The Effectiveness of Data Processors in Correlation To GDPR
The Effectiveness of Data Processors in Correlation To GDPR
CROSSING PATHS:
KYC VERIFICATION & GDPR
S hufti Pro
Introduction
Some years ago, a documentary titled Under the Dome was released to the public that showcased the
rapid decline in air quality and pollution across the world, east asia in particular. The central theme
around the documentary inspired realisation and awareness amongst people about the inherent
destructive outcomes on the environment.
GDPR possesses the same importance in magnitude and scale in terms of data and privacy laws across
the European Union. It ensures to protect and empower the EU citizens’ data privacy and the outlook
of organisations across the region, towards personal data.
However, most companies are unaware of the apparent financial and reputational repercussions that
the failure of GDPR implementation might cause for them.
When looked at from a financial, regulatory and reputational standpoint, companies stand at a delicate
position of exposing their compliance shortfalls.
This handbook is written to provide informative awareness and guidance to prospective customers
about the processor and their compliance fulfillment measures.
Concerning the regulatory environment around the world and the tightening financial security
solution. Companies need to be in position of command with appropriate questioning towards
processors and their claims of being GDPR compliant.
This e-book will facilitate companies to enquire their data processors about GDPR compliance.
1
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
What is GDPR?
Personal Information or
Personal Data
Who is it meant for?
The definition of ‘personal data’ is entirely
The GDPR legislation was formed to different to what people think, with
harmonize data privacy laws across Europe. respect to the word ‘Personal Information’
Empowering all EU citizens’ data privacy in the or PII, which is fairly commonly used in
process, GDPR is aimed at reshaping North America. PII includes narrowed
organisations' approach towards data privacy. down information, such as full name,
address, date of birth, social security
number and financial information such as
credit card numbers or bank accounts.
Basically the GDPR applies to all businesses According to the GDPR, ‘Personal Data’
and entities that are operating in the EU and covers a much wider range of information
all regions under its jurisdiction. In addition, that can include social media posts,
the GDPR also applies to entities operating photgraphs, preferences and even credit/
outside of EU jurisdictions. How, you’d ask? debit transaction histories. It is very crucial
Companies operating outside of the EU but to know the difference between the two,
still dealing in the personal information of where Personal Data can include PII, but
data subjects (EU Citizens) will be subject to PII in most cases cannot include Personal
all guidelines of the GDPR effectively; this Data.
includes data processors and controllers as
well.
2
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
Data processors also carry some crucial responsibilities. In particular, GDPR expresses that the
data processor:
S hufti Pro
To best achieve GDPR compliance and to establish a strong partnership, processors and
controllers must have a co-developed strategy for processing and handling the data of
their customers and users.
When speaking in reference to the GDPR, data processor and data controller hold their own unique
representation and responsibility, accordingly to which, each entity is held accountable.
S hufti Pro
In order for Controllers to implement trustworthy Processors, the right way forward is
to choose the ones who are ready with GDPR adherences, practically and to the fullest!
5
CROSSING PATHS: KYC VERIFICATION & GDPR
Data Transfer
The GDPR provides data access rights to data subjects. This ensures data security and improved data
protection measures while empowering the data subject to enact upon their rights.
Having the flexibility to customise data transfer is important in exercising GDPR requirements. A
solution that can adapt along the way, ensuring that during a data cycle, the relationship between the
data subject and service provider is not effected at the trust level.
Retention
Adhering to the GDPR, Shufti Pro holds only relevant PII data, images and
electronic copies of individuals having undergone verification through our
platform. All personal data is held on dedicated, self-hosted servers,
located in classified locations within the EEA Zone.
Erasure
All personal data is the property of the legal user. A user may request personal
data to be deleted upon request. Accepting responsibility and accountability,
we facilitate such queries promptly.
Request Back
At any given time, a user may request their data from the processor. Shufti
Pro will facilitate in providing back the data in question, in appropriate and
standard formats to the user, in a clustered collection.
6
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
Data Security
Service providers or data processors need to ensure data security through adequate measures to
minimize the likelihood of data breaches, whether pre-emptive or post. Data breaches and protection
of data itself come under the wider umbrella of the data lifecycle.
Additionally, GDPR calls for secure auditory practices to be carried out, to ensure standardized
operations and encryption practices during data breaches. New techniques are preferred for GDPR
compliance.
Service providers or data processors need to ensure that data subjects are fully provisioned to
exercise their rights and are well aware of them. All documentation and support materials need to be
properly maintained in a transparent manner for data subjects.
The GDPR provisions for data subjects, mentioned through articles 12-23 of the ‘Rights of the Data
Subject’, states exclusive privileges granted to data subjects across a range of accountabilities.
Right to be Informed
Data subjects are provisioned as per GDPR to be duly notified by the processor with
appropriate documentation regarding information pertaining to all processes
and activities. Shufti Pro ensures to provide transparency to the Controller and
end-user, by providing easy-to-understand documentation and procedure
notifications beforehand.
7
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
Right to Access
End-user has the right to access data, when they seek in requirement of so. Shufti
Pro shall provide the user with data and information, where it deems is a legitimate
requirement of what the user has requested for.
Right to Erasure
According to the GDPR, users can request to have their data erased. Shufti Pro
respects the rights of data subjects and the directives that GDPR enforces. Upon
request, the concerned data of the subject individual is erased from our systems
and all backup holdings entirely.
Right to Object
The data subject possesses the rights to object, on grounds relating to their
situation in particular. This may include profiling or contacting for purposes of
marketing. Shufti Pro does not use any collected information for the purpose of
marketing as it would violate the purpose and intent for rightful information
collection, which is for KYC purposes, as defined.
8
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
Though IDV solutions are automated and the results can be constituted as an ‘automated decision’. The
approval of such processes and activities, should be sought prior to taking consent from the end-user, as
stated in article 22, clause 2 part “based on the data subject’s explicit consent.”
Having a human element to an IDV solution is more permissible and acceptable for data subject adherence
and cooperation towards the verification process. Since the GDPR gives data subjects the rights to not be
subject to decisions solely on automated decisions. Human intervention is somewhat of a mandatory
pursuance for service providers to comply to.
9
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
Making An Impact
Shufti Pro is one of the youngest verification service providers that has emerged as an industry
player in a relatively short span of time. During this period, not only has Shufti Pro acquired GDPR
compliance, but PCI DSS as well. Shufti Pro reflects the effectiveness of its services, through its
policies, internal mechanisms and procedures. The way industry recognition reflects the completion
of its adherence to GDPR specific guidelines and measures, is a testament to controllers and
end-users of our service capability.
End-to-end data encryption during journey; military grade encryption at server storage (idle)
Annual and randomised security audits, penetration tests, back-end vulnerability testing
Security
PAN masking at all times
Immediate notification to controller on data breaches
Minimised time period for data storage according to industry requirement only
Data
As an IDV provider, staying ahead of the curve by keeping client data safe is a fundamental
requirement in today’s competitive industry. This is of interest to controllers, in order to assess
data processors based on their effectiveness and reliability. The global regulatory environment
emphasises evidentiary proof, especially in a high-risk segment of Identity Verification &
Management. Proof of Verification happens to be a service offering rare to come by for data
processors to provide.
We, at Shufti Pro, offer proof of verification as a way to securely record the entire KYC process of a
particular user as a continuous video stream. Additionally, random screenshots are captured at key
times during the KYC process from the beginning till the end.
Proof of verification facilitates legal investigation and criminal proceeding by providing real
evidentiary proof to authorities in cases where evidence of value are required.
10
CROSSING PATHS: KYC VERIFICATION & GDPR
S hufti Pro
Conclusion
A Relationship of Great Importance:
For companies, if you deal in the recording of personal information, which includes PII data or
identity information from data subjects, they are subject to guidelines and directives set by the
GDPR. The GDPR clearly outlines the strict enforcement on data controllers and the subsequent
responsibilities that they can be held accountable for. However, the GDPR also outlines specific
areas of responsibility that befall the processors, if found in breach of the GDPR.
GDPR is no longer under the dome; it is for us all to realise that GDPR is here to stay. Both,
controller and processor play a crucial role in the effective functioning of a solution and the eventual
reaching of goals in data protection and privacy. As our systems become smarter, the greater goal is
to integrate real identities with digital identifies and bridge the gap between them, through a
dedicated online verification service provider as a processor.
Holding such an important position, it should be understood that IDV companies be properly and
thoroughly assessed. Ensure that the service complies to the GDPR fully and no such deficiency at
the processors’ end create legal hindrances for you.
We anticipate this e-book has brought insight to you about the GDPR in general, Shufti Pro’s stance,
and the know-how required to assess your IDV vendors with better knowledge pertaining to data
security and protection.