SlideShare a Scribd company logo
© 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA
The effects of the GDPR
A closer look at what it is and what developers can do
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Introduction
Michaël Demey
Developer @ iText Software
@MyMilkedEek
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Disclaimer
I’m not a lawyer or attorney
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
What is GDPR
General Data Protection Regulation
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Regulation, not a directive
Directives need national implementation
Regulation doesn’t
 Side-note: there are areas that do need national implementation
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Natural person
Natural Person = EU citizen
Also known as a “Data subject”
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Personal data
Personal data is data or information that can be traced back to a data subject
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Obvious stuff
Name
Address
National ID number
…
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Critical stuff
Medical records
DNA
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Less obvious stuff
IP address
E-mail address
RFID
HR information
…
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Other actors
Data controllers
Companies/organisations collecting the data
Data processors
Companies/organisations processing that data
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Who does the GDPR affect
Any company targetting EU citizens (data subjects)
Regardless of where the company is located
 US, Asia, …
Focus is on the EU citizen
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Directive of 1995
Already pretty progressive, but outdated
GDPR is replacement with new technology and actors in mind
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
GDPR timeframe
2016!
But only enforced starting May 2018
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Fines
Hot topic with lots of scaremongering and confusion
“Up to X million euro or x % of global revenue!”
Technically true but EU will not hand these out willy-nilly
“Be the carrot, not the stick”
© 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Collection of data
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Rules for collection
Intent must be stated
There needs to be a clear goal and purpose to the collection of data
Duration of storage
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Consent
Has to be explicitly given by the user
Not sufficient are
Silence or inactivity
Pre-ticked checkboxes
Without consent, you’re not allowed to collect data
Can be withdrawn at any point
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
No consent
Access to or use of website/application content must not be restricted if data
subject doesn’t consent, if the data isn’t necessary to operate
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
© 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Rights of the data subject
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Access
All data subjects should be able to access the data a company has on them
In a readable, usable format
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Update
All data subjects should be able to update their personal data
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Deletion
Data subjects should be able to request a deletion of their data
Very specific exceptions when it comes to complying to this request
Biggest issue when reading blogs and articles
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
The “right to be forgotten”
© 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Action plan!
“Design by privacy”
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
First things first
Talk to your management
Make sure they’re aware of this
There might already be a plan
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Collect information
List of all data captured
What do you capture
Why is it captured
 Is it necessary?
Where is it stored
How long is it stored
How is it stored
 Has it been secured?
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Tools
Check your used tools
CRM
Bug trackers
Marketing tools
These are usually externally developed and/or hosted
Make sure these are compliant
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Breach Policy
There needs to be a breach policy in place
What to do, who to contact, etc. when a breach has been detected
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Measurements
Pseudonymize personal data
Encryption!
Take as many precautions as possible when storing data
Already implement (or prepare) ways for data subjects to use their rights
© 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Summary
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Summary
EU citizen focus
Change in mentality -> design by privacy
Use common sense
Intent and actions are the key factor
© 2017, iText Group NV, iText Software Corp., iText Software BVBA
Thank you!
Questions?

More Related Content

What's hot

Tech Startup Day 2015: 4 failures and 1 hit
Tech Startup Day 2015: 4 failures and 1 hitTech Startup Day 2015: 4 failures and 1 hit
Tech Startup Day 2015: 4 failures and 1 hit
iText Group nv
 
iText Summit 2014: Keynote talk
iText Summit 2014: Keynote talkiText Summit 2014: Keynote talk
iText Summit 2014: Keynote talk
iText Group nv
 
Intellectual property and licensing
Intellectual property and licensingIntellectual property and licensing
Intellectual property and licensing
iText Group nv
 
Digital Signatures in PDF: how it's done
Digital Signatures in PDF: how it's doneDigital Signatures in PDF: how it's done
Digital Signatures in PDF: how it's done
Bruno Lowagie
 
PDF is dead. Long live PDF... with Java!
PDF is dead. Long live PDF... with Java!PDF is dead. Long live PDF... with Java!
PDF is dead. Long live PDF... with Java!
iText Group nv
 
How can large open source projects be monetized?
How can large open source projects be monetized?How can large open source projects be monetized?
How can large open source projects be monetized?
Bruno Lowagie
 
Start-ups: the tortoise and the hare
Start-ups: the tortoise and the hareStart-ups: the tortoise and the hare
Start-ups: the tortoise and the hare
iText Group nv
 
Oops, I broke my API
Oops, I broke my APIOops, I broke my API
Oops, I broke my API
iText Group nv
 
Startup Weekend Ghent
Startup Weekend GhentStartup Weekend Ghent
Startup Weekend Ghent
Bruno Lowagie
 
FIT Seminar Singapore presentation
FIT Seminar Singapore presentationFIT Seminar Singapore presentation
FIT Seminar Singapore presentation
iText Group nv
 
PAdES signatures in iText and the road ahead
PAdES signatures in iText and the road aheadPAdES signatures in iText and the road ahead
PAdES signatures in iText and the road ahead
iText Group nv
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Hyperleger Tokyo Meetup
 
Ridge I T Limited Security
Ridge I T Limited   SecurityRidge I T Limited   Security
Ridge I T Limited Security
ridge_it
 
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
Shane Coughlan
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
Martin von Haller Groenbaek
 
Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)
AllieYang1
 
Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)
AllieYang1
 
Hypervault Sensitive Data Manager
Hypervault Sensitive Data ManagerHypervault Sensitive Data Manager
Hypervault Sensitive Data Manager
ThierryDupont20
 
IoT at Scale
IoT at ScaleIoT at Scale
IoT at Scale
Vitaliy Rudnytskiy
 

What's hot (20)

Tech Startup Day 2015: 4 failures and 1 hit
Tech Startup Day 2015: 4 failures and 1 hitTech Startup Day 2015: 4 failures and 1 hit
Tech Startup Day 2015: 4 failures and 1 hit
 
iText Summit 2014: Keynote talk
iText Summit 2014: Keynote talkiText Summit 2014: Keynote talk
iText Summit 2014: Keynote talk
 
Intellectual property and licensing
Intellectual property and licensingIntellectual property and licensing
Intellectual property and licensing
 
Digital Signatures in PDF: how it's done
Digital Signatures in PDF: how it's doneDigital Signatures in PDF: how it's done
Digital Signatures in PDF: how it's done
 
PDF is dead. Long live PDF... with Java!
PDF is dead. Long live PDF... with Java!PDF is dead. Long live PDF... with Java!
PDF is dead. Long live PDF... with Java!
 
How can large open source projects be monetized?
How can large open source projects be monetized?How can large open source projects be monetized?
How can large open source projects be monetized?
 
Start-ups: the tortoise and the hare
Start-ups: the tortoise and the hareStart-ups: the tortoise and the hare
Start-ups: the tortoise and the hare
 
Oops, I broke my API
Oops, I broke my APIOops, I broke my API
Oops, I broke my API
 
Startup Weekend Ghent
Startup Weekend GhentStartup Weekend Ghent
Startup Weekend Ghent
 
FIT Seminar Singapore presentation
FIT Seminar Singapore presentationFIT Seminar Singapore presentation
FIT Seminar Singapore presentation
 
PAdES signatures in iText and the road ahead
PAdES signatures in iText and the road aheadPAdES signatures in iText and the road ahead
PAdES signatures in iText and the road ahead
 
sdch
sdchsdch
sdch
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Ridge I T Limited Security
Ridge I T Limited   SecurityRidge I T Limited   Security
Ridge I T Limited Security
 
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
 
Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)
 
Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)Rolls Royse Blockchain Event (BiiLabs)
Rolls Royse Blockchain Event (BiiLabs)
 
Hypervault Sensitive Data Manager
Hypervault Sensitive Data ManagerHypervault Sensitive Data Manager
Hypervault Sensitive Data Manager
 
IoT at Scale
IoT at ScaleIoT at Scale
IoT at Scale
 

Similar to The effects of the GDPR

A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach - September 2017: France A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach - September 2017: France
Splunk
 
A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany
Splunk
 
A Day in the Life of a GDPR Breach
A Day in the Life of a GDPR BreachA Day in the Life of a GDPR Breach
A Day in the Life of a GDPR Breach
Splunk
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
Veritas Technologies LLC
 
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk
 
7 ways to drive Digital Transformation
7 ways to drive Digital Transformation7 ways to drive Digital Transformation
7 ways to drive Digital Transformation
Jonathan Beardsley
 
Your Worst GDPR Nightmare - Unstructured Data
Your Worst GDPR Nightmare - Unstructured DataYour Worst GDPR Nightmare - Unstructured Data
Your Worst GDPR Nightmare - Unstructured Data
DATAVERSITY
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
Fujitsu Middle East
 
Your Partner for Digital Transformation | Fujitsu Enterprise
Your Partner for Digital Transformation | Fujitsu EnterpriseYour Partner for Digital Transformation | Fujitsu Enterprise
Your Partner for Digital Transformation | Fujitsu Enterprise
BAS Fujitsu
 
Why the "web analytics guy" is your key to digital leadership
Why the "web analytics guy" is your key to digital leadershipWhy the "web analytics guy" is your key to digital leadership
Why the "web analytics guy" is your key to digital leadership
Humix
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
Jürgen Ambrosi
 
INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...
INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...
INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...
Data Driven Innovation
 
Fixing Intranet Search
Fixing Intranet SearchFixing Intranet Search
Fixing Intranet Search
Prescient Digital Media
 
HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...
HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...
HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...
Amazon Web Services
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
Data Traction
 
Regulatory Information Management - Everybody deserves the Truth
Regulatory Information Management - Everybody deserves the TruthRegulatory Information Management - Everybody deserves the Truth
Regulatory Information Management - Everybody deserves the Truth
V E R A
 
What you will take away from this session
What you will take away from this sessionWhat you will take away from this session
What you will take away from this session
Digital Transformation EXPO Event Series
 
Avoid IT project failure 2017
Avoid IT project failure 2017Avoid IT project failure 2017
Avoid IT project failure 2017
Ron Sheldrick
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 

Similar to The effects of the GDPR (20)

A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach - September 2017: France A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach - September 2017: France
 
A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany
 
A Day in the Life of a GDPR Breach
A Day in the Life of a GDPR BreachA Day in the Life of a GDPR Breach
A Day in the Life of a GDPR Breach
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
 
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
 
7 ways to drive Digital Transformation
7 ways to drive Digital Transformation7 ways to drive Digital Transformation
7 ways to drive Digital Transformation
 
Your Worst GDPR Nightmare - Unstructured Data
Your Worst GDPR Nightmare - Unstructured DataYour Worst GDPR Nightmare - Unstructured Data
Your Worst GDPR Nightmare - Unstructured Data
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Your Partner for Digital Transformation | Fujitsu Enterprise
Your Partner for Digital Transformation | Fujitsu EnterpriseYour Partner for Digital Transformation | Fujitsu Enterprise
Your Partner for Digital Transformation | Fujitsu Enterprise
 
Why the "web analytics guy" is your key to digital leadership
Why the "web analytics guy" is your key to digital leadershipWhy the "web analytics guy" is your key to digital leadership
Why the "web analytics guy" is your key to digital leadership
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
 
INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...
INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...
INDUSTRIA 4.0 - Il trasferimento tecnologico attraverso i Digital Innovation ...
 
Fixing Intranet Search
Fixing Intranet SearchFixing Intranet Search
Fixing Intranet Search
 
HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...
HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...
HLC310-How Methodist Le Bonheur Healthcare's Focus on Standardizing Compliant...
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
Regulatory Information Management - Everybody deserves the Truth
Regulatory Information Management - Everybody deserves the TruthRegulatory Information Management - Everybody deserves the Truth
Regulatory Information Management - Everybody deserves the Truth
 
What you will take away from this session
What you will take away from this sessionWhat you will take away from this session
What you will take away from this session
 
Avoid IT project failure 2017
Avoid IT project failure 2017Avoid IT project failure 2017
Avoid IT project failure 2017
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 

More from iText Group nv

PDF made easy with iText 7
PDF made easy with iText 7PDF made easy with iText 7
PDF made easy with iText 7
iText Group nv
 
Digital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case StudyDigital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case Study
iText Group nv
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
iText Group nv
 
iText Summit 2014: Talk: iText throughout the document life cycle
iText Summit 2014: Talk: iText throughout the document life cycleiText Summit 2014: Talk: iText throughout the document life cycle
iText Summit 2014: Talk: iText throughout the document life cycle
iText Group nv
 
iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...
iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...
iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...
iText Group nv
 
The XML Forms Architecture
The XML Forms ArchitectureThe XML Forms Architecture
The XML Forms Architecture
iText Group nv
 
Damn, the new generation kids are getting iPads in Highschool!
Damn, the new generation kids are getting iPads in Highschool!Damn, the new generation kids are getting iPads in Highschool!
Damn, the new generation kids are getting iPads in Highschool!
iText Group nv
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
 
Choosing the iText Solution that is right for you: Community or Commercial ed...
Choosing the iText Solution that is right for you: Community or Commercial ed...Choosing the iText Solution that is right for you: Community or Commercial ed...
Choosing the iText Solution that is right for you: Community or Commercial ed...
iText Group nv
 
The importance of standards
The importance of standardsThe importance of standards
The importance of standards
iText Group nv
 

More from iText Group nv (10)

PDF made easy with iText 7
PDF made easy with iText 7PDF made easy with iText 7
PDF made easy with iText 7
 
Digital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case StudyDigital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case Study
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
iText Summit 2014: Talk: iText throughout the document life cycle
iText Summit 2014: Talk: iText throughout the document life cycleiText Summit 2014: Talk: iText throughout the document life cycle
iText Summit 2014: Talk: iText throughout the document life cycle
 
iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...
iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...
iText Summit 2014: Talk: eGriffie and JustX, introducing digital documents at...
 
The XML Forms Architecture
The XML Forms ArchitectureThe XML Forms Architecture
The XML Forms Architecture
 
Damn, the new generation kids are getting iPads in Highschool!
Damn, the new generation kids are getting iPads in Highschool!Damn, the new generation kids are getting iPads in Highschool!
Damn, the new generation kids are getting iPads in Highschool!
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
 
Choosing the iText Solution that is right for you: Community or Commercial ed...
Choosing the iText Solution that is right for you: Community or Commercial ed...Choosing the iText Solution that is right for you: Community or Commercial ed...
Choosing the iText Solution that is right for you: Community or Commercial ed...
 
The importance of standards
The importance of standardsThe importance of standards
The importance of standards
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

The effects of the GDPR

  • 1. © 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA The effects of the GDPR A closer look at what it is and what developers can do
  • 2. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Introduction Michaël Demey Developer @ iText Software @MyMilkedEek
  • 3. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Disclaimer I’m not a lawyer or attorney
  • 4. © 2017, iText Group NV, iText Software Corp., iText Software BVBA What is GDPR General Data Protection Regulation
  • 5. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Regulation, not a directive Directives need national implementation Regulation doesn’t  Side-note: there are areas that do need national implementation
  • 6. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Natural person Natural Person = EU citizen Also known as a “Data subject”
  • 7. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Personal data Personal data is data or information that can be traced back to a data subject
  • 8. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Obvious stuff Name Address National ID number …
  • 9. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Critical stuff Medical records DNA
  • 10. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Less obvious stuff IP address E-mail address RFID HR information …
  • 11. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Other actors Data controllers Companies/organisations collecting the data Data processors Companies/organisations processing that data
  • 12. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Who does the GDPR affect Any company targetting EU citizens (data subjects) Regardless of where the company is located  US, Asia, … Focus is on the EU citizen
  • 13. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Directive of 1995 Already pretty progressive, but outdated GDPR is replacement with new technology and actors in mind
  • 14. © 2017, iText Group NV, iText Software Corp., iText Software BVBA GDPR timeframe 2016! But only enforced starting May 2018
  • 15. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Fines Hot topic with lots of scaremongering and confusion “Up to X million euro or x % of global revenue!” Technically true but EU will not hand these out willy-nilly “Be the carrot, not the stick”
  • 16. © 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA Collection of data
  • 17. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Rules for collection Intent must be stated There needs to be a clear goal and purpose to the collection of data Duration of storage
  • 18. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Consent Has to be explicitly given by the user Not sufficient are Silence or inactivity Pre-ticked checkboxes Without consent, you’re not allowed to collect data Can be withdrawn at any point
  • 19. © 2017, iText Group NV, iText Software Corp., iText Software BVBA No consent Access to or use of website/application content must not be restricted if data subject doesn’t consent, if the data isn’t necessary to operate
  • 20. © 2017, iText Group NV, iText Software Corp., iText Software BVBA
  • 21. © 2017, iText Group NV, iText Software Corp., iText Software BVBA
  • 22. © 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA Rights of the data subject
  • 23. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Access All data subjects should be able to access the data a company has on them In a readable, usable format
  • 24. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Update All data subjects should be able to update their personal data
  • 25. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Deletion Data subjects should be able to request a deletion of their data Very specific exceptions when it comes to complying to this request Biggest issue when reading blogs and articles
  • 26. © 2017, iText Group NV, iText Software Corp., iText Software BVBA The “right to be forgotten”
  • 27. © 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA Action plan! “Design by privacy”
  • 28. © 2017, iText Group NV, iText Software Corp., iText Software BVBA First things first Talk to your management Make sure they’re aware of this There might already be a plan
  • 29. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Collect information List of all data captured What do you capture Why is it captured  Is it necessary? Where is it stored How long is it stored How is it stored  Has it been secured?
  • 30. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Tools Check your used tools CRM Bug trackers Marketing tools These are usually externally developed and/or hosted Make sure these are compliant
  • 31. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Breach Policy There needs to be a breach policy in place What to do, who to contact, etc. when a breach has been detected
  • 32. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Measurements Pseudonymize personal data Encryption! Take as many precautions as possible when storing data Already implement (or prepare) ways for data subjects to use their rights
  • 33. © 2017, iText Group NV, iText Software Corp., iText Software BVBA© 2017, iText Group NV, iText Software Corp., iText Software BVBA Summary
  • 34. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Summary EU citizen focus Change in mentality -> design by privacy Use common sense Intent and actions are the key factor
  • 35. © 2017, iText Group NV, iText Software Corp., iText Software BVBA Thank you! Questions?

Editor's Notes

  1. So, what is the GDPR? It stands for “General Data Protection Regulation”. Which is a mouthful, but it already gives you an idea on what it’s trying to achieve. I’ve pasted part of the introduction text of the legislation so that we can start our dive into what the GDPR is. As a side note, if you’re interested in reading the full tekst, please do so. I found it quite accessible and easy to read. It’s not in my top 10 of things I’ve read this year, but it’s at least easy on the brain. READ TEKST So, let’s pull that apart and check what it actually means.
  2. First thing we notice is that it’s a regulation. Not a directive. For people not familiar with EU legislation, directives are similar to interfaces. You still need an implementation, which is done on a national level.