkce çevirisi için bu linke tıklayınız.

 

In 2016, Turkey passed the first iteration of its Personal Data Protection Law number 6698 (PDPL), which also established the Kişisel Verileri Koruma Kurumu (KVKK), the country’s data protection authority. In 2021, the Turkish government indicated its plan to update the law so that its data protection requirements would align more clearly with the General Data Protection Regulation (GDPR). However, currently, the PDPL remains in its 2016 state with amendments expected over the next few years.

 

Companies can use centralized log management to help them comply with Turkey’s PDPL by leveraging security analytics to help mitigate data breach risks.

 

What is the Personal Data Protection Law (PDPL)?

Ratified on March 24, 2016, the Turkish PDPL aims to protect people’s fundamental privacy rights when companies process personal data. The law defines data subjects’ rights and companies’ obligations to protect those rights.

 

The Turkish PDPL applies to two types of organizations:

 

Chapter 6 established the Personal Data Protection Authority (KVKK), defining its duties as follows:

 

Additionally, Article 21 established the Personal Data Protection Board, defining its duties in Article 22 as:

 

What data and activities does the PDPL cover?

As with many privacy laws, the PDPL defines personal data as any information relating to an identified or identifiable natural person. However, it also includes the following categories of “special categories” of personal data:

 

The PDPL defines data subjects’ personal data as “any information relating to an identified or identifiable natural person.” Processing of personal data includes manual or automated operations that include:

 

What are key provisions contained in Turkey’s Personal Data Protection Law?

At a high level, the PDPL outlines the five general principles that companies must comply with when processing personal data:

Condition for processing personal data

When processing personal data, companies need to gain explicit consent from the data subject.

The PDPL defines the following exceptions to the explicit consent requirement:

The law prohibits processing of most special categories of personal data without obtaining data subjects’ explicit consent.

Erasure, destruction, or anonymization of personal data

Data subjects have the right to ask data controllers to erase, destroy, or anonymize any personal data they collect, store, or process.

Transfer of personal data domestically and abroad

Unless transferring data under one of the law’s exceptions, data controllers and data processors cannot transfer personal data at home or abroad without gaining the data subject’s explicit consent.

When transferring data outside Turkey, companies must ensure that the country provides adequate protections or that they obtain written commitment for adequate protections as approved by the KVKK.

Informed Consent

Data controllers must inform data subjects that they are collecting personal data and provide:

 

Data subjects have the right to ask the data controllers:

Data Security

Data controllers must implement appropriate data security using technical and organizational controls for personal data to :

 

Data controllers share data security responsibilities with their data processors so must carry out the necessary audits to ensure data processors’ compliance.

Data controllers are responsible for notifying data subjects and the KVKK when a data breach occurs.

Data Controllers’ Registry

Before processing personal data, companies must register with the Data Controllers’ Registry and provide:

Fines and penalties

Crimes concerning personal data fall under Articles 135 to 140 of Turkish Penal Code No. 5237 of 26/9/2004. Specifically, companies that fail to erase or anonymize personal data are subject to Article 138 of Law No. 5237.

Additionally, the PDPL outlines the following administrative fines for compliance violations:

 

Data Breach Notification Requirements

In 2019, the Personal Data Protection Board (the Board) published Decision No. 2019/10 of 24.01.2019 about Procedures and Principles of Personal Data Breach Notification (Decision No. 2019/10). In Decision 2019/10 the Board outlined the following notification timelines:

 

Centralized Log Management for Compliance with Turkish Personal Data Protection Law

 

While the PDPL may not provide technical details, some of the Board Decisions offer insights into how it reviews incidents and applies administrative fines.

In 2019, the Board fined several organizations and published decisions explaining its reasons, including:

 

Using a centralized log management solution with security analytics, companies can comply with the current iteration of the PDPL while implementing robust security monitoring processes that enable compliance with future iterations of the law.

When paired with security analytics, centralized log management streamlines security monitoring by providing visibility into:

 

Further, organizations that incorporate user and entity behavior analytics (UEBA) into their monitoring gain capabilities like:

 

Access Monitoring

In a complex environment, centralized log management solutions enable robust access monitoring when paired with UEBA and identity and access management (IAM) tools.

 

 

With these embedded analytics, you can manage security issues like:

Network Security

By correlating and analyzing data generated by various network security monitoring tools, centralized log management enables you to create high-fidelity alerts to detect suspicious behavior that might indicate a security incident.

For example, since firewalls provide insight into suspicious traffic, like data traveling to a cybercriminal-controlled server, combining that data with your intrusion detection system (IDS)/intrusion prevention system (IPS) enables you to monitor for evasion techniques.

 

 

 

After identifying normal network traffic baselines, you can use security analytics to implement better detections or abnormal activity.

 

 

Data Exfiltration

Increasingly, ransomware and malware attacks steal data, so monitoring systems for data exfiltration is critical to detecting incidents quickly.

To create high-fidelity alerts, you can build dashboards that incorporate security analytics and threat intelligence. When the centralized log management solution includes lightning-fast investigation capabilities, you can reduce compliance violation risks by meeting the 72-hour timeline.

With network monitoring, antivirus logs, and UEBA, you can create detection rules to identify anomalous data downloads that indicate a potential incident.

 

Incident response and automated threat hunting

To mature your incident investigation and response program, you can use rapid research and proactive threat hunting for more robust processes.

By creating queries using parameters, you can optimize searches for real-time insights and answers. Instead of searching for specific values, parameterized searches give you the flexibility you need to automated advanced threat hunting, helping you gain visibility into:

 

Compliance and post-incident reporting

When you can create dashboards in your centralized log management solution, you can use the visualizations to give people an easy-to-digest report that shares deeply technical information using charts or graphs so the security incident evaluation makes sense to them.

For example, you can build out dashboards that provide reports showing:

 

Graylog Security: Future-Proof Compliance with Security Analytics

 

With Graylog Security’s analytics and anomaly detection capabilities, you can create a security and compliance program that enables you to meet current PDPL requirements and prepare for future ones. Graylog Security provides prebuilt search templates, dashboards, correlated alerts, and dynamic look-up tables so that you can accelerate your security and compliance programs with one cost-effective solution.

Using our high-fidelity detections and lightning-fast search capabilities, you can rapidly investigate incidents with our intuitive user interface. Graylog Security gives you all the functionality you need to protect data and document your compliance activities.

To see how Graylog Security can help you comply with the Turkish PDPL, contact us today.

 

Exit mobile version