EU General Data Protection Regulation

Simplify processes and applications.

Unifying all your data repositories and having a clear understanding of the type and purpose of data collection will help your organization easily facilitate data access and modification requests and will lead to enhanced security.

Gain that competitive edge.

Businesses that aren’t afraid to take the strict measures required to safeguard their customers’ and employees’ personal information will show that they take data privacy seriously, which will also positively impact customer perception.

Bring about a cultural shift.

Realistically, you won’t be able to achieve GDPR compliance in a day. Compliance is a gradual process of improvement that will bring about a culture of “security by design” within your company.

How can IT help in preparing for the GDPR?

Analyze Everything

With 99 articles to follow, complying with the GDPR is a multi-step process. Here’s a checklist of information technologies that will help get you started.

  • A central repository to store, view, monitor, and analyze log data from various environments.
  • A real-time alert mechanism to catch suspicious activity taking place within your organization’s IT environment.
  • An auditing system to ensure the integrity, confidentiality, and security of the log data generated by your environment.
  • The means to secure assets which store personal data in your environment.
  • A system to create and manage records of all data processed, along with detailed, on-demand reports.
  • The ability to identify who accesses privileged accounts and sensitive information.
  • Adequate security and encryption of personal information in transit.
  • A mechanism for identifying, responding to, and reporting a breach when it occurs.
  • A monitoring system for assets and systems that carry any form of personal information.
  • A tool for regularly identifying and securing vulnerabilities that arise in your environment.

What exactly are the GDPR’s articles asking for?

“[Personal data shall be] collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall, in accordance with Article 89(1), not be considered to be incompatible with the initial purposes (‘purpose limitation ’).”
“[Personal data shall be] accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’).”
“[Personal data shall be] processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’).”
“The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’).”
“Taking into account the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for the rights and freedoms of natural persons, the controller shall implement appropriate technical and organisational measures to ensure and to be able to demonstrate that processing is performed in accordance with this Regulation. Those measures shall be reviewed and updated where necessary.”
“The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual’s intervention to an indefinite number of natural persons.”
“Each controller and, where applicable, the controller’s representative, shall maintain a record of processing activities under its responsibility.”
“Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: the pseudonymisation and encryption of personal data;”
“the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;”
“a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.”
“In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.”
“The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law.”
“1. In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.
2. The processor shall notify the controller without undue delay after becoming aware of a personal data breach.
3. Controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with this Article.”


Fully complying with the GDPR requires a variety of solutions, processes, people, and technologies. The suggestions mentioned are some of the ways in which IT management tools can help with some of the GDPR’s requirements. Together with other appropriate solutions, processes, and people, LoughTec’s solutions help achieve and sustain GDPR compliance. This material is provided for informational purpose only and should not be considered as legal advice for GDPR compliance. LoughTec makes no warranties, express, implied, or statutory, as to the information in this material.