{"id":5817,"date":"2021-09-18T19:03:10","date_gmt":"2021-09-18T19:03:10","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=5817"},"modified":"2021-09-18T19:03:10","modified_gmt":"2021-09-18T19:03:10","slug":"a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/","title":{"rendered":"A Solution to Schrems II and the Security of Transatlantic Data Flows"},"content":{"rendered":"<p>This blog post contains information about the EDPB guidance for data protection, how to establish a trusted security framework for moving forward, and how the unified approach to data protection that Thales employs can help organizations. Please contact Abrahams Consulting LLC for more information about Thales Data Protection solutions. \u202f<\/p>\n<p><a href=\"https:\/\/stuf.in\/b79ywp\" target=\"_blank\" rel=\"noopener\">Read More&#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the EDPB guidance for data protection, how to establish a trusted security framework for moving forward, and how the unified approach to data protection that #Thales employs can help your business. Read this blog post, courtesy of Abrahams Consulting LLC.\u202f<\/p>\n","protected":false},"author":2,"featured_media":5816,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-5817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Solution to Schrems II and the Security of Transatlantic Data Flows - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Solution to Schrems II and the Security of Transatlantic Data Flows - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Learn about the EDPB guidance for data protection, how to establish a trusted security framework for moving forward, and how the unified approach to data protection that #Thales employs can help your business. Read this blog post, courtesy of Abrahams Consulting LLC.\u202f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-18T19:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"57\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"A Solution to Schrems II and the Security of Transatlantic Data Flows\",\"datePublished\":\"2021-09-18T19:03:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\"},\"wordCount\":63,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\",\"name\":\"A Solution to Schrems II and the Security of Transatlantic Data Flows - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png\",\"datePublished\":\"2021-09-18T19:03:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png\",\"width\":250,\"height\":57},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Solution to Schrems II and the Security of Transatlantic Data Flows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Solution to Schrems II and the Security of Transatlantic Data Flows - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/","og_locale":"en_US","og_type":"article","og_title":"A Solution to Schrems II and the Security of Transatlantic Data Flows - TechTonic Times","og_description":"Learn about the EDPB guidance for data protection, how to establish a trusted security framework for moving forward, and how the unified approach to data protection that #Thales employs can help your business. Read this blog post, courtesy of Abrahams Consulting LLC.\u202f","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/","og_site_name":"TechTonic Times","article_published_time":"2021-09-18T19:03:10+00:00","og_image":[{"width":250,"height":57,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png","type":"image\/png"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"A Solution to Schrems II and the Security of Transatlantic Data Flows","datePublished":"2021-09-18T19:03:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/"},"wordCount":63,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/","name":"A Solution to Schrems II and the Security of Transatlantic Data Flows - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png","datePublished":"2021-09-18T19:03:10+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/thales_logo_white-1.png","width":250,"height":57},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-solution-to-schrems-ii-and-the-security-of-transatlantic-data-flows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Solution to Schrems II and the Security of Transatlantic Data Flows"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=5817"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5817\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/5816"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=5817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=5817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=5817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}