๐Ÿง  GDPR Myths โ€” Getting Data Out of Data Processor Applications

๐Ÿค” The mystery of projects: obligations are crystal clear on paper, yet somehow become foggy in practice.

๐Ÿ“‚ Availability & Access
โŒ Why itโ€™s Wrong โœ… Reality Check
GDPR doesnโ€™t excuse you because your tool canโ€™t export it โ€” the legal obligation overrides technical convenience. Find a way: APIs, database queries, vendor-provided exports, or even screenshots if necessary.
โŒ Why itโ€™s Wrong โœ… Reality Check
Limiting disclosure to built-in reports ignores the right of access to all personal data held. Personal data is any data relating to an identifiable person โ€” not just whatโ€™s in your canned reports.
โŒ Why itโ€™s Wrong โœ… Reality Check
The controller/processor must know their own data schema โ€” users shouldnโ€™t reverse engineer your system. Maintain a Record of Processing Activities (ROPA) and data map so you can extract without user-supplied table specs.
โŒ Why itโ€™s Wrong โœ… Reality Check
If identifiers need lookups to be meaningful, those lookups are part of the personal data. Include reference data and explain codes so the requester can understand their data.
โŒ Why itโ€™s Wrong โœ… Reality Check
API limitations are a tooling choice โ€” not a legal basis to withhold data. Use backend access, database queries, or vendor engineering support.
๐Ÿ›ก๏ธ Security & Legal Duties
โŒ Why itโ€™s Wrong โœ… Reality Check
Security measures are to prevent unauthorised access โ€” they donโ€™t block lawful access by the data subject or controller. Apply secure transfer, lawful redaction, and proper authentication โ€” but still deliver the data.
โŒ Why itโ€™s Wrong โœ… Reality Check
GDPR Article 28 gives processors direct obligations to assist the controller in meeting data subject rights. Work with the controller to fulfil requests; your contract should reflect this.
โŒ Why itโ€™s Wrong โœ… Reality Check
Mixed records must be separated or redacted โ€” not withheld entirely. Use redaction tools or splitting to protect othersโ€™ rights.
๐Ÿ—„๏ธ Retention & Scope
โŒ Why itโ€™s Wrong โœ… Reality Check
If you delete data outside a documented retention schedule, you risk non-compliance. Retain per the agreed retention policy; deletion must be lawful, proportionate, and documented.
โŒ Why itโ€™s Wrong โœ… Reality Check
Requests can be narrowed for practicality, but โ€œtoo broadโ€ isnโ€™t an automatic opt-out. Engage with the requester to scope, but still meet your legal duties.
โŒ Why itโ€™s Wrong โœ… Reality Check
GDPR covers data at the time of the request, but past versions may be relevant for some rights. Where held, provide historical data or note lawful deletion.
๐Ÿ“‘ Format & Structure
โŒ Why itโ€™s Wrong โœ… Reality Check
GDPR doesnโ€™t require pretty output โ€” only that itโ€™s intelligible to the requester. Provide CSV, XML, JSON, or plain text โ€” plus a key or explanation if needed.
โŒ Why itโ€™s Wrong โœ… Reality Check
GDPR covers all personal data, whether in a database, PDF, audio file, chat log, or sticky note scan. Search across structured, semi-structured, and unstructured stores.
โŒ Why itโ€™s Wrong โœ… Reality Check
Files often contain the richest personal data. Search attachments, uploads, and linked storage locations.
๐Ÿ’ฐ Cost & Charge
โŒ Why itโ€™s Wrong โœ… Reality Check
Under GDPR, the first copy must be free unless requests are manifestly unfounded or excessive. Only charge in rare, justified cases โ€” and be ready to prove it.
๐Ÿ“Š Derived & Log Data
โŒ Why itโ€™s Wrong โœ… Reality Check
Personal data includes derived data, profiles, and inferred information about the person. Include calculated scores, risk ratings, and other derived personal data.
โŒ Why itโ€™s Wrong โœ… Reality Check
Logs often contain IP addresses, usernames, or actions โ€” all personal data. Search and redact as necessary, but logs are still in scope.
๐Ÿ•ต๏ธ Pseudonymisation
โŒ Why itโ€™s Wrong โœ… Reality Check
If you can reverse the pseudonymisation, itโ€™s still personal data. True anonymisation is irreversible โ€” rare in practice.

๐Ÿ”’ Data Masking Techniques; Compliance Matrix for your back pocket (click-2-expand)

Quick reference for when youโ€™re in a design review and someone says โ€œbut does it tick the GDPR / PCI / HIPAA boxes?โ€ โ€” hereโ€™s the answer without having to dig through 400 pages of legalese.

Technique Type Description GDPR PCI-DSS HIPAA ISO 27001
Encryption Reversible Transforms data with a cryptographic key; decryptable with the right key. โœ” Strong encryption meets Art. 32 โœ” Req. 3 & 4 โœ” Meets encryption safeguard โœ” Annex A.10.1
Tokenisation Reversible Replaces sensitive values with non-sensitive tokens stored in a secure vault. โœ” Pseudonymisation under Recital 26 โœ” Alternative to encryption for card data โœ” Suitable for PHI de-identification โœ” Annex A.9 & A.18
Format-Preserving Encryption (FPE) Reversible Encrypts data but keeps original format (e.g., 16-digit card stays 16 digits). โœ” Meets pseudonymisation criteria โœ” PCI-approved method โœ” OK for HIPAA safe harbor โœ” Annex A.10
Deterministic Substitution Reversible Consistently replaces data with a mapped alternative from a lookup table. โœ” Pseudonymisation โœ” If applied to PAN before storage โœ” Meets limited data set criteria โœ” Annex A.14
Randomisation / Shuffling Non-Reversible Reorders or replaces data values randomly to break link to original subject. โœ” Full anonymisation โœ” Meets masking requirements โœ” PHI removal โœ” Annex A.18.1
Generalisation Non-Reversible Replaces specific data with broader categories (e.g., DOB โ†’ Year). โœ” k-anonymity compliance โœ” Allowed if PAN not stored โœ” Meets HIPAA de-identification โœ” Annex A.9.4
Noise Addition / Perturbation Non-Reversible Adds small, random changes to numeric values to preserve stats but hide identities. โœ” Differential privacy fit โœ” Works for PCI if no actual PAN โœ” OK for HIPAA safe harbor โœ” Annex A.18
Redaction / Nulling Non-Reversible Replaces with null, blanks, or partial masking (e.g., ****1234). โœ” GDPR display-only safe โœ” PCI display masking rule โœ” PHI display protection โœ” Annex A.9