In the new digital age we face unprecedented times of wide opportunities. Internet is just about everywhere and can be connected to just about any device generating diverse forms of data circulation, exchange and accumulation.

One can easily pay the bills, share documents, make a purchase and handle multiple daily tasks without passing the front door of their homes. This is how modern technology makes our lives more convenient. Yet it comes at a price.

The price is our privacy. 

As personal data are shared online, the predators feed on security flaws. The companies get infiltrated, while identities, funds, intellectual property stolen. 

GDPR COMPLIANCE OBLIGATIONS

The General Data Protection Regulation (“GDPR”) was enacted to close the loopholes in data privacy protection an outdated Data Protection Directive could no longer tighten. The GDPR imposes obligations on companies from 28 countries of the EU and regulates the way they manipulate data on the EU territory.
Whether it’s storing, collecting or transferring data, GDPR requires that businesses exercise due diligence and comply with pre-determined data protection principles and conditions for data processing.   
As the GDPR directive proclaims, any information related to a person (name, photo, email address, bank details, location details, medical information, or even computer IP address, and updates on social networking websites) shall be reckoned as personal data and its secure processing must be warranted. 
Effective execution of personal data protection strategies is supported by corresponding GDPR principles enacting certain restrictions and requirements. The principles lay out responsibilities for companies to ensure: 
  1. The subject gave an explicit legal consent for collecting and processing personal data for no other purposes but the legitimate ones.
  2. The subject is privy to all processing activities with their personal data.
  3. Only necessary data required for specified and explicit purposes is collected.
  4. Data is accurate and updated.
  5. Data is properly destroyed or deleted when no longer needed.
  6. Data is protected against unauthorized or unlawful processing, loss, damage or destruction.

GDPR COMPLIANCE IMPLEMENTATION STEPS

With quite unlimited guidance that our experience of past projects provided, Agiliway had long as developed certain strategies and daily operations ensuring personal data protection of its customers. The strategies have worked well for some time already. Reviewing and updating Agiliway privacy policy in compliance with data protection legislation enforced by GDPR meant further reinforcing the existing strategies. To stay within the GDPR we took special care to revisit data processing operations in the following areas:

ACCESS CONTROL OF DATA PROCESSING PREMISES

To prevent unauthorized access to the premises where data is processed Agiliway has implemented specified protective measures: 

ACCESS CONTROL OF DATA PROCESSING SYSTEMS

To ensure that data processing systems are not tampered with by third parties Agiliway has introduced the following protective measures:

DATA ACCESS CONTROL

Only data that is entitled to accessing can be collected and processed by Agiliway team in accordance with access rights granted by the data subjects. Personal data cannot be read, stored, copied, modified, transferred, deleted or shared with third parties without proper authorization. It’s accomplished by:

SEPARATION CONTROL OF DATA PROCESSING FOR DIFFERENT PURPOSES

Personal data collected from different customers and for different purposes are processed separately, which is ensured by the following actions: 

DATA TRANSMISSION CONTROL

Under provisions in GDPR the controller or processor may only transmit personal data if appropriate safeguards have been offered. Agiliway warrants data protection during transborder data flows by:

DATA AVAILABILITY CONTROL

Agiliway implements specific measures to ensure personal data are protected from accidental destruction or loss. The measures in place include:
The moment GDPR came into effect, Agiliway reviewed its business processes to be compliant with personal data processing regulation and introduced necessary changes to stay vigilant against data breaches.
By implementing appropriate technical and organizational measures, educating employees, updating contracts and securing environment, we assure our customers no malicious intent goes unnoticed.