GDPR has the potential to introduce positive changes for many businesses. It is designed to increase the harmonization of national data protection laws across the EU while, at the same time, addressing new technological developments.
On the other hand, GDPR is likely to require organization-wide changes for many companies across the EU, as business will have to ensure that personal data get processed in compliance with the newly set requirements. It may also lead to adapting new organizational and technical measures such as encryption. Encryption means encoding information in a way that prevents unauthorized parties from being able to read it.
This will also require designation of specific roles and responsibilities within the company, as well as employee training and preparation of notification templates. Compliance with the new GDPR rules for breach reporting will entail a significant administrative burden, one which may increase costs for businesses.
The communication of the data breach to data subjects will not be required if the controller has implemented appropriate protection measures. This applies in particular to means that render personal data unintelligible to any person who is not authorized to access it. Encryption fulfills this goal, being explicitly named by the GDPR as one of the appropriate technical and organizational measures that businesses shall implement to ensure a level of security adequate to the risk.
One example, DESlock Encryption by ESET, offers more than just the basics. It also offers business clients a solution that is simple to deploy, easy to use for even non-technical users and, one that allows for the remote management of keys, settings and security policy. It also allows users to safely encrypt hard drives, removable media, files and email.
Apart from all that, DESlock Encryption by ESET solves one of the biggest usability challenges: How can users share encrypted information? Common passwords are a potential security risk and public-key encryption cause problems, mainly in larger teams with higher staff turnover. Centrally-managed, shared encryption keys avoid these hindrances, mirroring a more natural way – resembling the use of physical keys to lock houses or cars.