Skip to content

GDPR

Comply with EU data protection requirements using CyberOrigen.

Overview

GDPR (General Data Protection Regulation) is the EU's comprehensive data privacy law. It applies to any organization processing personal data of EU residents.

Key Principles

PrincipleDescription
LawfulnessLegal basis for processing
Purpose LimitationSpecific, explicit purposes
Data MinimizationOnly necessary data
AccuracyKeep data accurate
Storage LimitationDon't keep longer than needed
Integrity & ConfidentialitySecurity of processing
AccountabilityDemonstrate compliance

GDPR Articles

Chapter 2: Principles

ArticleTitle
5Principles relating to processing
6Lawfulness of processing
7Conditions for consent
8Child's consent
9Special categories of data
10Processing of criminal data
11Processing without identification

Chapter 3: Rights of Data Subjects

ArticleTitle
12Transparent information
13Information at collection
14Information when not from subject
15Right of access
16Right to rectification
17Right to erasure
18Right to restriction
19Notification obligation
20Right to data portability
21Right to object
22Automated decision-making

Chapter 4: Controller & Processor

ArticleTitle
24Responsibility of controller
25Data protection by design
28Processor obligations
30Records of processing
32Security of processing
33Breach notification to authority
34Breach notification to subjects
35Data protection impact assessment
37Data protection officer

Getting Started

1. Enable Framework

  1. Go to GRCFrameworks
  2. Click Enroll on GDPR
  3. Click Enable

2. Data Inventory

Document personal data processing:

  1. Identify data categories
  2. Map data flows
  3. Document lawful basis
  4. Record in processing register

3. Security Assessment

Evaluate Article 32 requirements:

  • Encryption
  • Confidentiality
  • Integrity
  • Availability
  • Resilience

Key Controls

Article 32 - Security

RequirementCyberOrigen Feature
EncryptionTLS/encryption scanning
ConfidentialityAccess control scanning
IntegrityFile integrity checks
AvailabilityUptime monitoring
TestingVulnerability scanning

Article 25 - Privacy by Design

PrincipleImplementation
ProactiveRisk assessment
Default settingsConfiguration checks
Full lifecycleEvidence management
SecurityContinuous scanning
VisibilityAudit logging
User-centricAccess controls

Data Subject Rights

Right Fulfillment

Track and respond to data subject requests:

RightSLADocumentation
Access (Art. 15)30 daysRequest log
Rectification (Art. 16)30 daysChange record
Erasure (Art. 17)30 daysDeletion record
Portability (Art. 20)30 daysExport format
Object (Art. 21)30 daysResponse record

CyberOrigen Tracking

  1. Go to GRCControl Library
  2. Track DSR controls
  3. Document procedures
  4. Link evidence

Breach Notification

Timeline

ActionDeadline
Detect breachAs soon as possible
Notify DPA72 hours from awareness
Notify subjectsWithout undue delay

What to Report

  • Nature of breach
  • Categories of data affected
  • Approximate number of subjects
  • Contact for DPO
  • Likely consequences
  • Measures taken

CyberOrigen Support

  • Vulnerability detection
  • Threat intelligence
  • Incident documentation
  • Remediation tracking

DPIA Requirements

When Required

Data Protection Impact Assessment needed for:

  • Systematic profiling
  • Large-scale special category data
  • Systematic public monitoring
  • New technologies

DPIA Process

  1. Describe processing
  2. Assess necessity
  3. Identify risks
  4. Mitigate risks
  5. Document outcome

Vendor Management

Processor Agreements

Track Article 28 requirements:

  1. Go to GRCVendors
  2. Add data processors
  3. Upload DPAs
  4. Track compliance

Subprocessor Management

  • Document subprocessors
  • Ensure DPA coverage
  • Monitor changes

Control Mapping

GDPR maps to other frameworks:

GDPR ArticleSOC 2ISO 27001
Art. 32 SecurityCC6.1, CC6.7A.8.24
Art. 30 RecordsCC2.2A.5.9
Art. 33 BreachCC7.3A.5.24
Art. 35 DPIACC3.16.1.2

Evidence Collection

Automated Evidence

  • Security scan reports
  • Access reviews
  • Encryption verification
  • Configuration assessments

Manual Evidence

  • Privacy policies
  • Processing records
  • Consent records
  • DPIAs
  • DPAs with processors

Common Gaps

RequirementIssueSolution
Art. 30No processing recordsDocumentation
Art. 32Weak encryptionEncryption upgrade
Art. 33No breach processIncident response plan
Art. 37No DPO appointedDPO designation

Penalties

ViolationMaximum Fine
Lower tier10M EUR or 2% revenue
Higher tier20M EUR or 4% revenue

Resources

Agentic AI-Powered Security & Compliance