Back To Blog

When technology meets regulation (GDPR) - part I

Insurance security and compliance

Our previous blog series, the 7 challenges for securing your documents under GDPR, is a vademecum on how to manage your unstructured data under the General Data Protection Regulation.

Unstructured data are found everywhere, in emails and documents, stored on local or network drives, in the Cloud, or on USB Keys. If we want to adequately protect personal data stored in these documents, the first hurdle to take is to know what kind of personal data is in which document. 

In the last months, we have been working hard, in order to provide our customers with a GDPR ready solution to:

  • Manage GDPR information: how to detect new or existing personal information across a range of locations and formats, how to apply for appropriate security and protection from internal and external risks, and how to manage the entire life-cycle, including sharing documents within the team or third parties. 
  • Align to business departments: From HR to Finance, to Marketing and Sales to Operations, each department will access and process personal and sensitive information. In our solution we have set up GDPR roles-based access control to personal data.
  • Monitoring and reporting requirements: Implementation of security controls, monitoring and auditing to managing GDPR content. 

In this two-article series we would like to answer the following questions:

  1. In a nutshell, what is the solution? 
  2. What is the technology behind it?

1. In a nutshell, what is the solution?

In this case, a video is worth more than thousands of words, so we would recommend you to invest your next 15 minutes to watch our practical demonstration, to solve your GDPR challenges.


Our solution focuses on specific requirements around:

  • Clear notifications to individuals as to how data will be collected and used, and how and with whom it will be shared;
  • Specific rights for individuals to access and correct personal data, and to request that processing of personal data cease;
  • Significant obligations to secure personal data and to notify regulators and individuals of certain types of personal data breaches.

Now that the solution is clear, you may be interested in understanding the technology behind it. In the next article, we will elaborate on metadata-based access control extension and how to improve Alfresco Access Control List (ACL) lists. 

In the meantime, curious to know how Wolters Kluwer is complying with GDPR? Contact us and we will be happy to share with you our customers’ stories.

HTML Snippets Powered By : XYZScripts.com