Skip to content
  • Fortra-Logo-TM-SkyBlue
  • File Sharing & DRM Blog
    • Digital Rights Management
    • Secure File Sharing & Compliance
    • Intellectual Property Protection
  • Partners
  • Company
    • About Us
    • Leadership
    • Careers
    • Contact Us
  • Support
  • Contact
  • Search
yH5BAEAAAAALAAAAAABAAEAAAIBRAA7
  • Why Vera?
  • Product
  • Solutions
    • By Industry
      • Manufacturing
      • Media & Entertainment
      • Financial Services
      • Venture Capital & PE
      • Technology
      • Healthcare
    • By Technology
      • DRM
      • Data Classification
      • DLP
      • Secure File Transfer
      • CASB
      • Office365
    • Column 3
  • Customers
  • Resources
  • Pricing
  • Book a Demo
    Book a Demo
Vera  »  Secure Collaboration   »   Making sense of the GDPR: Balancing privacy, authorized access, and state-of-the-art
Back to Blog
PrevPrevious
NextNext
GDPR-Blog-Image

Making sense of the GDPR: Balancing privacy, authorized access, and state-of-the-art

  • May 25, 2017


The GDPR was put in place for the greater good, to help ensure that any E.U. citizen’s data is protected and accounted for, no matter where it’s created, shared, and stored. It also gives organizations the impetus to inspect and improve their privacy guarantees if they aren’t already compliant. Certainly, we’re huge fans of any legislation that can accomplish those ends here at Vera.

While some of the tenets of the law are clear and straightforward (harmonize data privacy across Europe, protect and empower all EU citizens, and reshape the way organizations approach data privacy) there are a few areas where the language is vague and the technical challenges can be quite high.

In our conversations with privacy experts and security and risk teams, we consistently hear questions about how best to comply with the clauses covering anonymization, encryption, and system design.

More specifically, after organizations identify which data they need to protect, they then have to plan for:

  • Requirements for personal information to be anonymized or encrypted
  • The need to protect against unauthorized access to user data
  • Data protection by design
  • Data protection by default

This is the toughest step for most organizations, and it’s compounded by the fact that many of these clauses in the GDPR aren’t prescriptive. That’s mainly because the regulation doesn’t want to make itself out of date, and both data controllers and data processors need the flexibility to align their business processes now and into the future (that’s where state-of-the-art starts to matter). At Vera, we believe we have a responsibility to share how we’re addressing these new requirements, and how we’re helping our customers do the same.

Let’s start with encryption. The GDPR’s broad aim is to protect personal data, which similar to existing HIPAA guidelines includes any individually identifying data like name, location data, identification numbers, IP addresses, cookie data, and RFID tags. The GDPR also defines a new class of “special categories of data” that needs a more stringent level of protection. This class includes health data, genetic data, biometric data, racial or ethnic data, political opinions and sexual orientation. It’s a long list, to be sure.

Simple, always-on encryption is a great first step for companies looking to meet deadlines.

But simple encryption at rest and in transit isn’t enough, and companies evaluating this set of requirements in isolation will run into trouble down the road. Under the law, this data must be protected against unauthorized access and used for only specific purposes – and that use must be monitored and controlled dynamically over time. This is something organizations aren’t used to complying with. Strict access controls and dynamic usage policies are critical tools here. In the event of a breach or a compromise, this will mitigate the damage that a hacker can cause and also provides an audit trail of who has access and what actions they’ve taken.

This is why taking a data-centric approach to encryption and anonymization is critical – when GDPR-sized fines are looming, it’s not enough to deploy device or full-disk encryption. To limit the damage and scope of a breach notification, individual records should be protected uniquely, preventing a single attacker or identity getting access to the entire dataset.

Next up: the tricky dual requirement for data “protection by default,” and “protection by design.” The VERA platform covers both ‘data by default’ and ‘data by design’ by protecting content in applications and on devices where those services don’t comply. VERA adds the ability to automatically protect data by default, no matter what kind of data it is. What’s more, with our platform, always-on protection can be added by design into any application.

Breaches are no fun for anyone. Companies take major hits in their pocketbooks, reputation, and brand as a whole. Users lose confidence and tend to move their information and business elsewhere. The GDPR will now mandate that in the event of a compromise or breach, companies need to notify anyone whose data may have been subject to the breach/compromise, within 72 hours.

Most companies are still in the process of assessing their security infrastructures to find gaps in their EU GDPR compliance, but they can start by looking into a more data-centric security approach. Data-centric security helps mitigate these risks by providing tools that encrypt data, provide dynamic access controls, and automatically provide audit logs to ensure only privileged individuals have access to that data at all times.

I’m having this same conversation with our customers, helping to align our solutions to their roadmap. I’d be happy to have the same conversation with your team. Send me a note, and I’d be happy to set something up.

Recent Posts

  • What Is Digital Watermarking? March 24, 2023
  • What Is Data Classification & Why Is It Important? March 12, 2023
  • What Is Data Leakage? Protecting Your Data with DLP March 3, 2023
  • What Is Data Centric Security? February 21, 2023
  • What Is Network Data Loss Prevention vs Endpoint DLP? February 14, 2023

Learn where DRM fits in your data protection strategy

Get started

Back to Blog
PrevPrevious
NextNext

Featured Resources

Intellectual property is the lifeblood of any manufacturing company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

In media and entertainment, content is king. To protect that content, you need a security model that puts the data first so that your content remains secure no matter where it goes, how it gets there, or who handles it. At Vera, that’s what we do.

Read eBook

Data is the lifeblood of any technology company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

Load More

News

Press

Events

Awards

File Sharing & DRM Blog

Digital Rights Management

Secure File Sharing & Compliance

Intellectual Property Protection

Follow Us

Twitter Linkedin-in Facebook-f Youtube
Copyright © Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective owners. Terms of Service |  Privacy Policy  |  Cookie Policy  | Contact Us

Before you go, check out these resources

Intellectual property is the lifeblood of any manufacturing company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

In media and entertainment, content is king. To protect that content, you need a security model that puts the data first so that your content remains secure no matter where it goes, how it gets there, or who handles it. At Vera, that’s what we do.

Read eBook

Data is the lifeblood of any technology company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

Data is a crucial and pervasive asset of any healthcare organization, but to safeguard your most valuable information—as well as that of your patients—there needs to be a shift in the data security…

Read eBook

While Data Loss Prevention (DLP) provides value in certain cases, (such as preventing the loss of data, internally), it does not solve the fundamental problem facing organizations — how to keep data secure in the real world where content moves and is always accessible.

Read Solution Brief

The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. The ability to collaborate freely and securely beyond corporate borders is a must in today’s digital economy. 

Read Solutions Brief

Ever wonder what use cases VERA covers? Now’s your chance. By no means is this an exhaustive list, but we’ve compiled the top 10 most common use cases we see and how you can implement VERA to protect your most sensitive information easily.

Read White Paper

Many organizations have needs for file security and access control that cannot sufficiently be met with “off the shelf” solutions. As a result, they often build their own custom applications to achieve their goals.

Read White Paper

View All Resources