GDPR: How to ensure compliance for data analytics platforms
Regardless of whether personal data is being used under public interest, legitimate interest, or consent, GDPR requires taking a risk-based approach to processing, using safeguards, such as pseudonymisation, de-identification or role-based access control.
But what many businesses have realised is that applying these safeguards in a scalable, future-proof way is a significant challenge.
Organisations that have embraced data-driven insight are using data to identify trends and behaviours, make predictions and extract statistical insights. Maintaining the data’s nuanced structure, complexity and referential integrity is essential if it is to remain useful for these applications.
The General Data Protection Regulation (GDPR) will come into force on the 25th May 2018 and will have wide reaching consequences for all companies which control or process personal data of those in the EU.
Privitar Publisher works alongside modern data platforms on premise or on cloud to support GDPR compliance.
Protect personal data, whilst preserving its utility
Publisher enables personal data protection with comprehensive masking and statistical anonymisation techniques
Enable collaboration and sharing
Publishing data into Protected Data Domains enables you to collaborate while reducing risk misuse of data
Enable manageability and transparency
Publisher enforces privacy policies that are approved by risk and compliance functions with clear proof of execution and comprehensive audit trails.
Track data usage and lineage
Indelible watermarks embedded in the data itself enable data lineage
Webinar: GDPR Is Coming
Is your organisation ready? Find out some of the key steps to help you prepare in this on-demand webinar.
Getting Ready for the GDPR Guide
The new General Data Protection Regulation (GDPR) comes into force on 25th May 2018. Companies should be preparing now. This guide looks at how privacy engineering can help achieve compliance.
The right to be forgotten
Read this white paper highlighting some key points for consideration, and looks at how privacy engineering techniques can be used to respect individual's rights and privacy, whilst minimising disruption and cost.