SlideShare a Scribd company logo
What is your solution for GDPR’s Indirect Identifiers? Many aren’t sure what they are and will
probably be unsuccessful when attempting to become GDPR compliant. Allow me to explain.
As a software development manager, I must confess that the Discovery & Remediation of Indirect
Identifiers was the most complex project I have managed in my 33 years in the industry.
First, let me explain what an Indirect Identifier is. According to the “Privacy Technical Assistance Center
of the U.S. Department of Education, it means “Indirect identifiers include information that can be
combined with other information to identify specific individuals, including, for example, a
combination of gender, birth date, geographic indicator and other descriptors.”
To accurately find Indirect Identifiers you must know all the metadata of all your enterprise data,
including structured and unstructured data, and data contained in PDFs, Office Documents and other
sources of data assets.
When Indirect Identifiers are scattered across multiple files containing data for many individuals it is first
necessary to find the records associated with each unique individual. To accomplish this, it is necessary
to join the records by Direct identifiers successfully before you can decide if Indirect Identifiers exist
across those files, and they positively identify individuals. After all, files may contain gender, date of
birth, and geographic indicator but never all three for a specific individual. If no individual has all three
of these fields present in your data, then you are GDPR compliant for this Indirect Identifier set of fields.
To join records for individuals you first need a field to be present in those files that will uniquely identify
individuals; these fields are called Direct Identifiers, let’s see their definition from the same source as
above.
What is a Direct Identifier? “Direct identifiers include information that relates specifically to an
individual such as the individual’s residence, including for example, name, address, Social Security
Number or other identifying number or code, telephone number, e-mail address, or biometric
record.”
Having a centralized repository to house all your metadata is the next requirement to create a
reasonably efficient Indirect Identifier discovery process. Once all the pieces are present in one location,
joining data from multiple files is not as daunting. It is also important that your central repository be
able to accept data from many sources regardless of its structure or format. The repository must also be
scalable, affordable and able to deliver high levels of processing power that allows files to be joined by
Direct Identifiers or other Keys such as national health ID, social security, Credit Card, address, email etc.
The joining process can then occur that will accumulate data assets from all the files and their columns
to one another (yes, many permutations will occur). Once these relationships are found some human
intervention must occur to decide which of the Indirect Identifier(s) should be encrypted or removed to
break up the Indirect Identification group of fields.
The EU GDPR requirements are vague, but general opinion is that the GDPR still prohibits sets of fields
that identify a small group of individuals and not necessarily a specific individual. An example would be
Gender, Date of Birth and Postal Code, which is only 87 % accurate in identifying specific individuals.
So, unless your Company has nearly 100% of its data assets housed in a Big Data environment
somewhere, you probably have lots of work ahead of you. If your Company is like most, especially larger
companies, you still have mainframes, AS400’s, desktops, servers (from many manufacturers of many
different sizes running a multitude of RDBMS’s), Cloud applications, IoT and other forms of storage that
may fall under the EU GDPR umbrella. Just identifying all of this, is a major undertaking.
After all your data is in a file system that can store, manage and provide massive amounts of processing
power you are ready to get to work. Next is to write a multi-step series of programs that can take
advantage of the scalability of the file system, be able to read all the file types and formats, store this
information and make it sharable and collaborative, and then Discover Direct and Indirect Identifiers
while also providing for data remediation in the form of data encryption, removal, or sequestering /
quarantining of files. GDPR is not a once in a lifetime or once a year Requirement, it is an every day
responsibility. If you are hacked and can’t demonstrate ongoing processes for remediation of Direct and
Indirect Identifiers you may still be subject to substantial fines, risk of a major hack causing loss of
customer, reputation and unmanageable fines and legal fees.
An additional EU GDPR requirement is to provide customers with the ‘Right of Erasure’ also known as
the ‘Right to be Forgotten’. This means a company must discover and remediate all data related to an
individual that isn’t required for existing business activities with that individual. As an example; if you
are maintaining lease agreements with an individual you must keep certain identifiers to continue
maintaining that agreement, however you should make sure all that required data is encrypted and is
never shared with other business partners or entities. Any Identifiers that are not required for legitimate
business purposes must be removed. To provide an individual with the ‘Right of Erasure’ will certainly
require discovery and remediation of all Direct and Indirect Identifiers before achieving a true solution.
After reading these descriptions of GDPR requirements it may seem like an overwhelming task to reach
compliancy with EU GDPR. However, some software vendors realized long ago that software solutions
would be more than just problematic to develop ‘In-House’ and designed Software Applications
specifically conceived to meet GDPR mandates. Don’t settle for solutions that require 6 months or a year
to implement, there isn’t time. Look for a product that uses a common platform to assemble disparate
data stores; that may be the only way to discover Indirect Identifiers. Look for solution that don’t
require an army of data scientist to interpret results. Don’t break the bank to purchase a solution; there
are products with reasonable pricing structures that have quick implementation a short as a day and
start delivering day one and can give you a qualified accurate intelligent view in days.
Reach BigDataRevealed (a software application) built for GDPR to facilitate protecting your
customer’s valued & confidential data at privacyinfo@bigdatarevealed.com or (847) 440-4439.

More Related Content

PDF
GDPR BigDataRevealed Readiness Requirements and Evaluation
PDF
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
PDF
Data Sovereignty and the Cloud
PDF
The Sherpa Approach: Meeting the Demands of the Digital Age
DOCX
Top gdpr assessment tools
DOCX
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
PDF
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
PPTX
Theres No Crying In Baseball...Or In E Discovery 04.30.10
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
Data Sovereignty and the Cloud
The Sherpa Approach: Meeting the Demands of the Digital Age
Top gdpr assessment tools
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
Theres No Crying In Baseball...Or In E Discovery 04.30.10

What's hot (20)

PPT
Universal Search for Legal Enterprises
PDF
Beyond GDPR Compliance - Role of Internal Audit
PDF
Global Security Certification for Governments
PDF
Unstructured Data Fact Sheet
PDF
Accellion Infographic: The Effects of Mobile on the Enterprise
PDF
Governing the Chaos
PDF
Where in the world is your PII and other sensitive data? by @druva inc
PDF
Evaluating Legal Technology for Your Law Firm
PDF
Protecting Data Privacy Beyond the Trusted System of Record
PDF
Data foundation for analytics excellence
PPTX
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
PDF
DAMA Webinar: The Data Governance of Personal (PII) Data
PDF
Getting a clue: uncovering the truth about your data with mobile forensics
PDF
White Paper- Know Your Data
PDF
Legal Case Management Software 2021 - Legodesk
PPTX
Privacy Preserved Data Augmentation using Enterprise Data Fabric
PDF
BRG_TAP_IG_20150826_WEB
PPTX
Technology in Law Practice
PDF
Cloud Based Legal Practice Management Software 2021 - Legodesk
PPT
Metadata
Universal Search for Legal Enterprises
Beyond GDPR Compliance - Role of Internal Audit
Global Security Certification for Governments
Unstructured Data Fact Sheet
Accellion Infographic: The Effects of Mobile on the Enterprise
Governing the Chaos
Where in the world is your PII and other sensitive data? by @druva inc
Evaluating Legal Technology for Your Law Firm
Protecting Data Privacy Beyond the Trusted System of Record
Data foundation for analytics excellence
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
DAMA Webinar: The Data Governance of Personal (PII) Data
Getting a clue: uncovering the truth about your data with mobile forensics
White Paper- Know Your Data
Legal Case Management Software 2021 - Legodesk
Privacy Preserved Data Augmentation using Enterprise Data Fabric
BRG_TAP_IG_20150826_WEB
Technology in Law Practice
Cloud Based Legal Practice Management Software 2021 - Legodesk
Metadata
Ad

Similar to Are you prepared for eu gdpr indirect identifiers? what are indirect identifiers? (20)

PPTX
General Data Protection Regulation
PDF
GDPR and Analytics
PDF
The Essential Guide to GDPR
PDF
The Essential Guide to GDPR
PPTX
Gdpr presentation
PPTX
ZyLAB ACEDS Webinar- GDPR
DOCX
The General data protection regulation : Salient clauses
PPTX
General Data Protection Regulation (GDPR)
PDF
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
PDF
Gdpr presentation
PDF
General Data Protection Regulation - BDW Meetup, October 11th, 2017
PPTX
GDPR Practicalities - The Data Shed
PDF
GDPR A Practical Guide with Varonis
PPTX
GDPR Data Lifecycle
PDF
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
PDF
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
PDF
Complete Guide to General Data Protection Regulation (GDPR)
PDF
The Countdown to the GDPR Regulations
PPTX
Data Protection and Comnpliance with the GDPR Event 22 september 2016
PPTX
How MongoDB can accelerate a path to GDPR compliance
General Data Protection Regulation
GDPR and Analytics
The Essential Guide to GDPR
The Essential Guide to GDPR
Gdpr presentation
ZyLAB ACEDS Webinar- GDPR
The General data protection regulation : Salient clauses
General Data Protection Regulation (GDPR)
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Gdpr presentation
General Data Protection Regulation - BDW Meetup, October 11th, 2017
GDPR Practicalities - The Data Shed
GDPR A Practical Guide with Varonis
GDPR Data Lifecycle
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
Complete Guide to General Data Protection Regulation (GDPR)
The Countdown to the GDPR Regulations
Data Protection and Comnpliance with the GDPR Event 22 september 2016
How MongoDB can accelerate a path to GDPR compliance
Ad

More from Steven Meister (11)

PDF
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
PDF
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
PDF
Gdpr ccpa automated compliance - spark java application features and functi...
PDF
Gdpr, analytics, big data compliance beta
PDF
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
PDF
Privacy assurance initiative
PDF
I have listed 3 informative youtube videos on the eu gdpr
PDF
Gdpr questions for compliance difficulties
PDF
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
PDF
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
PPSX
Big datarevealed hadoop catalog
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr, analytics, big data compliance beta
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Privacy assurance initiative
I have listed 3 informative youtube videos on the eu gdpr
Gdpr questions for compliance difficulties
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
Big datarevealed hadoop catalog

Recently uploaded (20)

PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PDF
Launch Your Data Science Career in Kochi – 2025
PDF
Foundation of Data Science unit number two notes
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPTX
Computer network topology notes for revision
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
1_Introduction to advance data techniques.pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
Supervised vs unsupervised machine learning algorithms
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Launch Your Data Science Career in Kochi – 2025
Foundation of Data Science unit number two notes
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Acceptance and paychological effects of mandatory extra coach I classes.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
IBA_Chapter_11_Slides_Final_Accessible.pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
climate analysis of Dhaka ,Banglades.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
oil_refinery_comprehensive_20250804084928 (1).pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Computer network topology notes for revision
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
1_Introduction to advance data techniques.pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn

Are you prepared for eu gdpr indirect identifiers? what are indirect identifiers?

  • 1. What is your solution for GDPR’s Indirect Identifiers? Many aren’t sure what they are and will probably be unsuccessful when attempting to become GDPR compliant. Allow me to explain. As a software development manager, I must confess that the Discovery & Remediation of Indirect Identifiers was the most complex project I have managed in my 33 years in the industry. First, let me explain what an Indirect Identifier is. According to the “Privacy Technical Assistance Center of the U.S. Department of Education, it means “Indirect identifiers include information that can be combined with other information to identify specific individuals, including, for example, a combination of gender, birth date, geographic indicator and other descriptors.” To accurately find Indirect Identifiers you must know all the metadata of all your enterprise data, including structured and unstructured data, and data contained in PDFs, Office Documents and other sources of data assets. When Indirect Identifiers are scattered across multiple files containing data for many individuals it is first necessary to find the records associated with each unique individual. To accomplish this, it is necessary to join the records by Direct identifiers successfully before you can decide if Indirect Identifiers exist across those files, and they positively identify individuals. After all, files may contain gender, date of birth, and geographic indicator but never all three for a specific individual. If no individual has all three of these fields present in your data, then you are GDPR compliant for this Indirect Identifier set of fields. To join records for individuals you first need a field to be present in those files that will uniquely identify individuals; these fields are called Direct Identifiers, let’s see their definition from the same source as above. What is a Direct Identifier? “Direct identifiers include information that relates specifically to an individual such as the individual’s residence, including for example, name, address, Social Security Number or other identifying number or code, telephone number, e-mail address, or biometric record.” Having a centralized repository to house all your metadata is the next requirement to create a reasonably efficient Indirect Identifier discovery process. Once all the pieces are present in one location, joining data from multiple files is not as daunting. It is also important that your central repository be able to accept data from many sources regardless of its structure or format. The repository must also be scalable, affordable and able to deliver high levels of processing power that allows files to be joined by Direct Identifiers or other Keys such as national health ID, social security, Credit Card, address, email etc. The joining process can then occur that will accumulate data assets from all the files and their columns to one another (yes, many permutations will occur). Once these relationships are found some human intervention must occur to decide which of the Indirect Identifier(s) should be encrypted or removed to break up the Indirect Identification group of fields.
  • 2. The EU GDPR requirements are vague, but general opinion is that the GDPR still prohibits sets of fields that identify a small group of individuals and not necessarily a specific individual. An example would be Gender, Date of Birth and Postal Code, which is only 87 % accurate in identifying specific individuals. So, unless your Company has nearly 100% of its data assets housed in a Big Data environment somewhere, you probably have lots of work ahead of you. If your Company is like most, especially larger companies, you still have mainframes, AS400’s, desktops, servers (from many manufacturers of many different sizes running a multitude of RDBMS’s), Cloud applications, IoT and other forms of storage that may fall under the EU GDPR umbrella. Just identifying all of this, is a major undertaking. After all your data is in a file system that can store, manage and provide massive amounts of processing power you are ready to get to work. Next is to write a multi-step series of programs that can take advantage of the scalability of the file system, be able to read all the file types and formats, store this information and make it sharable and collaborative, and then Discover Direct and Indirect Identifiers while also providing for data remediation in the form of data encryption, removal, or sequestering / quarantining of files. GDPR is not a once in a lifetime or once a year Requirement, it is an every day responsibility. If you are hacked and can’t demonstrate ongoing processes for remediation of Direct and Indirect Identifiers you may still be subject to substantial fines, risk of a major hack causing loss of customer, reputation and unmanageable fines and legal fees. An additional EU GDPR requirement is to provide customers with the ‘Right of Erasure’ also known as the ‘Right to be Forgotten’. This means a company must discover and remediate all data related to an individual that isn’t required for existing business activities with that individual. As an example; if you are maintaining lease agreements with an individual you must keep certain identifiers to continue maintaining that agreement, however you should make sure all that required data is encrypted and is never shared with other business partners or entities. Any Identifiers that are not required for legitimate business purposes must be removed. To provide an individual with the ‘Right of Erasure’ will certainly require discovery and remediation of all Direct and Indirect Identifiers before achieving a true solution. After reading these descriptions of GDPR requirements it may seem like an overwhelming task to reach compliancy with EU GDPR. However, some software vendors realized long ago that software solutions would be more than just problematic to develop ‘In-House’ and designed Software Applications specifically conceived to meet GDPR mandates. Don’t settle for solutions that require 6 months or a year to implement, there isn’t time. Look for a product that uses a common platform to assemble disparate data stores; that may be the only way to discover Indirect Identifiers. Look for solution that don’t require an army of data scientist to interpret results. Don’t break the bank to purchase a solution; there are products with reasonable pricing structures that have quick implementation a short as a day and start delivering day one and can give you a qualified accurate intelligent view in days. Reach BigDataRevealed (a software application) built for GDPR to facilitate protecting your customer’s valued & confidential data at privacyinfo@bigdatarevealed.com or (847) 440-4439.