August 15, 2017 • Garrett Garitano

How to Fast-Track GDPR Compliance

What if an auditor walked up to your company next week and demanded evidence that you are compliant with General Data Protection Regulation (GDPR) rules? How would you respond? That scenario may well occur at companies in Europe and beyond starting in 2018. Computer Weekly, a U.K. technology publication, estimates that U.K. companies may face […]

GDPR Compliance

What if an auditor walked up to your company next week and demanded evidence that you are compliant with General Data Protection Regulation (GDPR) rules? How would you respond?

That scenario may well occur at companies in Europe and beyond starting in 2018. Computer Weekly, a U.K. technology publication, estimates that U.K. companies may face penalties greater than £100 billion in 2018. Presumably, U.K. companies already have some experience meeting EU expectations for security and privacy. If your company is new to the European market, the losses could be worse.

What Is General Data Protection Regulation?

The GDPR framework is a European Union attempt to simplify data privacy laws across Europe. Even though the law was approved in April 2016, companies have some breathing room to understand the new changes. The EU plans to begin enforcing the law in May 2018. If your company is non-compliant then, you are likely to face fines. GDPR includes the authority to impose significant fines that could easily stretch into the millions.

Steps to Fast-Track Your GDPR Compliance

While we cannot provide legal advice, we can equip you with the key principles and ideas you need to know to get ready. Once you understand these concepts, you will know the right questions to ask to prepare.

1) Carry out a data audit on your current capabilities.

Before you can improve, you need to understand your organization’s capabilities. For instance, do you have a comprehensive inventory of data assets? If you have the internal resources, create a joint task force of IT and internal audit leaders to carry out this assessment. If the preliminary findings indicate you have serious gaps, consider engaging an outside expert to provide additional advice.

2) How quickly can you detect and report on data breaches?

The days of keeping data breaches quiet for weeks or months while you assess the damage are over. According to consulting firm PwC, “The data controller must notify the supervisory authority without undue delay (and certainly within 72 hours of becoming aware of a breach).” This reporting requirement is a significant change from prior European rules that did not impose that type of reporting requirement.

3) Evaluate your employee training program.

Years ago, records management specialists and IT techs held responsibility for records and privacy issues. That approach is no longer going to work. As law firm Gowling points out, article 5 of GDPR requires employee training activities. Further, you also need to keep records on the completion of this training. To maximize the effectiveness of your training, consider using gamification to increase employee engagement.

Tip: Add GDPR training activities to your new employee onboarding program to ensure there are no gaps as you add new staff to the organization.

4) Do you have GDPR templates to use?

Nobody wakes up in the morning looking forward to regulatory compliance activities. As a result, you can ease the pain on employees by providing GDPR-compliant templates. Store these documents on your company’s intranet site where they can be easily accessible. Start by creating a template for privacy notices. Notifying a customer regarding a potential privacy mistake is a serious matter where you can ill afford to make mistakes. Fundamentally, think of these templates as checklists. As Atul Gawande shows in his book, “The Checklist Manifesto,” checklists are one of the best ways to save lives and reduce errors.

5) Review your supplier and vendor contracts.

Outsourcing a function to a supplier does not eliminate your General Data Protection Regulation responsibilities. For instance, you may rely on a supplier to create and distribute monthly account statements to your customers. If that supplier mishandles customer data by sending John’s statement to Jane, that is a problem for both the supplier and you. To mitigate this risk exposure, start reviewing your existing supplier contracts for GDPR compliance.

Risk tip: If your organization has a large number of supplier contracts, reviewing all of them may be daunting. In that case, focus your efforts on the suppliers who have the largest volume of customer data. Once those supplier contracts are reviewed, you can move on to other contracts.

6) Identify security and privacy automation opportunities.

Keeping up with changes in the regulatory environment is tough. What if your senior management is tired of hiring additional staff to address these risks? In that situation, you have a few options. As a manager, you may decide to push your current staff to work harder, but that is not a sustainable approach. Adding compliance automation tools like Avatier’s Compliance Auditor is a better way to improve your productivity.

GDPR Compliance Further Reading

To continue developing your GDPR compliance program, explore these resources. In the long term, it will be far cheaper to invest a few hours of effort in compliance preparation now than suffer large penalties in the future.

Warwick Ashford. “UK firms could face £122bn in data breach fines in 2018” Computer Weekly, Oct 16 2016

David Cook, Data breach notification and the GDPR, PwC

Gowling WLG, CHECKLIST FOR TASKS NEEDED IN ORDER TO COMPLY WITH GDPR

Garrett Garitano

Related Posts

What is Assisted Password Reset? A Complete Guide

What is Assisted Password Reset? Assisted Password Reset (APR) is a technology solution that enables users to securely regain access to their accounts without direct IT helpdesk intervention. This self-service approach automates the password recovery process through secure verification methods like security questions, mobile authentication, biometric verification, or email confirmation. In today’s complex digital ecosystem, […]

May 28, 2025 • Nelson Cicchitto

Read More

Passwordless Login: The Future of Authentication Without the Hassle

Passwords have been the cornerstone of digital security for decades, yet they represent one of the most vulnerable and frustrating aspects of our online experience. According to IBM’s 2023 Cost of a Data Breach Report, compromised credentials were responsible for 19% of all breaches, with an average cost of $4.45 million per incident—15% higher than […]

May 28, 2025 • Nelson Cicchitto

Read More

What is Password Reset: Comprehensive Guide for IT Decision Makers

Introduction: The Business Impact of Password Reset Solutions Password reset technology is more than just a convenience feature—it’s a critical component of modern identity management that directly impacts operational efficiency, security posture, and user productivity. As organizations navigate increasingly complex digital environments, the seemingly simple function of resetting passwords has profound implications for both business […]

May 28, 2025 • Nelson Cicchitto

Read More

What is Password Policy? The Complete Guide for Enterprise Security Leaders

Password policies remain your critical first line of defense against unauthorized access. Yet many organizations struggle with creating and enforcing policies that balance security with usability. This comprehensive guide examines everything security leaders need to know about effective password policies, from foundational principles to advanced implementation strategies using modern identity management solutions. Understanding Password Policy […]

May 28, 2025 • Nelson Cicchitto

Read More

What is Multi-Factor Authentication (MFA)? The Ultimate Enterprise Security Guide

The traditional username and password combination is no longer sufficient to protect sensitive enterprise data. Multi-Factor Authentication (MFA) has emerged as a critical security measure for organizations looking to strengthen their identity and access management strategies while balancing security with user experience. Understanding Multi-Factor Authentication: The Foundation of Modern Security Multi-Factor Authentication is a security […]

May 28, 2025 • Nelson Cicchitto

Read More

Access Governance: The Cornerstone of Modern Identity Security

What is Access Governance? Access governance is the comprehensive framework of policies, processes, and technologies that organizations implement to ensure the right individuals have the right access to the right resources at the right time—and for the right reasons. It encompasses the entire lifecycle of user identities and their associated entitlements across enterprise systems, applications, […]

May 28, 2025 • Nelson Cicchitto

Read More

What is User Provisioning: Group Self-Service – The Complete Guide for Enterprises

As organizations struggle with proliferating Active Directory (AD) groups, maintaining security, and reducing administrative overhead, Group Self-Service has emerged as the solution to this persistent challenge. According to recent research by Enterprise Management Associates, the average enterprise manages over 500 AD groups, with large organizations often exceeding 10,000 groups. More concerning, 76% of organizations report […]

May 28, 2025 • Nelson Cicchitto

Read More

What is User Provisioning: Lifecycle Management – The Complete Enterprise Guide

Managing user access throughout the employee lifecycle has become a critical challenge for enterprise security and IT teams. User provisioning—specifically through lifecycle management—represents the cornerstone of effective identity governance, directly impacting security posture, operational efficiency, and regulatory compliance. According to Gartner, organizations with mature identity lifecycle management processes experience 65% fewer privilege-based security incidents and […]

May 28, 2025 • Nelson Cicchitto

Read More

What Is Single Sign-On (SSO)? Enterprise Solutions Explained

The average enterprise uses between 900 and 1,200 cloud applications—a 15% increase year-over-year according to Okta’s 2023 Businesses at Work report. For employees, this means managing countless credentials across different platforms, leading to password fatigue, security vulnerabilities, and decreased productivity. For IT departments, it means greater overhead and security risks. Single Sign-On (SSO) technology has […]

May 28, 2025 • Nelson Cicchitto

Read More

What is Identity Management? Ultimate 2025-2026 Guide for Enterprise Security

Organizations operate across multiple cloud environments and remote work has become the norm, the question “what is identity management?” has never been more crucial. Identity management (IdM) is the comprehensive framework of policies, processes, and technologies that enable organizations to manage digital identities and control access to resources, applications, and data. For CISOs, IT administrators, […]

May 28, 2025 • Nelson Cicchitto

Read More