Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Brexit, GDPR & data protection

in Blog, Document Security, DRM, PDF Security

Brexit, GDPR & the need to protect confidential documents.

There is much confusion over the subject of GDPR data protection, and what is personal data.  In the event of a ‘hard’ Brexit this is likely to worsen.  Here we discuss how to protect confidential documents and data for GDPR compliance.

The recent ‘Brexit’ events in the UK concerning the EU regulation General Data Protection Directive (GDPR) have served to remind us that we have to take protecting confidential documents seriously.  In the event of a ‘hard Brexit’ the status of the UK changes from being within the EU for data protection purposes to being a ‘third country’.  That means it does not have the benefit of any contractual agreements for data protection into and from the EU.  However, most companies will still be looking to comply with GDPR to the best extent possible until there is more legal clarity.  And anyone transferring personal data between the EU or processing EU citizen’s personal data will still need to comply with GDPR.

Protection of personal data

It is well understood that personal data have to be protected, but how do you decide when data become personal and does it change if combined with other data?  Generally you have to protect confidential documents which include data that identify a living individual, although that can be balanced against the likely harm that disclosure of the data will make (as a rule of thumb disclosing six names and email addresses may be valid when all the recipients expect that, but disclosing 50 or 60 would not be, and the recipients should be in the bcc list), and that’s just for a name and an email address!

The same is true when you need to protect documents with proprietary information or protect confidential documents with secret or restricted information.  One unprotected document is one thing.  But you have to take positive steps to protect confidential documents where there are several or the document is highly confidential.  And where we have to protect confidential documents containing personal information it is easier to do it for all documents rather than get it wrong.

Are the normal document handling tools suitable?

Most of today’s applications are built around the idea of group working on documents and sharing documents for editing.  But that is not what we want to be doing with confidential documents.  So we need to use special applications that actively prevent authorized users from being able to use Save or Save As commands, and are able to block use of the Print Screen key, screen grabbers and so on.  In particular, if you have protected confidential documents for use by specific recipients you do not want them to be passed on and read by people who are not authorized.  Therefore you will be looking for applications that can protect confidential documents in the workplace, at one level, and also enable you to distribute confidential documents in a controlled manner to recipients outside the corporate network or local domain.

What can you do to protect confidential documents from disclosure?

In the digital workplace protecting confidential documents from disclosure means that we are going to have to use encryption, so that only someone who is authorized and has access to a decryption key is able to open the document in an unprotected form.  But then you have the problem that anyone who can open the protected document can do what they like with it, which is not much protection unless you can then prevent them from copying, cutting and pasting, screen grabbing, or saving the confidential document in unprotected form.

This is the downside of file encryption products.  They prevent unauthorized access, but authorized users can do what they like with the file or document once it is decrypted.  And there is nothing to prevent users giving away the encryption key so you are not necessarily limiting access to certain parties anyway.  It is merely a transaction built on trust (the trust being that the document and the key will not be shared with others).

So document protection solutions that also use DRM (to control document use) and licensing controls (to control distribution) need to be in place to control document sharing and use.

Can we control protected documents by network access controls?

Previously organizations (including government bodies) have relied upon separating networks protecting confidential documents that are restricted, but the erosion of the network boundary, and the increase in the use of Bring Your Own Devices (BYOD) to take copies onto storage that fits comfortably inside a wallet or purse have meant that the actual document content must be protected, and more rigorously than before.

So specially designed applications are needed to provide the functionality of restricting use to single or ranges of IP addresses to reflect the corporate structure without losing the flexibility of being able to also authorize outsiders access were this is relevant (proprietary data, government confidentiality, medical and so on).

Locklizard, through their Digital Rights Management (DRM) enforcing applications Locklizard Safeguard and Safeguard Enterprise, have been developing and delivering document security applications that address these requirements and many more.

Locklizard PC installed Viewer applications have been developed to avoid the need for the authorized user to enter a key or ‘log in’ using ID/password.  There is nothing therefore to be able to give away to anyone who has acquired a copy of a protected confidential document.  Licensing controls enforce what users can view a document and keys are transparently and securely relayed  and locked to authorized devices.

Document and user validation, expiry and revocation

Licensing controls are very extensive, and may require a user of a protected confidential document to be online every time they open it, or online after a number of days so that their authority can be verified and any changes made by the Administrator to their document access rights can be enforced.

Further controls are available to help stop protected confidential documents from continuing to be usable after their normal legal retention period (which can be 6 years for ordinary financial matters and 20 years after death for some personal medical information).  When using Locklizard for protected confidential documents, end dates can be individually tailored to meet differing requirements, and can be altered after being issued, by Administrators where this is necessary.

This may be as a result of authorization being removed because the user has left the organization or a change in role or location makes it no longer appropriate to have access to some or all of the protected confidential documents.  It could also be the result of changes to regulations or to prevent use of outdated documents.

Both users and documents can be instantly revoked and user access to individual or all documents ceased automatically.  This ensures access to personal and confidential data is no longer available when use has been stopped and therefore there is no risk of accidental or deliberate exposure.  It may be very helpful in order to demonstrate that unlawful processing has ceased in the event of a GDPR audit.

Tracking document use and tracing leaks

Sometimes it may be necessary to show who the authorized user is.  This can be because copying a protected confidential document is so important to a thief that an actual camera is used to make copies of the screens being displayed (printing such documents should always be forbidden by the Administrators).  It is impossible to stop this.  Locklizard support the addition of dynamic watermarks on viewed (and printed) confidential documents that show who the authorized user was that allowed the screen to be copied.  Generally authorized users do not want to be associated with document piracy, especially when it is easy to identify them, so they avoid disclosing protected information.

Document use can be logged so you can see when documents were used, by who and when.  This helps with GDPR compliance for audit because it is important to be able to demonstrate where personal data is used or printed and distributed.

Tags: brexit, document control, document drm, document protection, document rights management, document security, drm, gdpr, information protection, personal data protection, protect confidentail data, protect confidential documents, protect documents, protect sensitive data, protect sensitive documents, protect sensitive personal data, protecting documents
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Trade secret protection Link to: Trade secret protection Trade secret protectionLink to: How Document DRM systems work Link to: How Document DRM systems work How Document DRM systems work
Scroll to top Scroll to top Scroll to top