Solution » GDPR Compliance

The only single-source solution for EU GDPR compliance.

Problem

New regulations demand notification, access, data export and data purging

Under new EU regulations, organizations that suffer a data breach must notify data protection authorities and the owners of the breached records, plus face substantial financial and legal penalties. In addition, enterprises must offer customers the option to export their data or purge it entirely from a multitude of systems.

The five key features of the regulation are pushing enterprises to think differently about their data.

  • Breach notification: mandatory where a data breach is likely to result in a risk for the right and freedom of individuals.
  • Right to access: the enterprise controlling the data shall provide a copy of the personal data, free of charge in an electronic format.
  • Right to be forgotten: entitles the data subject to have the enterprise erase his/her personal data, cease dissemination and have third parties halt processing their data.
  • Data portability: which is the right to transmit the data to another enterprise to control it.
  • Privacy by design: calls for data protection at the outset of system design, from both a technical and organizational perspective.
Infographic of K2View Fabric real time data sources
Solution

Data organized around the entity protected by GDPR

The K2View Fabric solution is tailor-made to support GDPR. When the platform is deployed with customers defined as the micro-database business entity, it uniquely enables easy delivery of the rights of individual access, portability and deletion specified by the regulations.

“Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam.”

– Namefirst Lastname, VP of Something, Company Name

How it Works

Privacy by design

The organization of data in individually-encrypted micro-databases for each business entity ensures privacy in direct support of the GDPR regulations. Also, in-memory masking on retrieval, without staging to disk, means privacy protection scales across data centers.

Breach notification

If a breach does happen, access to the affected records is always available, stored in the business entity. Security is protected down to the row level using HEKS.

Right to access

Micro-databases organized by business entity, with full SQL capabilities and Rest API, allow for the electronic distribution of personal data.

Right to be forgotten

Purge capabilities include the ability to remove an entire business entity instance while keeping source systems fully operational. Data orchestration capabilities preserve business retention rules that override GDPR.

Data portability

K2View Fabric can move data on a single customer business entity from all data sources - as a single process - to another source with a single click.

Case Study

Headline here. Can be a few lines or up to five lines. Find one or two lines to italicize to highlight the word or words.
  • 30 day process reduced to 3 days
  • Automatic data masking and synchronization
  • No impact on production systems
  • Eliminated large amounts of manual work

White Paper

Headline here. Can be a few lines or up to five lines. Find one or two lines to italicize to highlight the word or words.

For many, their data is stuck in a myriad of technologies, making the task much more challenging. So, what can leaders do to truly become agile?