GDPR in practice â what marketers need to know before sharing data with service providers
14 Feb 2017
The GDPR puts any customer data shared with your service providers under the spotlight.
Training, good data practices and technology can reduce risk when transferring and sharing data; but the most secure approach is to minimise the data being shared and should there be a breach, to have made that data as low risk as possible.
Data security belongs to marketers as much as technology teams
The data security obligations for marketers are changing. This guide isn’t about encrypted data, firewalls and network security. Instead, this guide is for you, explaining how the way you work can either help protect your customer data, or put that data at risk.
Digital marketers increasingly rely on cloud services, service providers and third-party social, enhancement and validation plug-ins. The GDPR reflects this trend and expands your data security obligations to make you responsible for verifying that the software or services you choose to use meet these new information security standards.
So, if you share data with any other company, link or integrate with another organisation, upload data or use online service or in any other way give another organisation access to your data you need to be able to show that you have checked that they are trustworthy and can look after your data.
- Cloud data storage
- Online CRM
- Internet-based services, such as analytics, reporting, email or SMS
- A technology partner who has either has direct access to your data; or where you transfer the data to them
- Data correction, validation or enhancement service
- Social media plug-ins
This guide explains the type of risks which need to be considered when you share data. It’s certainly not exhaustive because how you use data are unique to you. But if you’ve not considered this before, this is a good place to start.
The reality of data breaches
When you think about data protection you may conjure an image of a hacker typing away in a darkened room trying to gain access to your database. If you run an image search for the word “hacker” you’ll see the conventional imagery which accompanies data protection and information security. The reality is a little different. Not every data breach is a sophisticated attack bypassing your expensive information security systems. In fact human error, poor working practices and opportunism are the main causes of data breaches.
Current UK data security incident trends are shown here by the ICO: Data Security Incident TrendsThe annual Baker Hostetler Data Security Incident Response Report shows a similar picture in the US.
When sharing data, where and when is your data at risk?
When you are using and sharing data the areas of vulnerability are:
“In transit” (being transferred between systems or organisations)
Concepts to understand:
- Limit data transfers to what is necessary
- When you transfer data, use a secure transfer mechanism (SFTP, FTPS, HTTPS)
“At rest” (when stored)
Concepts to understand:
- Store data in a secure way.
- You will have a database or CRM system, so avoiding keeping files on shared networks or personal devices
- Avoid having multiple copies of data to look after and protect.
- Only store data which is necessary. For example, payment and address information may not be necessary after a purchase has been made.
- Share only the data which is necessary. You may need the full contact details of a customer, but your service provider may only need a location code.
- Delete data when no longer needed.
When being displayed on a screen or printout
Concepts to understand:
- Keep the information available and on display to a minimum, restricted to access requirements
- Because opportunism is also a likely cause of a data breach, avoid putting anything sensitive on display in an email or in an app which could be seen if a laptop or phone was left unlocked. Printed-out material are often the cause of a breach when not destroyed properly, so keep printable information to a minimum.
- Audit access to applications
- Disconnect or log out when applications, devices or connections are not in use
Your GDPR obligations when sharing data
The GDPR backs up these risks with new statutory obligation to both ensure and demonstrate that data security is appropriate, not just in your systems, but when being processed or transmitted.
In practice you have to be able to show that:
- You have assessed or audited your software, service providers and partners, and can show that you only share data with software and organisations which meet the new information security standards; and
- You only share the minimum data which is necessary for that service or process
Sensible substitutions when sharing data
Certain data types are more useful for hackers and those organisations which collect data for fraud and phishing attacks.
You can often lower the risk of your data, showing that you are protecting data, by substituting risky data with something less risky, but still useful to you. Here are some examples which can help you meet your security and “minimum data” requirements when sharing data.
Ideas for substituting risky data
Data type |
Risk rating |
Examples |
What is the risk |
Ways to minimise the risk |
If this data must be used as part of your email or SMS transmissions |
Financial and purchase information |
High |
Account balances, payments and purchase information |
Embarrassment and potential sensitivity should this information be disclosed to the wrong person |
Don’t transfer this information outside of your own systems
Use secure websites and mobile apps to display this data to customers rather than using SMS or email |
Determine the minimum necessary for that purpose.
Use a secure transfer mechanism (SFTP, FTPS, HTTPS)
|
Financial account details |
High |
Bank account, sort code, debit and credit card numbers |
Theft |
Remove this data from your own systems when no longer needed
Don’t transfer this information outside of your own systems |
Obscure part of the account or card numbers, showing enough to identify the account or card, showing you are a genuine sender, but keeping account and card information private.
|
Login details |
High |
IDs, usernames, account numbers |
Identity theft and used to gain access to accounts. |
Don’t transfer this information outside of your own systems
Ask yourself if these really need to be in the email or SMS
If you do need to use these login details in Communicator, can they be partially obscured? |
|
Passwords |
High |
|
Theft, identity theft and used to gain access to accounts. |
Store them encrypted in your own systems
Don’t transfer this information outside of your own systems |
|
For more information
At Communicator our aim is to be the most trusted email service provider. To fulfil our GDPR service provider obligations, our compliance and technology teams spent most of 2016 becoming ISO 27001 accredited. Our guides come from the practical,real-life experience of our expert compliance team. To find out more you can read our guides on email marketing and GDPR compliance, here:
Please login to comment.
Comments