GDPR After the Deadline — Part 3 of 3 — How do IIM technologies fit into the GDPR puzzle?
John F. Mancini

By: John F. Mancini on August 8th, 2018

Print/Save as PDF

GDPR After the Deadline — Part 3 of 3 — How do IIM technologies fit into the GDPR puzzle?

gdpr  |  privacy  |  information security

GDPR After the Deadline

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers.

We just published a new market research report on GDPR. The purpose of this survey of 262 executives was to quantify – as close to the May 25th deadline as possible – the following three key issues related to GDPR:

  1. How do organizations view the emerging challenges tied to information privacy and security, and whom have they charged with this task?
  2. At the deadline, where are organizations in their GDPR journey and how much did they spend to get there? How do they assess their progress in meeting the core requirements of GDPR?
  3. What kinds of special pain points does unstructured information (i.e., content) raise in GDPR compliance efforts, and which core IIM technologies do organizations see as critical to their efforts?
This is the third of three posts covering each of these questions. For more information, make sure you download our new Industry Watch report — GDPR after the Deadline — Progress, But a Long Way to Go — it’s free until AUGUST 23.  After that date, it will go behind our member paywall.

For organizations at significant scale – most of those in our survey – GDPR poses challenges that seem not that difficult on the surface, but are actually quite complex.

As an example, consider the right of customers to be provided a machine-readable version of ALL of the information handled by a company. For relatively small companies, this is likely a process that could be handled manually if necessary; the volume of requests is likely to be small, as is the number of systems in which personal information is likely to be contained.

But at scale, consider the number of places that data and content about a fictional “Mary Smith” is likely to be found. Consider how disconnected most of these systems are – the challenges most organizations have with relatively simple case management provide a good example of the complications created by disparate and disconnected systems.

Now consider how many unique ways “Mary Smith” is likely to be identified in these systems. Sometimes “Mary Smith.” Sometimes by her maiden name, “Mary Jones.” Sometimes by her email address; in all likelihood multiple email addresses. Sometimes by her account number. Sometimes by a variation of her name like “M. Elizabeth Smith.” The potential complications associated with what seems a relatively simple task on the surface are mind-boggling.

Now consider how many of these kinds of requests an organization at significant scale is likely to get in the course of a year. There is some speculation that individuals with a grievance against a particular company might use social media to “flood” a company with requests – somewhat akin to a denial of service attack.

Lastly, as those in the content space know, there are well known challenges associated with finding and managing personal information within the vast troves of unstructured information that are much more complex than those on the structured data side of the house.

Key findings

  • 20-30% of organizations have little or only marginal confidence in their ability to meet core GDPR compliance requirements. Particularly problematic are requirements dealing with 1) proving compliance in an audit context; 2) generating clean and auditable records of processing activities; 3) meeting the 72-hour regulator breach notification requirement; and 4) cross border transfers.
  • 20-30% of organizations also have little or only marginal confidence in their ability to respond to the new customer rights created by the GDPR. Particularly problematic are: 1) the right to be forgotten; 2) the right to data portability and be provided a machine-reading file of all personal  information; and 3) the right to object to the processing of data.
  • Over 30% of organization have little or only marginal confidence that the personal information in their core content systems is under control. Shared drives, SharePoint repositories, and content lodged in third-party SaaS application are particularly challenging.
  • With regards to the right to be forgotten, only 40% of organizations have automated processes in place to delete personal information within these systems.
  • 39% of organizations have no idea how much it will cost to find all of the information they have about a particular individual (to meet the right to data portability). For those who DO know, 48% believe this seemingly simple right will cost more than €5,000 per request.
  • On average, companies expect 60.1 GDPR data requests in first 12 months, with average cost of €4,604 EACH. This means an average operating cost of over €276,700 simply to meet the core GDPR rights tied to identifying and accessing personal information.
  • 60% of organizations believe the GDPR core requirements relative to website content and processes are under control – which means 40% either believe they are not or have no idea. [Author’s note: Even the 60% is likely to prove an overly optimistic number once organizations experience the complexities that are involved.]
  • Organizations see the following IIM technologies as most important in their GDPR compliance efforts:
    • Electronic records management and digital preservation
    • Data recognition, extraction, and standardization
    • Business process management
    • Cloud content management
    • Artificial intelligence, content analytics, and semantics
    • Automated document classification and PII identification
GDPR After the Deadline

About John F. Mancini

John Mancini is the Chief Evangelist and Past President of AIIM. He is a well-known author and speaker on information management, digital transformation and intelligent automation. John is a frequent keynote speaker and author of more than 30 eBooks on a variety of topics. He can be found on Twitter, LinkedIn and Facebook as jmancini77.