Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

GDPR: Data protection & document security

in Blog, Document Security, DRM, PDF Security

GDPR’s data security requirements & how to achieve GDPR-compliant file sharing

Though GDPR came into effect several years ago, it’s still causing plenty of pain. New businesses must figure out how to protect sensitive personal data to a high standard or risk huge fines.  This requirement includes not only data at rest but also sending documents securely, keeping sensitive data under your control, and complying with GDPR policies such as data retention.  Thankfully, though all this sounds intimidating, it’s easier to achieve than you think.

   GDPR and data security


A lot of interest was generated by the EU introduction, back in May 2016, of GDPR, which introduces explicit requirements on organizations that collect and process personal data.  Though businesses had several years to prepare for GDPR’s application in 2018, there was and still is confusion regarding how to send documents with such data securely while complying with GDPR.

Though we will soon get into that, it is worth first explaining the basics of GDPR: its requirements, what constitutes personal and sensitive data, and the provisions surrounding data retention.

   GDPR: What information needs to be secured?


To ensure compliance with GDPR, any information relating to an identifiable person needs to be secured appropriately.

  What is personal data under the GDPR?


The definition of personal data under GDPR may be broader than you expect.  It is important to understand that the regulation does not look at data in a vacuum: any data relating to an individual that could be collated with other information to identify them constitutes personal information.  There are some prominent examples:

  • a person’s name and/or surname
  • somebody’s home address
  • a personal phone number
  • a passport or ID number

And some less obvious ones:

  • an email address that contains the user’s name and surname (i.e. smith@gmail.com)
  • a browser cookie ID
  • an IP address
  • the advertising ID of a mobile device
  • location data from a phone or GPS device
  • the presence of a particular substance in someone’s blood
  • opinions or assessments about a person
  • economic or social behavior of a person

In other words, when the EU says “any, ” it means any.  You must make your own assessment in this regard, as no list can cover every scenario.

  What is sensitive personal data under GDPR?


Certain types of personal data are considered sensitive and therefore should not be processed unless they meet certain conditions.  Such data is usually considered potentially damaging to a person’s safety or freedom of expression.  In this case, the EU does provide a specific list:

  • personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs
  • trade-union membership
  • genetic data or biometric data processed solely to identify a human being
  • other health-related data
  • data concerning a person’s sex life or sexual orientation
  • details surrounding convictions and criminal offenses

  GDPR and anonymized data


If personal data has been anonymized, it is naturally not subject to GPDR.  However, it is common for organizations to misunderstand what exactly constitutes anonymized data.

The GDPR definition of anonymized data follows the EU’s data protection laws.  They state that anonymous data is “information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable.”

The critical thing to note is that a subject is still considered identifiable if the processed data can be combined with additional information about them to identify them.  This is referred to as “pseudonymization”.  Encryption, too, is considered pseudonymization, since secret keys are “additional information” that would enable identification.

  What are the GDPR data security requirements?


GDPR personal data must be processed in a way that ensures appropriate security.  This includes protection against unauthorized and unlawful processing/access but also against accidental leakage or loss.  GPDR does not list specific technologies, stating only that “appropriate technical or organizational measures” must be used to ensure integrity and confidentiality.  You must be able to demonstrate compliance with this.

Data retention and GDPR

GDPR states that personal data must be stored for the shortest time possible.  This length of this period depends on why an organization needs the data and any legal obligations it has regarding retention.  Retention periods must be proportionable and appropriate, and organizations should set time limits to erase or review stored data.

GDPR: what are the considerations for deletion of data?

GDPR states that you must also have systems to ensure that outdated or inaccurate data is erased or rectified without delay.  Additionally, companies are obligated to delete personal data on a user should they request it.

  Enforcing GDPR security policies with DRM


The Locklizard document security approach, working with the Adobe PDF format, is to encrypt PDF files and then apply DRM controls.  We use PDF because it was designed to maintain the form and format of the original document.  The beauty of PDF is that you can easily convert any document to it without losing its original vision.

Encrypting documents and applying DRM makes personal data unprocessable.  So you don’t need to restrict document forwarding or worry about users copying protected documents.  Stealing a DRM encrypted PDF achieves nothing because it cannot be read without a license from the supplier. The user must have either our secure viewer installed on a licensed machine, or a valid login to a web portal holding and serving the encrypted document to authorized users.  With Locklizard installed Viewers, there are no passwords for users to enter or share with others, and documents are locked to devices.  You can even control the locations from which users can open protected documents (i.e., an office location so that sensitive documents cannot be taken out of the building) or, more generally, restrict document access to a country.

Protecting documents with DRM is easy.  Let’s go through the steps in the process to protect documents and for users to receive protected documents from you.

  1. Save your documents containing personal information to the PDF format using your software of choice.  For example, here is how to convert Word to PDF.
  2. In Windows File Explorer, select your PDF files that need protecting, right-click on them, and choose the ‘Make Secure PDF’ option from the menu.
  3. From the Safeguard Writer GUI, select the controls you want to apply (i.e., expire after a number of days use, watermark document with user details, stop printing, stop screen grabbing, log document views, etc.).  Once you have selected your controls, press the Publish button.  You will now have protected documents (encrypted and with DRM protection) that mirror the unprotected PDF files.
  4. Decide how to distribute your protected documents.  Because the documents are encrypted, they may be stored anywhere without the risk of the data being extracted or processed by anyone without a license.  You could make them freely available from your website, distribute them by email, USB, etc.
  5. Log in to the web-based Safeguard Administration system and add the users you want to be able to access the secured document(s).  This is a simple action of adding their name, company (optional), and email address and then selecting which documents (or groups of documents) you want them to be able to access.
  6. The Admin system automatically emails recipients with a link to download the Viewer and their license.  Once users have installed the Viewer and clicked on their license file, they can open any documents you have authorized them to view.  The license registration is a one-time use (unless you authorize more), so if users forward their registration email to others, they won’t be able to use it.

   Automating GDPR compliance by securing documents


A simple way to enforce your company document protection policies and ensure you comply with GDPR is to use Safeguard Command Line to automate the GDPR document security policies you want to apply.  This is as simple as:

  1. Creating batch files with the DRM controls you want to apply to specific document types.
  2. Creating folders on your disk where users store different types of files according to their confidentiality status.
  3. Using Windows Scheduler to automate when batch files are run and your documents protected.

Safeguard Command Line is also helpful if you have many documents to protect, since they can be processed automatically in one go.

   GDPR Data Protection & control of sensitive data

  GDPR and data sharing

There are certain GDPR file sharing requirements, particularly regarding sharing data with third parties.  Primarily, data must be shared in line with your terms of service and on a lawful basis (i.e., with consent).  Sharing should be reasonable, proportionate, and transparent.  The organization is of course the one responsible for ensuring that employees do not share or leak personal data.

Some companies say that using a browser rather than installing software allows authorized users to view protected documents more easily.  This may be true, but it also makes it easier for unauthorized users to compromise them.  If you rely on a browser-based system for document protection and GDPR compliance then be aware that:

  1. Users can share login details with others (and therefore access to all your secure documents).
  2. Browser security is inherently weak with only JavaScript and obfuscation being the only tools to stop users removing the document protection.
  3. Browser-based technology cannot stop third-party screen grabber tools or printing to PDF format (if printing has been allowed).
  4. Users may end up using an unauthorized browser that does not obey the DRM controls that have been applied (like preventing copy and pasting of text).

No doubt the hosting infrastructure of these companies is secure, but if users can share login details or you’re using web-based document controls, anyone can access your protected documents.

  So why are my documents more secure with Locklizard?

Locklizard does not force you to upload your unprotected documents to our servers.  This is because protecting documents on a server presents issues if the encryption process fails or temporary files are created and not deleted.  Instead, you protect documents locally on your computer and maintain complete control over them.  Your protected documents can be distributed just like any other file; only authorized recipients can view them, no matter who they are forwarded to.

Your documents are encrypted with AES encryption both in transit and at rest.  All user information held on our administration systems (either hosted by you or by us) is encrypted to ensure GDPR compliance if the database were ever breached.

  The best way to achieve GDPR compliant file sharing for PDFs


GDPR states that you must ensure that personal and sensitive data are protected from theft and that data must not be held for longer than is necessary for the declared purpose.  Though not an explicit requirement of GDPR, demonstrating the prevention of further data processing by denying document use shows that you take data security seriously.  Additionally, preventing ready transfer to unregulated systems for unauthorized processing is a very good way to indicate that you exceed minimum requirements.

Locklizard document protection ensures you can demonstrate that you have complied with and exceeded GDPR compliance and data protection policies.  You can:

  • protect documents with expiry dates so they can no longer be accessed after the pre-set end date is reached
  • protect documents with limited views so that sensitive data can only be viewed a set number of times before it expires
  • protect documents with limited prints so that multiple high-quality printouts cannot be made to redistribute data
  • revoke documents at any time in the event of loss or change to authority (a mandatory deletion, for instance)
  • enforce document use in specific locations, preventing use in areas that are not considered to have appropriate security
  • log document use so you can be certain who has viewed and/or printed sensitive data
  • ensure that only authorized parties can access the documents

To secure your users’ personal data and achieve GDPR-compliant file sharing, take a 15-day free trial of our PDF DRM software.

Tags: data retention, document drm, document encryption, document protection, document security, drm encryption, encrypting documents, gdpr, gdpr and data security, gdpr compliance, gdpr compliant file sharing, gdpr data protection, protect documents, protect sensitive data, protect sensitive personal data, protecting documents, protecting sensitive information, sending documents securely
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Why DRM is is better than access controls for document security Link to: Why DRM is is better than access controls for document security Why DRM is is better than access controls for document securityLink to: How to send PDFs securely by email with DRM security Link to: How to send PDFs securely by email with DRM security How to send PDFs securely by email with DRM security
Scroll to top Scroll to top Scroll to top