The first big step towards data protection was taken in 2018. In an earlier blog article, we wrote the following about this: the General Data Protection Regulation (GDPR or AVG in the Netherlands), which came into force in 2018 within the European Union, has ensured a much stricter handling of privacy-sensitive and personal data. Individuals are entitled to have privacy-sensitive data protected, but also accessible to them so that they can view it and decide whether data should be modified or deleted. In addition, more and more data sovereignty legislation is emerging: personal data is subject to the laws of the sovereign state in which the data was produced. In other words, if a Dutch citizen from the Netherlands creates data or leaves his data somewhere, it is protected by Dutch (and EU) privacy rules. A central aspect of this legislation is the physical location of the data, in other words data residency: many countries require organisations, which operate in a particular country, to store data regarding residents on servers located within the country's borders.
Governance in data protection is therefore an ongoing process, for instance, the EU Data Act (4) may come into force as of mid-2025 and the advent of NIS2 (5) should increase the data resilience of organisations. By complying with these rules, you can also ensure for yourself that you are keeping your data in control.
How? Through the second step: classifying data. Data classification is nothing but assigning a certain value to data to determine its level of protection. Today, we see organisations classifying data based on, for example, confidentiality and business impact in case of data loss. Thus, there are all different types of data, all of which can land in a different kind of Cloud, each with its own level of protection and certifications. To protect your most critical data, for instance, it is best to opt for a sovereign Cloud. Therefore, data sovereignty actually starts with data classification, in order to provide specific guarantees on things like data identity and protection.