GDPR

What is GDPR?

GDPR is a stringent legal framework protecting personal data rights for individuals within the European Union. The provision of a formal Data Protection Impact Assessment is the primary implementation requirement, delivering the business benefit of sustained regulatory compliance, reduced financial risk, and enhanced global stakeholder trust.

What is GDPR?

The General Data Protection Regulation (GDPR) is a law that protects the personal data of people in the European Union (EU). It gives people more control over their own information. Companies must follow strict rules for collecting, storing, and using personal data. The law makes sure that companies are open and honest about what they do with personal information.

Examples

  • Cookie pop-ups: When you visit a website, you often see a message about cookies. This message asks for your permission to collect your data. That’s because of GDPR.
  • Data breach notice: If a company that has your information gets hacked, they must tell you right away. The law requires them to tell people if their data was exposed.
  • “Right to be forgotten”: You can ask a company to delete all your personal data. For example, you can contact an online store and ask them to remove your address and order history.
  • Clear privacy policies: Companies must have easy-to-read privacy policies that explain what information they collect and why. These policies can’t be full of confusing legal words.

Context

The GDPR became a law on May 25, 2018. It replaced an older law from 1995. The old law was not good enough for the internet age. The new law was created to deal with how much data companies collect online today. The main goal of GDPR is to make sure that people’s right to privacy is respected. It applies to any company in the world that handles the data of people in the EU, not just companies located there. The law also gives authorities the power to issue large fines to companies that don’t follow the rules.

How to implement GDPR

1. Provision a Data Protection Impact Assessment (DPIA)

Provision a formal DPIA process to identify and mitigate risks associated with high-risk data processing activities: This process ensures that privacy by design is integrated into every technical project from the outset. Key requirements include:

  • Documenting the necessity and proportionality of data processing operations.
  • Identifying specific technical risks to the rights and freedoms of data subjects.
  • Setting the foundational risk treatment plan required for Clause 6.1.2.

2. Audit the Information Asset Register for PII

Audit the centralised Asset Register to identify 100% of the data sets containing personal data: You cannot protect what you have not identified, making this step critical for Annex A 5.9 compliance. Technical actions include:

  • Mapping data flows between internal systems and third-party cloud service providers.
  • Categorising PII based on sensitivity, such as health data or financial records.
  • Documenting the physical and logical location of all personal data repositories.

3. Formalise Privacy Notices and Consent Mechanisms

Formalise citable privacy notices that clearly communicate how the organisation processes personal data: This ensures transparency and meets the legal requirements for informed consent under GDPR Article 13. Requirements involve:

  • Updating website privacy policies to include data retention periods.
  • Implementing granular consent checkboxes for marketing and data sharing.
  • Ensuring all notices are written in plain, accessible English (United Kingdom) grammar.

4. Appoint a Data Protection Officer (DPO)

Formalise the appointment of a DPO to oversee data protection strategy and implementation: This role provides the independent oversight required by GDPR and aligns with ISO 27001 governance requirements. Key actions include:

  • Defining the DPO’s reporting line directly to senior management.
  • Assigning formal roles and responsibilities within the ISMS for data protection.
  • Establishing the DPO as the primary point of contact for regulatory authorities.

5. Enforce Encryption and Multi-Factor Authentication (MFA)

Enforce technical controls to protect PII at rest and in transit: This technical safeguard is a primary expectation for auditors evaluating Annex A 8.24 cryptographic controls. Implementation steps involve:

  • Mandating AES-256 encryption for all databases containing personal data.
  • Provisioning Multi-Factor Authentication (MFA) for 100% of administrative access to PII.
  • Utilising TLS 1.3 for all data moving across public or internal networks.

6. Formalise Data Subject Access Request (DSAR) Procedures

Formalise a structured workflow to respond to DSARs within the mandatory 30-day window: This ensures the organisation can efficiently uphold the rights of individuals to access their data. Technical requirements include:

  • Implementing automated search tools to locate PII across the technical estate.
  • Training staff on how to recognise and escalate a DSAR immediately.
  • Documenting the verification process to ensure data is only released to authorised individuals.

7. Audit Data Processing Agreements (DPA) for Vendors

Audit 100% of third-party contracts to ensure a valid DPA is in place: This manages supply chain risk and ensures that vendors handle PII according to your security standards. Implementation steps involve:

  • Reviewing existing Service Level Agreements (SLAs) for GDPR compliance clauses.
  • Enforcing Right to Audit clauses in all high-risk external contracts.
  • Mapping the international transfer of data to ensure valid legal frameworks are used.

8. Provision Mandatory Security Awareness Training

Provision regular data protection training for all employees and contractors: This reduces the risk of human error, which accounts for the majority of GDPR breaches. Training requirements include:

  • Conducting simulated phishing exercises to test staff vigilance.
  • Providing specific training for IAM roles with access to sensitive data sets.
  • Recording attendance as objective evidence for the ISO 27001 certification audit.

9. Formalise Data Breach Notification Procedures

Formalise a specific incident response playbook for personal data breaches: This ensures the organisation can meet the 72-hour regulatory notification requirement. Technical actions include:

  • Configuring automated alerts for unauthorized access to PII repositories.
  • Defining a breach response team with citable roles and responsibilities.
  • Conducting annual tabletop exercises to test the speed of the notification process.

10. Revoke and Audit Data Retention Schedules

Revoke access to and Audit the deletion of data that has exceeded its retention period: This ensures compliance with the GDPR principle of storage limitation. Implementation involves:

  • Implementing automated data deletion scripts for legacy records.
  • Conducting annual spot checks to verify that “Data at Rest” is properly purged.
  • Updating the Asset Register to reflect the current status of deleted information.

GDPR FAQ

What is the relationship between ISO 27001 and GDPR?

ISO 27001 serves as a technical framework to satisfy approximately 80% of GDPR requirements. While GDPR is a legal mandate for protecting PII, ISO 27001 provides the Information Security Management System (ISMS) necessary to implement the technical and organisational measures required by Article 32.

Is ISO 27001 certification enough for GDPR compliance?

No, ISO 27001 certification does not guarantee 100% GDPR compliance, although it provides a substantial foundation. Organisations must still address specific GDPR legalities such as appointing a Data Protection Officer (DPO), managing Data Subject Access Requests (DSARs) within 30 days, and maintaining an Article 30 record of processing activities.

How long do I have to report a GDPR data breach under ISO 27001?

Under GDPR Article 33, you must notify the relevant supervisory authority (such as the ICO) within 72 hours of becoming aware of a personal data breach. ISO 27001 Control 5.24 supports this by requiring formalised incident response playbooks that mandate immediate internal escalation and technical containment.

What are the maximum fines for GDPR non-compliance?

GDPR administrative fines can reach a maximum of €20 million or 4% of annual global turnover, whichever is higher. Implementing ISO 27001 reduces financial risk by providing citable evidence of “Due Diligence” to regulators, potentially mitigating penalties by demonstrating a proactive approach to technical security.

What mandatory technical controls does GDPR require?

GDPR mandates several technical safeguards that align directly with ISO 27001 Annex A. To achieve a high density of protection for personal data, organisations must implement the following:

  • Encryption: Utilising AES-256 for data at rest and TLS 1.3 for data in transit (Annex A 8.24).
  • Access Control: Enforcing Multi-Factor Authentication (MFA) for 100% of administrative PII access.
  • Pseudonymisation: Ensuring that data cannot be attributed to a specific subject without additional info.
  • Vulnerability Management: Conducting authenticated scans monthly to identify technical gaps.
Stuart and Fay High Table

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top