Abstract
We provide actionable guidance to organizations needing to comply with the European General Data Protection Regulation (GDPR). We use a data processing pipeline – Data collection, Data protection, and Data operations – to structure the discussion around regulation requirements (with references to specific articles and recitals), socio-technical challenges, and applicable security best practices and techniques. Ensuring compliance is critical since fines for infringements can mount up to 4% of the total worldwide annual turnover of the organization in the preceding financial year.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
AIDE - Advanced Intrusion Detection Environment, available on-line at https://github.com/aide/aide. Accessed 7 July 2020
Anderson, R.: Security engineering: A Guide to Building Dependable Distributed Systems, 3rd edn. Wiley, Indianapolis, Indiana (2020)
Antunes, N., Vieira, M.: Defending against web application vulnerabilities. Computer 45(2), 66–72 (2012)
Article 29 Data Protection Working Party. Guidelines on the application and setting of administrative fines for the purposes of the Regulation 2016/679. http://ec.europa.eu/newsroom/just/document.cfm?doc_id=47889. Accessed 7 July 2020
Article 29 working party. guidelines on consent under regulation 2016/679 (wp259rev.01). https://ec.europa.eu/newsroom/article29/document.cfm?action=display&doc_id=51030. Accessed 7 July 2020
Bellovin, S.M.: On the brittleness of software and the infeasibility of security metrics. IEEE Secur. Priv. 4(4), 96 (2006)
Beye, M., Jeckmans, A., Erkin, Z., Hartel, P.H., Lagendijk, R., Tang, Q.: Privacy in Online Social Networks, pp. 87–113. Computational Social Networks. Springer, London (2012)
Boavida, F., Bernardes, M.: Introdução à Criptografia, FCA–Editora de Informática (2019)
Degeling, M., Utz, C., Lentzsch, C., Hosseini, H., Schaub, F., Holz, T.: We value your privacy. Now take some cookies: measuring the GDPR’s impact on web privacy (2018). arXiv preprint arXiv:1808.05096
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data). https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A31995L0046. Accessed 7 July 2020
Engels, B.: Data portability among online platforms. Internet Policy Rev. 5(2) (2016)
Fabian, B., Gürses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requirements Eng. 15(1), 7–40 (2010)
Fryer, H., Simperl, E.: Web science challenges in researching bug bounties. In: Proceedings of the 2017 ACM on Web Science Conference, pp. 273–277 (2017)
GDPR Enforcement Tracker. https://www.enforcementtracker.com. Accessed 7 July 2020
Intersoft Consulting. General Data Protection Regulation – Official Legal Text. https://gdpr-info.eu. Accessed 1 June 2020
Janal, R.: Data portability-a tale of two concepts. J. Intell. Property, Inf. Technol. E-Commer. Law, 8(1), 59–69 (2017)
Flora, J.: Trusted execution environments. CSAM 6 Jan 2020
Liu, C., White, R.W., Dumais, S.: Understanding web browsing behaviors through Weibull analysis of dwell time. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 379–386 (2010)
Malandrino, D., Petta, A., Scarano, V., Serra, L., Spinelli, R., Krishnamurthy, B.: Privacy awareness about information leakage: who knows what about me? In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 279–284 (2013)
Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562–10582 (2017)
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)
Narayanan, A., Shmatikov, V.: How to break anonymity of the Netflix Prize dataset, arXiv e-print. http://arxiv.org/abs/cs/0610105. Accessed 8 July 2020
Neto, A.A., Vieira, M.: Untrustworthiness: a trustbased security metric. Fourth Int. Conf. Risks Secur. Internet Syst. 2009, 123–126 (2009)
Omoronyia, I.: The case for privacy awareness requirements. In: Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, pp. 697–716. IGI Global (2019)
Open Web Application Security Project (OWASP) Secure Coding Practices - Quick Reference Guide. https://owasp.org/www-pdf-archive/OWASP_SCP_Quick_Reference_Guide_v2.pdf. Accessed 8 July 2020
Politou, E., Alepis, E., Patsakis, C.: Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. J. Cybersecurity, 4(1), tyy001 (2018)
Prasser, F., Kohlmayer, F., Lautenschlaeger, R., Kuhn, K.A.: Arx-a comprehensive tool for anonymizing biomedical data. In: Proceedings of the AMIA Annual Symposium, pp. 984–993 (2014)
Publications Office of the European Union, 2.2. Preamble (citations and recitals). https://publications.europa.eu/code/en/en-120200.htm. Accessed 8 July 2020
Regulation (EU) (2016/679) (2016). https://eur-lex.europa.eu/eli/reg/2016/679/oj. Accessed 8 July 2020
Saltis, S.: GDPR explained in 5 minutes: everything you need to know. https://www.coredna.com/blogs/general-data-protection-regulation. Accessed 1 June 2020
Sweeney, L.: K-anonymity: a model for protecting privacy. Internat. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Teixeira, G.A., Silva, M.M., Pereira, R.: The critical success factors of GDPR implementation: a systematic literature review. Digit. Policy, Regul. Governance. 21(4), 402–418 (2019)
Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T.: (Un) informed consent: studying GDPR consent notices in the field. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 973–990 (2019)
Vieira, M., Antunes, N.: Introduction to software security concepts. In: Cotroneo, D. (eds.) Innovative Technologies for Dependable OTS-Based Critical Systems. Springer, Milano (2013)
Villaronga, E.F., Kieseberg, P., Li, T.: Humans forget, machines remember: artificial intelligence and the right to be forgotten. Comput. Law Secur. Rev. 34(2), 304–313 (2018)
Warren, T.: Zoom announces 90-day feature freeze to fix privacy and security issues. https://www.theverge.com/2020/4/2/21204018/zoom-security-privacy-feature-freeze-200-million-daily-users. Accessed 1 June 2020
Wilson, K.S.: Conflicts among the pillars of information assurance. IT Professional 15(4), 44–49 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Almeida, J., da Cunha, P.R., Pereira, A.D. (2022). GDPR-Compliant Data Processing: Practical Considerations. In: Themistocleous, M., Papadaki, M. (eds) Information Systems. EMCIS 2021. Lecture Notes in Business Information Processing, vol 437. Springer, Cham. https://doi.org/10.1007/978-3-030-95947-0_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-95947-0_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95946-3
Online ISBN: 978-3-030-95947-0
eBook Packages: Computer ScienceComputer Science (R0)