Explore Cyphere’s GDPR compliance offerings to help you achieve hassle-free GDPR compliance. We offer a variety of GDPR cyber security services tailored for your organisation needs so that you can choose what’s best for YOU!

Get In Touch

No salesy newsletters. View our privacy policy.

What is the purpose of GDPR?

The General Data Protection Regulation, or GDPR for short, is an important privacy law in the EU that aims to give citizens even greater control over their personal information. The regulation was enforced on May 25th, 2018 and covers all businesses dealing with data from within the region. It also requires a best-practice approach across industries when it comes to cybersecurity – helping businesses to avoid data breaches!

The law has mandated that all businesses with European customers need to fully adopt GDPR principles, including adopting adequate security strategy and technical measures in order to protect the personal data of EU citizens. The UK’s Data Protection Act covers the data protection measures via 8 principles. The legislation also focuses on creating a workflow that will reduce cyberattacks, privacy outbreaks within companies by making them more conscious about their web presence from an online perspective.

GDPR cyber security

GDPR security requirements

Article 5   

Personal data to be processed with lawfulness, fairness, and transparency and only collected for legitimate purposes and not further processed for any kind of archiving, scientific, statistical, or historical research purposes. It must not be kept in a manner to permit unauthorised or unlawful processing and should be kept safe against accidental loss, destruction, or damage using appropriate technical or organisational measures.

Article 32

Implementation of appropriate technical and organisational measures to assess and to ensure confidentiality, integrity, availability of processing systems and services. This includes the ability to restore the availability and access to personal data in a timely manner in case of a technical or physical incident. A particular process for regularly testing, assessing, and evaluating the effectiveness of organisational controls to ensure security of data processing.

Article 33

Report the data breach without delay within 72 hours. Document and report the nature of personal data breach, including the consequences, remedial action is taken, detection and investigation of the data breach, as well as the measures in place to adverse the breach effect. In instances where it is not possible to provide the information of violation at the same time, the notification must be provided in phases without undue delay.

Article 35

The Data Protection Impact Assessment (DPIA) is a process that assesses the data protection risks and legal requirements when processing personal information. It provides an opportunity to identify, address, mitigate and monitor these risks in order to fulfil obligations under data privacy laws.  

What are the seven principles of GDPR?

Article 5 sets out GDPR data protection principles that are at the centre of this regulation. The law basically says that you can’t do anything with other people’s information without their permission. This is at the beginning of the law and it shows how everything else has to be done. There are a few exceptions, but they are rare.

1. Lawfulness, Fairness & Transparency

All the data we collect must meet the requirements of GDPR and be used fairly and for legitimate purposes. If authorities identify data processing that occurred beyond the data subject, it may attract penalties.

2. Purpose limitation

The personal data must be collected and processed for the specified and legitimate reasons and any of the processes that do not comply with the specified purpose or consent would be considered incompatible.

3. Data minimisation

This means collecting the minimal data needed for delivering the individual element agreed in your services. A business cannot collect more data than required for their services. 

4. accuracy

The collected data must keep accurate, up-to-date and fulfil the necessary processing purpose, including the deletion of inaccurate information without any delay.

5. Storage limitation

Data must not be kept for longer than required and deleted or destroyed once the information is processed for the specified purposes. Based on the archive, statistical, or research purpose subject to the implementation of technical or other controls, it ensures that the organisation follows the GDPR exceptions requirement to safeguard the individual.

6. Integrity and Confidentiality

Organisation must have strict policies and technical measures to prevent unauthorised and unlawful access. They must ensure the integrity and confidentiality of personal data against all internal and external attacks vectors.

7. Accountability

The data controller is responsible for demonstrating all the GDPR principles within the business to ensure the data processing protection, as well as is accountable in case of compliance violations.

Who does GDPR apply to?

Your business must comply with the GDPR if your company has a presence in any of the European countries, processes the EU residents personal data and has more than 250 employees or less than 250 employees with impactful processing of the data under any of the GDPR data process principles. 

Businesses can comply with GDPR by verifying their users and customers’ data along with the current security and privacy measures implemented within the organisation. To fulfil the compliance requirements, businesses need to incorporate a technical mechanism to store the information for the specified and required duration. 

Under the compliance, every business must protect the following personal data:

  • Basic identification details such as name, address, and ID numbers
  • Web data such as location, IP address, cookie data, and RFID tags
  • Finance Information
  • Health and genetic data
  • Biometric data
  • Racial or ethnic data
  • Political opinions
  • Sexual orientation
  • Genetic information
  • Social Identity
  • Cultural Identifiable Information

More on GDPR Compliance

GDPR Summary

GDPR - What you should know

GDPR Breach Reporting

When and How to report GDPR personal data breaches (Article 33)


The most extensive list of GDPR FAQ for employees and employers

Subject Access Request

How to deal with Data Subject Access Requests (SAR)?

Data controller or Data processor

Are you GDPR ‘data controller’ or ‘data processor’? Understand the difference.

GDPR Individual Rights

Discover what are the 8 rights for individuals under GDPR

Trusted partners for GDPR Security assessments

How to detect and report GDPR breaches?

By proactively seeking out threats and monitoring your network defence environment, organisations can detect the breach and prevent the personal data loss of individuals. GDPR emphasises safeguarding personal data against loss, theft, and authorised access, along with a robust procedure and measures to identify and detect the breach.

GDPR implies a breach notification rule in its directives that bounds to report the breach within 72 hours of detection, and in case the breach has an impact of high privacy risk for individuals, those individuals should be informed of the breach.

When and How to report GDPR personal data breaches (Article 33)


GDPR principles data protection

How Cyphere helps you with GDPR compliance to minimise security risk?

Cyphere’s cyber security services are designed to help you fulfil your information technology and data protection obligations, including those under the GDPR. We help our customers prepare for GDPR compliance in multiple ways:

Recent Blog Entries