๐ง GDPR Myths โ Getting Data Out of Data Processor Applications
๐ค The mystery of projects: obligations are crystal clear on paper, yet somehow become foggy in practice.
๐ Availability & Access
โ Why itโs Wrong | โ Reality Check |
---|---|
GDPR doesnโt excuse you because your tool canโt export it โ the legal obligation overrides technical convenience. | Find a way: APIs, database queries, vendor-provided exports, or even screenshots if necessary. |
โ Why itโs Wrong | โ Reality Check |
---|---|
Limiting disclosure to built-in reports ignores the right of access to all personal data held. | Personal data is any data relating to an identifiable person โ not just whatโs in your canned reports. |
โ Why itโs Wrong | โ Reality Check |
---|---|
The controller/processor must know their own data schema โ users shouldnโt reverse engineer your system. | Maintain a Record of Processing Activities (ROPA) and data map so you can extract without user-supplied table specs. |
โ Why itโs Wrong | โ Reality Check |
---|---|
If identifiers need lookups to be meaningful, those lookups are part of the personal data. | Include reference data and explain codes so the requester can understand their data. |
โ Why itโs Wrong | โ Reality Check |
---|---|
API limitations are a tooling choice โ not a legal basis to withhold data. | Use backend access, database queries, or vendor engineering support. |
๐ก๏ธ Security & Legal Duties
โ Why itโs Wrong | โ Reality Check |
---|---|
Security measures are to prevent unauthorised access โ they donโt block lawful access by the data subject or controller. | Apply secure transfer, lawful redaction, and proper authentication โ but still deliver the data. |
โ Why itโs Wrong | โ Reality Check |
---|---|
GDPR Article 28 gives processors direct obligations to assist the controller in meeting data subject rights. | Work with the controller to fulfil requests; your contract should reflect this. |
โ Why itโs Wrong | โ Reality Check |
---|---|
Mixed records must be separated or redacted โ not withheld entirely. | Use redaction tools or splitting to protect othersโ rights. |
๐๏ธ Retention & Scope
โ Why itโs Wrong | โ Reality Check |
---|---|
If you delete data outside a documented retention schedule, you risk non-compliance. | Retain per the agreed retention policy; deletion must be lawful, proportionate, and documented. |
โ Why itโs Wrong | โ Reality Check |
---|---|
Requests can be narrowed for practicality, but โtoo broadโ isnโt an automatic opt-out. | Engage with the requester to scope, but still meet your legal duties. |
โ Why itโs Wrong | โ Reality Check |
---|---|
GDPR covers data at the time of the request, but past versions may be relevant for some rights. | Where held, provide historical data or note lawful deletion. |
๐ Format & Structure
โ Why itโs Wrong | โ Reality Check |
---|---|
GDPR doesnโt require pretty output โ only that itโs intelligible to the requester. | Provide CSV, XML, JSON, or plain text โ plus a key or explanation if needed. |
โ Why itโs Wrong | โ Reality Check |
---|---|
GDPR covers all personal data, whether in a database, PDF, audio file, chat log, or sticky note scan. | Search across structured, semi-structured, and unstructured stores. |
โ Why itโs Wrong | โ Reality Check |
---|---|
Files often contain the richest personal data. | Search attachments, uploads, and linked storage locations. |
๐ฐ Cost & Charge
โ Why itโs Wrong | โ Reality Check |
---|---|
Under GDPR, the first copy must be free unless requests are manifestly unfounded or excessive. | Only charge in rare, justified cases โ and be ready to prove it. |
๐ Derived & Log Data
โ Why itโs Wrong | โ Reality Check |
---|---|
Personal data includes derived data, profiles, and inferred information about the person. | Include calculated scores, risk ratings, and other derived personal data. |
โ Why itโs Wrong | โ Reality Check |
---|---|
Logs often contain IP addresses, usernames, or actions โ all personal data. | Search and redact as necessary, but logs are still in scope. |
๐ต๏ธ Pseudonymisation
โ Why itโs Wrong | โ Reality Check |
---|---|
If you can reverse the pseudonymisation, itโs still personal data. | True anonymisation is irreversible โ rare in practice. |
๐ Data Masking Techniques; Compliance Matrix for your back pocket (click-2-expand)
Quick reference for when youโre in a design review and someone says โbut does it tick the GDPR / PCI / HIPAA boxes?โ โ hereโs the answer without having to dig through 400 pages of legalese.
Technique | Type | Description | GDPR | PCI-DSS | HIPAA | ISO 27001 |
---|---|---|---|---|---|---|
Encryption | Reversible | Transforms data with a cryptographic key; decryptable with the right key. | โ Strong encryption meets Art. 32 | โ Req. 3 & 4 | โ Meets encryption safeguard | โ Annex A.10.1 |
Tokenisation | Reversible | Replaces sensitive values with non-sensitive tokens stored in a secure vault. | โ Pseudonymisation under Recital 26 | โ Alternative to encryption for card data | โ Suitable for PHI de-identification | โ Annex A.9 & A.18 |
Format-Preserving Encryption (FPE) | Reversible | Encrypts data but keeps original format (e.g., 16-digit card stays 16 digits). | โ Meets pseudonymisation criteria | โ PCI-approved method | โ OK for HIPAA safe harbor | โ Annex A.10 |
Deterministic Substitution | Reversible | Consistently replaces data with a mapped alternative from a lookup table. | โ Pseudonymisation | โ If applied to PAN before storage | โ Meets limited data set criteria | โ Annex A.14 |
Randomisation / Shuffling | Non-Reversible | Reorders or replaces data values randomly to break link to original subject. | โ Full anonymisation | โ Meets masking requirements | โ PHI removal | โ Annex A.18.1 |
Generalisation | Non-Reversible | Replaces specific data with broader categories (e.g., DOB โ Year). | โ k-anonymity compliance | โ Allowed if PAN not stored | โ Meets HIPAA de-identification | โ Annex A.9.4 |
Noise Addition / Perturbation | Non-Reversible | Adds small, random changes to numeric values to preserve stats but hide identities. | โ Differential privacy fit | โ Works for PCI if no actual PAN | โ OK for HIPAA safe harbor | โ Annex A.18 |
Redaction / Nulling | Non-Reversible | Replaces with null, blanks, or partial masking (e.g., ****1234). | โ GDPR display-only safe | โ PCI display masking rule | โ PHI display protection | โ Annex A.9 |