In Pursuit of Digital Transformation - Benefits and Strategy

Implementing GDPR – A Practical Guide for Software Developers

Facebook is lately in the news for the wrong reasons. It’s arrangement with Cambridge Analytica to harness Facebook users’ data and push targeted content to those users has kicked up a storm in the business world; and reasonably so. Data captured from users before, during or after a transaction remains with the company long-after, and can be manipulated in different ways for business reasons.

In the absence of any regulation, companies ranging from Banks and Financial Institutions to e-commerce companies to all kinds of service providers are recklessly capturing user data on their websites and storing it in their databases for future use.

What is GDPR?

Long before the Facebook scandal rocked the world, governments around the world have been debating the dangers of capturing and exploiting user data. That is why; the European Union came up with its own set of regulations in April 2016, called the GDPR or General Data Protection Regulation. GDPR governs how, how long and how much data can be captured and how the same must be managed thereafter. Business organizations that do business in the Europe, or primarily targeting end-users based in the Europe, are mandated to follow the GDPR, failing which, they will be subject to severe fines and penalties.

What does the GDPR advocate?

As per the GDPR, end-users or clients, also called ‘data-subjects’ have the following rights from the angle of data-protection. These apply to companies of all sizes – from solo entrepreneurships to large multinationals:

  • Right to erasure or the right to be forgotten or deleted from the system as a user
  • Right to restriction in processing, that is, only when the user gives consent can the data be processed, else, it must be marked as restricted
  • Right to data portability, that is, user’s personal data must be exportable into any machine readable format
  • Right to rectification: the user must have the ability to correct some of his/her personal data
  • Right to be informed in simple language as against complex terms and conditions worded in legal language
  • Right of access, that is, the user should be able to clearly see all the data about them that you are storing
  • Right to data minimization, that is, minimum data about the user must be collected
  • Right to integrity and confidentiality, that is, the organization must maintain the data safely and securely, and ensure the data is not modified or manipulated in any way

In addition to the above, companies with more than 250 employees must keep a record of all the processing activities carried out on the user’s personal data.

Implementing GDPR

As the deadline for implementing GDPR on all online websites, portals or applications gets closer (25th May 2018), it’s important for software developers to be aware of the data management guidelines recommended by the GDPR. Given below are some best practices, dos and don’ts which serve as technical guidelines for protecting users’ personal data. Personal data not only refers to what companies are capturing from users, on their websites or otherwise, but also whatever data they are purchasing from 3rd party providers. Further, these technical guidelines may or may not be automated depending on the size of the organization and its current data-management practices.

Good Practices

  • Forgetting users: The data model of the software must be so designed that if the user seeks to have his data deleted, then, only the userid is maintained and all other data is deleted, with the forgotten IDs maintained in a separate database.
  • 3rd parties must be notified or erasure: Once the user data is deleted from your own system, you should contact 3rd parties such as Facebook, Twitter, Googleplus, Salesforce, Hubspot, etc and initiate the data delete from their systems as well
  • Restricted processing: The user should be given an option to choose ‘restricted processing’ for his profile, so that his/her data is not visible to the public or back-office staff
  • Exportable data: The ‘forget me’ feature may only delete the user’s personal data but a record of transaction may still be maintained. These along with the personal info should be exportable when demanded by the user
  • Editing the profile: Users should be able to edit their personal information that you have captured from them directly and fetched from 3rd parties, through the user interface
  • Consent boxes: You should present a list of activities where the user data will be processed, and provide consent boxes for each of them so that the user can check or uncheck them as per his/her preference. The check-uncheck data should also be clearly marked in the database
  • Re-request consent: In case the user appears to be confused about the consent boxes, or if you need to use the data for which there is no consent provided, you should send a clear request to the user with necessary explanations and obtain consent if required
  • Show “all my data”: Once the consent(s) have been clearly provided by the user, the same data should be exportable and displayed in the UI for the user’s self-assurance.
  • Age-checks: Minors or those below 16/18 years of age must specify their age and show parent permissions for using certain functions/sites, as well as giving consent of their data, by providing the parent’s email ids
  • Deadlines for storing user data: Certain user-data should only be maintained for as long as one or more activities require the same and must be deleted thereafter by using a deadline function, with the ability to change the deadline in case of emergencies
  • Cookies: There are detailed guidelines and restrictions on the use of cookies on the site

Some Do’s

  • Data must be encrypted in transit: Communication between the application layer and database should be through TLS with the certificate being self-signed
  • Data at rest must also be encrypted: The private key may be either stored on your premises or in the cloud
  • All backups must be encrypted
  • Use of pseudonyms: When the user data is being used on test or staging servers, pseudonyms should be used for them
  • Integrity of data must be protected: Implement checksums or any other method for data authentication, so that every-time some data is updated, its updated all through the application
  • Maintain a register of all activities that processed user-data: This is mandated by the GDPR, and such data can be stored in an application or microservice maintained on-premise
  • Logging access to user-data: Every read command on the user’s personal data must be logged to ensure the data has not been accessed or processed without a valid reason
  • Registering 3rd party APIs: 3rd parties should not have random or reckless access to user data through APIs. Every API consumer should be clearly registered with all contact information

Some Don’ts

  • Don’t use data unless user has consented: While this was already covered under the point about consent boxes, please note, every time a new processing activity is added to the register of activities, user consent for this activity must be taken afresh from all users.
  • Personal data should not be logged: Log only the identifiers and do not log the user’s personal data and ensure all old data logs are cleaned up.
  • Capturing unnecessary data: Unlike the past when forms had a lot of fields, GDPR insists that minimum data is captured. For example, if it’s not an e-commerce site, fields such as address, zip code and contact number need not/must not be captured
  • Trusting 3rd parties blindly: Even as you stay compliant with all GDPR guidelines, ensure that 3rd parties who are given access to user data through APIs are also compliant; else, in case of a data breach, you are at serious risk. This can be done by signing a clear contract with every 3rd party.
  • GDPR compliance has nothing to do with your Quality systems: Quality standards such as ISO, SEI-CMM etc do not necessarily cover the above GDPR guidelines. So always undertake GDPR audits irrespective of your Quality standard audits.

Conclusion

Ensuring GDPR compliance at your organization may require a redesign of your data models, storage techniques, data flows and API calls, for better data protection. GDPR regulators will have a thorough checklist that will be used to gauge your level of compliance.

This has created a new breed of GDPR Consultants who are likely to tell you that GDPR is extremely complicated and an expensive exercise. Be wary of such claims. GDPR compliance is not meant to be complicated at all. It involves clear guidelines that can be incorporated within your existing processes and then enforced through discipline. Aloha Technology consultants can help you navigate the GDPR milieu easily.

Engage the right class of technology company and you can enjoy GDPR compliance in a cost-effective and efficient manner. Aloha Technology has the right mix of expertise and experience to undertake such initiatives for your organization.