GDPR Compliance


Next Steps

What is GDPR?

GDPR, or the General Data Protection Regulation, is a privacy law established by the European Parliament to increase security for the PII of EU citizens. Its objective is to return control of personal data to individuals, and facilitate international business by creating a standard across the EU. The regulation came into full effect on May 25th, 2018.

Some notable impacts of the law include:

  • Mandatory appointment of Data Protection Officers for corporations that have personal data processing as core activities
  • Notification of a supervisory authority after a breach of personal data (typically not more than 72 hours after the breach was realized
  • Encouraged pseudonymization (rendering data anonymous or the subject unidentifiable) with personal data assets
  • Support for the right to erasure ("right to be forgotten") from data collections / searches

Of these, "the concept of personally identifiable information [PII] lies at the core of the GDPR," writes the International Association of Privacy Professionals (IAPP). From the GDPR, IAPP specifically refers to Recital 75, which instructs controllers to "implement appropriate safeguards to prevent the 'unauthorized reversal of pseudonymization.' To mitigate the risk, controllers should have in place appropriate technical (e.g., encryption, hashing, or tokenization) and organizational (e.g., agreements, policies, privacy by design) measures separating pseudonymous data from an identification key."

Proven Data Protection

With these new regulations, it is not only a good idea to protect PII, but it is required by law. The penalties for non-compliance are severe: up to €20,000,000 or 4% of the previous year's worldwide turnover, whichever is greater. Proactive compliance with the law will help protect the data, and proof of that compliance can provide a buffer against sanctions.

For the GDPR, as with other data privacy laws worldwide, it is important to have a powerful and extensible technology to protect PII. Proven PII discovery and anonymization software in the award-winning:

  • IRI Data Protector Suite, which includes three static data masking (SDM) products for structured and unstructured sources, and a DAM/DAP DB firewall with dynamic data masking


  • IRI Voracity data management and governance platform (which include those SDM products)

deliver the rule- and role-based data-centric audit and protection capabilities you need to: locate, classify, and deliver PII; mask (encrypt, pseudonymize, redact, etc.) the PII; remove the records of those wishing to be forgotten; and, prove your compliance with the GDPR.

IRI's PII discovery capabilities work across any database and legacy / document file format, and its masking capabilities work in structured, semi-structured, and unstructured sources. Affordable licensing, implementation, and support services are available from authorized IRI representatives throughout the EU and beyond.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.