SlideShare a Scribd company logo
How to keep printing,
scanning & copying
processes GDPR
compliant.
WHAT IS THE
GENERAL DATA
PROTECTION
REGULATION
(GDPR?)
The General Data Protection Regulation (GDPR) is set to replace
the Data Protection Act 1998 (DPA) and will come into effect from
the 25th May 2018.

It will regulate the processing and holding
of personal data.

While similar to it’s predecessor, GDPR has some key differences
in terms of personal data classification and scope, accountability
and compliance, breach notification procedures and penalties.
PERSONAL DATA
CLASSIFICATION
AND SCOPE 

The type of data protected
has vastly increased and
includes economic, cultural,
usernames, pseudonyms,
online footprint information,
etc. For example, under
GDPR, IP addresses are
classified as personal data.
ACCOUNTABILITY AND
COMPLIANCE

“The new accountability principle in Article 5(2) requires you to
demonstrate that you comply with the principles and states
explicitly that this is your responsibility.”	
  

[Information Commissioner’s Office]
BREACH NOTIFICATION
PROCEDURE
New breach notification procedures are required - and there’s a
72 hr time limit for reporting a breach.
“You should ensure that you have an internal breach reporting
procedure in place. This will facilitate decision-making about
whether you need to notify the relevant supervisory authority or
the public. In light of the tight timescales for reporting a breach -
it is important to have robust breach detection, investigation and
internal reporting procedures in place.”
[Information Commissioner’s Office]
PENALTIES 
	
  
The penalties being introduced with GDPR could be enough to
put some organisations out of business. 

With penalties amounting to as much as €20 million or 4% of
global annual turnover (whichever is greater), it’s worrying to
think that all of this can be the result of a poorly protected print/
scan/copy process.
In order to remain compliant with the GDPR, 
you need to implement measures to: 
Protect sensitive
information within
documents 
Prevent sensitive
data from being
shared
inadvertently
Have robust
processes to detect
possible breaches
quickly
Have documented
processes
WHY IS PRINT
SECURITY AN ISSUE?
(AND HOW WILL IT
AFFECT GDPR
COMPLIANCE?)
Initially, it may not be clear how document and
print security might affect GDPR compliance, but
when you consider that around 50% of printed
pages get thrown away [Xerox], what if your
employees are putting sensitive data straight in
the bin?

As much as sixty-two percent of data breaches are
down to human error [Computer Weekly]. Think of
the stories you hear when people leave sensitive
data on the train or in a cafe, it’s potentially easily
done when people aren’t aware of what personal
data is and such cases could be liable for
penalties under GDPR.
Organisations need to be able to protect sensitive
information within documents and prevent
sensitive data from being printed and shared
inadvertently. This will mean having robust
processes to detect possible breaches quickly
and documenting processes, whether that be
preventing a document from being printed or
alerting someone to what’s happened.
HOW TO SECURE
YOUR PRINTING
PROCESSES
BASIC SECURITY MEASURES
Here’s what we recommend you put in place as basic security measures. In most
cases, these features come a standard with Xenith’s MPS Plus:
Cisco Trustsec 
Helps identify, monitor and manage
devices from a central location. Real-
time views and control over all users
and devices on a network.
McAfee Secure Device Whitelisting
Allows only approved files to run on
MFDs, offering significantly more
protection than traditional black listing
tactics.
Encryption
Ensures that data travelling between
devices is kept secure.
Image Overwrite 
Electronically shreds copy, print, scan &
fax jobs stored on the MFD’s hard disc.
Follow-me printing 
Releasing documents only on
authentication with your door entry card/
mobile/PIN code at the device prevents
them getting into the wrong hands.
5 WAYS TO REDUCE DOCUMENT 
INFORMATION RISK 

1) A user-centric view of document output and input

2) Monitor who prints document information within the business

3) Monitor security across document lifecycles

4) Check the vulnerability of your endpoints

5) Keep document information safe
PRINT AND DOCUMENT
SECURITY EDUCATION

Educate everyone on the risks of printing sensitive data and
what counts as sensitive data, because at the end of the day, if
someone doesn’t know it’s wrong, why would they stop?

To educate employees, you might choose to send an internal
email or use an in-house communication channel. If you choose
this method, make sure you have some resources that make it
easily accessible and understandable, either an internal
document you can share or something official.
ADVANCED SECURITY
MEASURES
With advanced security measures, print/scan/copy streams can
be automatically scanned to detect and block/redact the release
of any sensitive data from the device.
It’s even possible to redact sensitive data from the document
being printed/copied/scanned without affecting the master
document, or without the need for any manual intervention.
On top of this, overlays like security stamps can be added as a
rule when sensitive data is detected in a document, or
alternative workflows can be triggered in order to send the
document to a secure location for review before permission is
granted to print it / copy it / release the scanned file.
HOW TO KEEP
PRINTING &
DOCUMENT
PROCESSES GDPR
COMPLIANT
With GDPR coming into effect on the 25th May 2018, it’s
important to start acting now in order to remain compliant and
have all procedures in place. 

Here’s what you need to do:

•  Protect sensitive information held in digital format, and prevent access to it by
unauthorised individuals.

•  Prevent sensitive data from being printed.

•  Detect possible breaches quickly and easily, in case they take place despite
best efforts.

•  Ensure documented processes are in place to illustrate compliance and
accountability.
ADDITIONS: XENITH’S ADVANCED
SECURITY PACKAGE

•  Automatically analyse print, scan and copy streams to detect sensitive data

•  Redact sensitive data before it’s printed

•  Block documents from being printed entirely
•  Trigger workflows to get approval for printing

•  Trigger workflows to add security stamps/barcodes

•  Alert the security officer of a scanned or printed document

All done behind the scenes, without affecting the master document.

Contact us about our advanced security package.
A Short Guide:
How to keep printing, scanning & copying
processes GDPR Compliant

Our new guide explains: 

•  How GDPR affects printing/copying/scanning

•  How to secure your printing/scanning/copying
processes

•  How to automatically analyse print, scan and
copy streams to detect sensitive data that can be
redacted or blocked or trigger security alerts
DOWNLOAD A COPY

More Related Content

What's hot

[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
AIIM International
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
IBM Security
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017
Amarach Research
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
Susan Moran
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
Transcendent Group
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
Tomppa Järvinen
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
Frederick Penaud
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
Ishay Tentser
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
Tony Richardson CISSP
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
Olivier BARROT
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
Christiana Kozakou
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
Adrian Dumitrescu
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
Chris Bullock
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
IRIS
 

What's hot (20)

[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
 

Similar to How to keep printing processes GDPR compliant

5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
Gabor Farkas
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
Gary Chambers
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
Jason Chapman
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
NetworkIQ
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
Peter Witsenburg
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
Peter Goldbrunner
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
IJERA Editor
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
Cor Ranzijn
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
zayadeen2003
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
XeniT Solutions nv
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Qualsys Ltd
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
#TheFraudTube
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 

Similar to How to keep printing processes GDPR compliant (20)

5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 

More from Xenith Document Systems Ltd

Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
Xenith Document Systems Ltd
 
How BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content ManagementHow BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content Management
Xenith Document Systems Ltd
 
Xenith Document Systems - An Introduction
Xenith Document Systems - An IntroductionXenith Document Systems - An Introduction
Xenith Document Systems - An Introduction
Xenith Document Systems Ltd
 
From KPIs to Outcomes - the Shift from Service Delivery to Strategy
From KPIs to Outcomes - the Shift from Service Delivery to StrategyFrom KPIs to Outcomes - the Shift from Service Delivery to Strategy
From KPIs to Outcomes - the Shift from Service Delivery to Strategy
Xenith Document Systems Ltd
 
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
Xenith Document Systems Ltd
 
Showcasing the business value of MPS - ROI is king
Showcasing the business value of MPS - ROI is kingShowcasing the business value of MPS - ROI is king
Showcasing the business value of MPS - ROI is king
Xenith Document Systems Ltd
 

More from Xenith Document Systems Ltd (6)

Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
How BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content ManagementHow BAE Systems Changed the World with Content Management
How BAE Systems Changed the World with Content Management
 
Xenith Document Systems - An Introduction
Xenith Document Systems - An IntroductionXenith Document Systems - An Introduction
Xenith Document Systems - An Introduction
 
From KPIs to Outcomes - the Shift from Service Delivery to Strategy
From KPIs to Outcomes - the Shift from Service Delivery to StrategyFrom KPIs to Outcomes - the Shift from Service Delivery to Strategy
From KPIs to Outcomes - the Shift from Service Delivery to Strategy
 
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
 
Showcasing the business value of MPS - ROI is king
Showcasing the business value of MPS - ROI is kingShowcasing the business value of MPS - ROI is king
Showcasing the business value of MPS - ROI is king
 

Recently uploaded

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 

Recently uploaded (11)

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 

How to keep printing processes GDPR compliant

  • 1. How to keep printing, scanning & copying processes GDPR compliant.
  • 2. WHAT IS THE GENERAL DATA PROTECTION REGULATION (GDPR?)
  • 3. The General Data Protection Regulation (GDPR) is set to replace the Data Protection Act 1998 (DPA) and will come into effect from the 25th May 2018. It will regulate the processing and holding of personal data. While similar to it’s predecessor, GDPR has some key differences in terms of personal data classification and scope, accountability and compliance, breach notification procedures and penalties.
  • 4. PERSONAL DATA CLASSIFICATION AND SCOPE The type of data protected has vastly increased and includes economic, cultural, usernames, pseudonyms, online footprint information, etc. For example, under GDPR, IP addresses are classified as personal data.
  • 5. ACCOUNTABILITY AND COMPLIANCE “The new accountability principle in Article 5(2) requires you to demonstrate that you comply with the principles and states explicitly that this is your responsibility.”   [Information Commissioner’s Office]
  • 6. BREACH NOTIFICATION PROCEDURE New breach notification procedures are required - and there’s a 72 hr time limit for reporting a breach. “You should ensure that you have an internal breach reporting procedure in place. This will facilitate decision-making about whether you need to notify the relevant supervisory authority or the public. In light of the tight timescales for reporting a breach - it is important to have robust breach detection, investigation and internal reporting procedures in place.” [Information Commissioner’s Office]
  • 7. PENALTIES   The penalties being introduced with GDPR could be enough to put some organisations out of business. With penalties amounting to as much as €20 million or 4% of global annual turnover (whichever is greater), it’s worrying to think that all of this can be the result of a poorly protected print/ scan/copy process.
  • 8. In order to remain compliant with the GDPR, you need to implement measures to: Protect sensitive information within documents Prevent sensitive data from being shared inadvertently Have robust processes to detect possible breaches quickly Have documented processes
  • 9. WHY IS PRINT SECURITY AN ISSUE? (AND HOW WILL IT AFFECT GDPR COMPLIANCE?)
  • 10. Initially, it may not be clear how document and print security might affect GDPR compliance, but when you consider that around 50% of printed pages get thrown away [Xerox], what if your employees are putting sensitive data straight in the bin? As much as sixty-two percent of data breaches are down to human error [Computer Weekly]. Think of the stories you hear when people leave sensitive data on the train or in a cafe, it’s potentially easily done when people aren’t aware of what personal data is and such cases could be liable for penalties under GDPR.
  • 11. Organisations need to be able to protect sensitive information within documents and prevent sensitive data from being printed and shared inadvertently. This will mean having robust processes to detect possible breaches quickly and documenting processes, whether that be preventing a document from being printed or alerting someone to what’s happened.
  • 12. HOW TO SECURE YOUR PRINTING PROCESSES
  • 13. BASIC SECURITY MEASURES Here’s what we recommend you put in place as basic security measures. In most cases, these features come a standard with Xenith’s MPS Plus: Cisco Trustsec Helps identify, monitor and manage devices from a central location. Real- time views and control over all users and devices on a network. McAfee Secure Device Whitelisting Allows only approved files to run on MFDs, offering significantly more protection than traditional black listing tactics. Encryption Ensures that data travelling between devices is kept secure. Image Overwrite Electronically shreds copy, print, scan & fax jobs stored on the MFD’s hard disc. Follow-me printing Releasing documents only on authentication with your door entry card/ mobile/PIN code at the device prevents them getting into the wrong hands.
  • 14. 5 WAYS TO REDUCE DOCUMENT INFORMATION RISK 1) A user-centric view of document output and input 2) Monitor who prints document information within the business 3) Monitor security across document lifecycles 4) Check the vulnerability of your endpoints 5) Keep document information safe
  • 15. PRINT AND DOCUMENT SECURITY EDUCATION Educate everyone on the risks of printing sensitive data and what counts as sensitive data, because at the end of the day, if someone doesn’t know it’s wrong, why would they stop? To educate employees, you might choose to send an internal email or use an in-house communication channel. If you choose this method, make sure you have some resources that make it easily accessible and understandable, either an internal document you can share or something official.
  • 16. ADVANCED SECURITY MEASURES With advanced security measures, print/scan/copy streams can be automatically scanned to detect and block/redact the release of any sensitive data from the device. It’s even possible to redact sensitive data from the document being printed/copied/scanned without affecting the master document, or without the need for any manual intervention.
  • 17. On top of this, overlays like security stamps can be added as a rule when sensitive data is detected in a document, or alternative workflows can be triggered in order to send the document to a secure location for review before permission is granted to print it / copy it / release the scanned file.
  • 18. HOW TO KEEP PRINTING & DOCUMENT PROCESSES GDPR COMPLIANT
  • 19. With GDPR coming into effect on the 25th May 2018, it’s important to start acting now in order to remain compliant and have all procedures in place. Here’s what you need to do: •  Protect sensitive information held in digital format, and prevent access to it by unauthorised individuals. •  Prevent sensitive data from being printed. •  Detect possible breaches quickly and easily, in case they take place despite best efforts. •  Ensure documented processes are in place to illustrate compliance and accountability.
  • 20. ADDITIONS: XENITH’S ADVANCED SECURITY PACKAGE •  Automatically analyse print, scan and copy streams to detect sensitive data •  Redact sensitive data before it’s printed •  Block documents from being printed entirely •  Trigger workflows to get approval for printing •  Trigger workflows to add security stamps/barcodes •  Alert the security officer of a scanned or printed document All done behind the scenes, without affecting the master document. Contact us about our advanced security package.
  • 21. A Short Guide: How to keep printing, scanning & copying processes GDPR Compliant Our new guide explains: •  How GDPR affects printing/copying/scanning •  How to secure your printing/scanning/copying processes •  How to automatically analyse print, scan and copy streams to detect sensitive data that can be redacted or blocked or trigger security alerts DOWNLOAD A COPY