GDPR - Its Complicated.

One Example Of the Complexity Businesses Have To Face to Become GDPR Compliant is Document Handling. 

An Many firms deploy document management solutions. This can range from Alfresco to DocuWare, SharePoint to IBM Content Manager. They deploy these solutions to provide structured organisation and control of documents; enable search; provide document security, audit, versioning and provide the capability to manage retention.

The one thing they are not easily capable of is identifying and separating personally identifiable information (PII) from everything else in each document. As such, any document that contains PII must be treated in its entirety as sensitive under GDPR.

Access to Documents
GDPR requires control over access and the ability to obtain large volumes of documents must be prevented. Clearly good security policies will implement access restrictions but GDPR necessitates a review of System Administrator, Help-Desk and Support staff access.
We all know of stories where employees boast they still have access to their email years after they leave a company. Processes must be robustly implemented to grant or remove access to PII when staff join, move within or exit the company.

Encryption of Documents
GDPR requires “encryption at rest”. For most document management solutions this is a feature that is easily enabled. However, when documents are “Checked out” and being worked on, the documents are often moved to local storage which is rarely encrypted. To be compliant with GDPR, documents must remain encrypted whether stored in document management, in-transit, stored locally or when backed up for disaster recovery.

Additionally, if you are implementing a new document management solution or upgrading your existing solution, documents copied and used for testing must also be encrypted and any sensitive information viewable only to those with legitimate access. Where possible, documents used for this purpose should be anonymised to avoid accidental breach.

Remote Working
Implementing controls for remote workers to remain compliant with GDPR is complex. Documents could be placed on personal equipment or moved into public Cloud solutions like DropBox, Google Docs, etc. This creates a potential exposure that must be addressed to ensure compliance.

Breach Notification
GDPR requires a firm to notify the ICO within 72 hours of a breach. Data breaches can be very minor, for example, a breach occurs if an employee with legitimate access puts a document into a Dropbox folder. Such a breach must be notified to the ICO and to the data subject. 

If you can prove to the ICO that the document is encrypted, then you are removed from the obligation to report the breach to the data subject. However, you must still report it to the ICO.

The fines under GDPR are proportional to action / in-action. However, they are designed to be punitive. For such a breach as described above it is unlikely you will receive the maximum fine (€20M or 4% of your worldwide turnover, whichever is the greater) but the breach will not come cheap and failure to notify will be very expensive. 

Firms that have followed best practice and made reasonable efforts to be compliant will be seen in a better light than organisations which have ignored the regulation.

Planning for a Breach
Hope for the best but plan for the worst! Sage Advice that you should heed. Identify a DPO (Data Protection Officer) and task your DPO to create and test action plans to mitigate any breaches that do occur, so that a positive dialogue can be started with the ICO at the start of an incident.

Other Processes
So far we have focused on access to document, but GDPR has granted eight rights to EU citizens. All of these rights affect document processing no matter where in the world the data is stored and processed or where the processing company is domiciled. The eight rights granted to EU citizens are:

1. Right to be Informed – Companies must be transparent in the disclosure of what Personally Identifiable Information (PII) is collected and how it is used. This is normally achieved through a Privacy Notice
2. Right to Access – On request you must be able to inform a data subject what information you hold about them and what you are doing with it. This information must be provided free of charge.
3. Right to Rectification –  Individuals are entitled to have personal data rectified if it is inaccurate or incomplete. If you have disclosed the personal data in question to third parties, you must inform them of the rectification where possible. You must also inform the individuals about the third parties to whom the data has been disclosed where appropriate.
4. Right to Erasure –  The right to erasure is also known as ‘the right to be forgotten’. The broad principle underpinning this right is to enable an individual to request the deletion or removal of personal data where there is no compelling reason for its continued processing.
5. Right to Restrict Processing –  Individuals have a right to ‘block’ or suppress processing of personal data. When processing is restricted, you are permitted to store the personal data, but not further process it. You can retain just enough information about the individual to ensure that the restriction is respected in future.
6. Right to Data Portability – The right to data portability allows individuals to obtain and reuse their personal data for their own purposes across different services. It allows them to move, copy or transfer personal data easily from one IT environment to another in a safe and secure way, without hindrance to usability.
7. Right to Object – Individuals have the right to object to:

a) processing based on legitimate interests or the performance of a task in the public interest/exercise of official authority (including profiling);
b) direct marketing (including profiling); and
c) processing for purposes of scientific/historical research and statistics.

8. Rights related to automated decision making and profiling – The GDPR provides safeguards for individuals against the risk that a potentially damaging decision is taken without human intervention.  You should identify whether any of your processing operations constitute automated decision making and consider whether you need to update your procedures to deal with the requirements of the GDPR.

Summary
You should treat GDPR as the stimulus to review you existing data handling and document management systems and processes to ensure they are aligned with current industry standards and best practices. Old versions of software, weak access controls and a poor data security culture weakens your position under GDPR and plans for improvement will be mandatory.

GDPR Guys

This Blog is written by Peter Borner of The GDPR Guys – to contact them  Click Here

You Might Also Read: 

The New GDPR Rules Focus On Consumer Protection:

Directors Who Conceal Cyber Attacks Could Face Prison:

GDPR Will Impact Data Management In The USA:

 

« When Terrorists Learn How to Hack
Social Media Is 'Ripping Society Apart' »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.

AFINE

AFINE

AFINE is a trusted advisor in the field of cybersecurity and pentesting.