Asi implementing-gdpr-data-protection-controls

The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill cover

install
source · Clone the upstream repo
git clone https://github.com/plurigrid/asi
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/plurigrid/asi "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/asi/skills/implementing-gdpr-data-protection-controls" ~/.claude/skills/plurigrid-asi-implementing-gdpr-data-protection-controls && rm -rf "$T"
manifest: plugins/asi/skills/implementing-gdpr-data-protection-controls/SKILL.md
source content

Implementing GDPR Data Protection Controls

Overview

The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill covers implementing the technical and organizational measures required by GDPR, including data protection by design and by default, Data Protection Impact Assessments (DPIAs), data subject rights management, breach notification procedures, and cross-border data transfer mechanisms.

When to Use

  • When deploying or configuring implementing gdpr data protection controls capabilities in your environment
  • When establishing security controls aligned to compliance requirements
  • When building or improving security architecture for this domain
  • When conducting security assessments that require this implementation

Prerequisites

  • Understanding of EU data protection law and its territorial scope
  • Knowledge of personal data processing activities within the organization
  • Familiarity with data architecture, databases, and application systems
  • Understanding of data flows including cross-border transfers

Core Concepts

Key GDPR Articles for Technical Controls

ArticleRequirement
Art. 5Principles: lawfulness, purpose limitation, data minimization, accuracy, storage limitation, integrity and confidentiality, accountability
Art. 6Lawful basis for processing (consent, contract, legal obligation, vital interests, public task, legitimate interest)
Art. 25Data protection by design and by default
Art. 28Processor obligations and contractual requirements
Art. 30Records of processing activities (ROPA)
Art. 32Security of processing (technical and organizational measures)
Art. 33Breach notification to supervisory authority (72 hours)
Art. 34Communication of breach to data subjects
Art. 35Data Protection Impact Assessment (DPIA)
Art. 37-39Data Protection Officer (DPO) appointment and role
Art. 44-49Cross-border data transfers (adequacy, SCCs, BCRs)

Article 32 Security Measures

The regulation requires organizations to implement measures appropriate to the risk:

  • Pseudonymization and encryption of personal data
  • Confidentiality, integrity, availability, and resilience of processing systems
  • Ability to restore availability and access to personal data in a timely manner
  • Regular testing and evaluation of technical and organizational measures

Data Subject Rights (Articles 12-22)

RightArticleDescription
Right to be informed13-14Transparent information about processing
Right of access15Obtain copy of personal data
Right to rectification16Correct inaccurate data
Right to erasure17"Right to be forgotten"
Right to restrict processing18Limit processing of data
Right to data portability20Receive data in machine-readable format
Right to object21Object to processing (especially direct marketing)
Automated decision-making22Not be subject to solely automated decisions

Workflow

Phase 1: Data Mapping and Assessment (Weeks 1-6)

  1. Create comprehensive data inventory:
    • What personal data is collected
    • From whom (data subjects)
    • Why (purposes and lawful bases)
    • Where it's stored (systems, locations, countries)
    • Who has access (internal and external)
    • How long it's retained
    • What security measures protect it
  2. Document Records of Processing Activities (ROPA) per Article 30
  3. Identify lawful basis for each processing activity
  4. Map cross-border data transfers and transfer mechanisms
  5. Identify processing activities requiring DPIA

Phase 2: Gap Analysis and Risk Assessment (Weeks 7-10)

  1. Assess current state against GDPR requirements
  2. Perform DPIAs for high-risk processing activities
  3. Identify security gaps in Article 32 compliance
  4. Evaluate data retention compliance
  5. Assess data subject rights request handling capabilities

Phase 3: Technical Controls Implementation (Weeks 11-24)

  1. Encryption:
    • Data at rest: AES-256 for databases, file systems, backups
    • Data in transit: TLS 1.2+ for all personal data transfers
    • Key management: secure key storage and rotation procedures
  2. Pseudonymization:
    • Implement tokenization for sensitive identifiers
    • Separate pseudonymization keys from data stores
  3. Access Controls:
    • Role-based access control (RBAC) for personal data
    • Principle of least privilege
    • MFA for systems processing personal data
    • Regular access reviews
  4. Data Minimization:
    • Implement data collection limits at application layer
    • Default privacy settings (data protection by default)
    • Automated data retention enforcement
  5. Erasure and Portability:
    • Build data deletion workflows across all systems
    • Implement data export in machine-readable formats (JSON, CSV)
    • Cascade deletion to backups and archives
  6. Consent Management:
    • Implement granular consent collection mechanisms
    • Consent withdrawal functionality
    • Consent audit trail and versioning
  7. Breach Detection:
    • SIEM for personal data access monitoring
    • Data loss prevention (DLP) controls
    • Anomalous access detection

Phase 4: Organizational Controls (Weeks 11-24)

  1. Appoint Data Protection Officer (DPO) if required
  2. Develop data protection policies and procedures
  3. Create breach notification procedures (72-hour timeline)
  4. Establish data subject request (DSR) handling procedures
  5. Implement vendor management with Data Processing Agreements (DPAs)
  6. Deploy privacy awareness training for all staff
  7. Create data protection by design guidance for development teams

Phase 5: Documentation and Compliance Evidence (Weeks 25-30)

  1. Finalize ROPA documentation
  2. Document all DPIAs and outcomes
  3. Create data protection policies
  4. Document technical and organizational measures
  5. Establish privacy notice and consent records
  6. Create international transfer documentation (SCCs, TIAs)

Phase 6: Ongoing Compliance (Continuous)

  1. Regular DPIA reviews for new processing activities
  2. Annual data mapping refresh
  3. Periodic security measure testing (Art. 32 requirement)
  4. Data subject request tracking and SLA monitoring
  5. Breach response readiness testing
  6. Training refresh and awareness campaigns

Key Artifacts

  • Records of Processing Activities (ROPA)
  • Data Protection Impact Assessments (DPIAs)
  • Data Processing Agreements (DPAs)
  • Privacy Notices and Consent Records
  • Breach Response Procedures and Register
  • Data Subject Request Handling Procedures
  • International Data Transfer Mechanisms (SCCs, BCRs)
  • Technical and Organizational Measures Documentation

Common Pitfalls

  • Treating GDPR as only a legal/compliance exercise without technical implementation
  • Incomplete data mapping missing shadow IT or legacy systems
  • Failing to maintain consent audit trails
  • Not testing 72-hour breach notification capability
  • Ignoring cross-border transfer requirements for cloud services
  • Over-reliance on consent as lawful basis when legitimate interest applies

References