GDPR - Its Complicated.

One Example Of the Complexity Businesses Have To Face to Become GDPR Compliant is Document Handling. 

An Many firms deploy document management solutions. This can range from Alfresco to DocuWare, SharePoint to IBM Content Manager. They deploy these solutions to provide structured organisation and control of documents; enable search; provide document security, audit, versioning and provide the capability to manage retention.

The one thing they are not easily capable of is identifying and separating personally identifiable information (PII) from everything else in each document. As such, any document that contains PII must be treated in its entirety as sensitive under GDPR.

Access to Documents
GDPR requires control over access and the ability to obtain large volumes of documents must be prevented. Clearly good security policies will implement access restrictions but GDPR necessitates a review of System Administrator, Help-Desk and Support staff access.
We all know of stories where employees boast they still have access to their email years after they leave a company. Processes must be robustly implemented to grant or remove access to PII when staff join, move within or exit the company.

Encryption of Documents
GDPR requires “encryption at rest”. For most document management solutions this is a feature that is easily enabled. However, when documents are “Checked out” and being worked on, the documents are often moved to local storage which is rarely encrypted. To be compliant with GDPR, documents must remain encrypted whether stored in document management, in-transit, stored locally or when backed up for disaster recovery.

Additionally, if you are implementing a new document management solution or upgrading your existing solution, documents copied and used for testing must also be encrypted and any sensitive information viewable only to those with legitimate access. Where possible, documents used for this purpose should be anonymised to avoid accidental breach.

Remote Working
Implementing controls for remote workers to remain compliant with GDPR is complex. Documents could be placed on personal equipment or moved into public Cloud solutions like DropBox, Google Docs, etc. This creates a potential exposure that must be addressed to ensure compliance.

Breach Notification
GDPR requires a firm to notify the ICO within 72 hours of a breach. Data breaches can be very minor, for example, a breach occurs if an employee with legitimate access puts a document into a Dropbox folder. Such a breach must be notified to the ICO and to the data subject. 

If you can prove to the ICO that the document is encrypted, then you are removed from the obligation to report the breach to the data subject. However, you must still report it to the ICO.

The fines under GDPR are proportional to action / in-action. However, they are designed to be punitive. For such a breach as described above it is unlikely you will receive the maximum fine (€20M or 4% of your worldwide turnover, whichever is the greater) but the breach will not come cheap and failure to notify will be very expensive. 

Firms that have followed best practice and made reasonable efforts to be compliant will be seen in a better light than organisations which have ignored the regulation.

Planning for a Breach
Hope for the best but plan for the worst! Sage Advice that you should heed. Identify a DPO (Data Protection Officer) and task your DPO to create and test action plans to mitigate any breaches that do occur, so that a positive dialogue can be started with the ICO at the start of an incident.

Other Processes
So far we have focused on access to document, but GDPR has granted eight rights to EU citizens. All of these rights affect document processing no matter where in the world the data is stored and processed or where the processing company is domiciled. The eight rights granted to EU citizens are:

1. Right to be Informed – Companies must be transparent in the disclosure of what Personally Identifiable Information (PII) is collected and how it is used. This is normally achieved through a Privacy Notice
2. Right to Access – On request you must be able to inform a data subject what information you hold about them and what you are doing with it. This information must be provided free of charge.
3. Right to Rectification –  Individuals are entitled to have personal data rectified if it is inaccurate or incomplete. If you have disclosed the personal data in question to third parties, you must inform them of the rectification where possible. You must also inform the individuals about the third parties to whom the data has been disclosed where appropriate.
4. Right to Erasure –  The right to erasure is also known as ‘the right to be forgotten’. The broad principle underpinning this right is to enable an individual to request the deletion or removal of personal data where there is no compelling reason for its continued processing.
5. Right to Restrict Processing –  Individuals have a right to ‘block’ or suppress processing of personal data. When processing is restricted, you are permitted to store the personal data, but not further process it. You can retain just enough information about the individual to ensure that the restriction is respected in future.
6. Right to Data Portability – The right to data portability allows individuals to obtain and reuse their personal data for their own purposes across different services. It allows them to move, copy or transfer personal data easily from one IT environment to another in a safe and secure way, without hindrance to usability.
7. Right to Object – Individuals have the right to object to:

a) processing based on legitimate interests or the performance of a task in the public interest/exercise of official authority (including profiling);
b) direct marketing (including profiling); and
c) processing for purposes of scientific/historical research and statistics.

8. Rights related to automated decision making and profiling – The GDPR provides safeguards for individuals against the risk that a potentially damaging decision is taken without human intervention.  You should identify whether any of your processing operations constitute automated decision making and consider whether you need to update your procedures to deal with the requirements of the GDPR.

Summary
You should treat GDPR as the stimulus to review you existing data handling and document management systems and processes to ensure they are aligned with current industry standards and best practices. Old versions of software, weak access controls and a poor data security culture weakens your position under GDPR and plans for improvement will be mandatory.

GDPR Guys

This Blog is written by Peter Borner of The GDPR Guys – to contact them  Click Here

You Might Also Read: 

The New GDPR Rules Focus On Consumer Protection:

Directors Who Conceal Cyber Attacks Could Face Prison:

GDPR Will Impact Data Management In The USA:

 

« When Terrorists Learn How to Hack
Social Media Is 'Ripping Society Apart' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.