SlideShare a Scribd company logo
How to keep printing,
scanning & copying
processes GDPR
compliant.
WHAT IS THE
GENERAL DATA
PROTECTION
REGULATION
(GDPR?)
The General Data Protection Regulation (GDPR) is set to replace
the Data Protection Act 1998 (DPA) and will come into effect from
the 25th May 2018.

It will regulate the processing and holding
of personal data.

While similar to it’s predecessor, GDPR has some key differences
in terms of personal data classification and scope, accountability
and compliance, breach notification procedures and penalties.
PERSONAL DATA
CLASSIFICATION
AND SCOPE 

The type of data protected
has vastly increased and
includes economic, cultural,
usernames, pseudonyms,
online footprint information,
etc. For example, under
GDPR, IP addresses are
classified as personal data.
ACCOUNTABILITY AND
COMPLIANCE

β€œThe new accountability principle in Article 5(2) requires you to
demonstrate that you comply with the principles and states
explicitly that this is your responsibility.”	
 Β 

[Information Commissioner’s Office]
BREACH NOTIFICATION
PROCEDURE
New breach notification procedures are required - and there’s a
72 hr time limit for reporting a breach.
β€œYou should ensure that you have an internal breach reporting
procedure in place. This will facilitate decision-making about
whether you need to notify the relevant supervisory authority or
the public. In light of the tight timescales for reporting a breach -
it is important to have robust breach detection, investigation and
internal reporting procedures in place.”
[Information Commissioner’s Office]
PENALTIES 
	
 Β 
The penalties being introduced with GDPR could be enough to
put some organisations out of business. 

With penalties amounting to as much as €20 million or 4% of
global annual turnover (whichever is greater), it’s worrying to
think that all of this can be the result of a poorly protected print/
scan/copy process.
In order to remain compliant with the GDPR, 
you need to implement measures to: 
Protect sensitive
information within
documents 
Prevent sensitive
data from being
shared
inadvertently
Have robust
processes to detect
possible breaches
quickly
Have documented
processes
WHY IS PRINT
SECURITY AN ISSUE?
(AND HOW WILL IT
AFFECT GDPR
COMPLIANCE?)
Initially, it may not be clear how document and
print security might affect GDPR compliance, but
when you consider that around 50% of printed
pages get thrown away [Xerox], what if your
employees are putting sensitive data straight in
the bin?

As much as sixty-two percent of data breaches are
down to human error [Computer Weekly]. Think of
the stories you hear when people leave sensitive
data on the train or in a cafe, it’s potentially easily
done when people aren’t aware of what personal
data is and such cases could be liable for
penalties under GDPR.
Organisations need to be able to protect sensitive
information within documents and prevent
sensitive data from being printed and shared
inadvertently. This will mean having robust
processes to detect possible breaches quickly
and documenting processes, whether that be
preventing a document from being printed or
alerting someone to what’s happened.
HOW TO SECURE
YOUR PRINTING
PROCESSES
BASIC SECURITY MEASURES
Here’s what we recommend you put in place as basic security measures. In most
cases, these features come a standard with Xenith’s MPS Plus:
Cisco Trustsec 
Helps identify, monitor and manage
devices from a central location. Real-
time views and control over all users
and devices on a network.
McAfee Secure Device Whitelisting
Allows only approved files to run on
MFDs, offering significantly more
protection than traditional black listing
tactics.
Encryption
Ensures that data travelling between
devices is kept secure.
Image Overwrite 
Electronically shreds copy, print, scan &
fax jobs stored on the MFD’s hard disc.
Follow-me printing 
Releasing documents only on
authentication with your door entry card/
mobile/PIN code at the device prevents
them getting into the wrong hands.
5 WAYS TO REDUCE DOCUMENT 
INFORMATION RISK 

1) A user-centric view of document output and input

2) Monitor who prints document information within the business

3) Monitor security across document lifecycles

4) Check the vulnerability of your endpoints

5) Keep document information safe
PRINT AND DOCUMENT
SECURITY EDUCATION

Educate everyone on the risks of printing sensitive data and
what counts as sensitive data, because at the end of the day, if
someone doesn’t know it’s wrong, why would they stop?

To educate employees, you might choose to send an internal
email or use an in-house communication channel. If you choose
this method, make sure you have some resources that make it
easily accessible and understandable, either an internal
document you can share or something official.
ADVANCED SECURITY
MEASURES
With advanced security measures, print/scan/copy streams can
be automatically scanned to detect and block/redact the release
of any sensitive data from the device.
It’s even possible to redact sensitive data from the document
being printed/copied/scanned without affecting the master
document, or without the need for any manual intervention.
On top of this, overlays like security stamps can be added as a
rule when sensitive data is detected in a document, or
alternative workflows can be triggered in order to send the
document to a secure location for review before permission is
granted to print it / copy it / release the scanned file.
HOW TO KEEP
PRINTING &
DOCUMENT
PROCESSES GDPR
COMPLIANT
With GDPR coming into effect on the 25th May 2018, it’s
important to start acting now in order to remain compliant and
have all procedures in place. 

Here’s what you need to do:

β€’β€― Protect sensitive information held in digital format, and prevent access to it by
unauthorised individuals.

β€’β€― Prevent sensitive data from being printed.

β€’β€― Detect possible breaches quickly and easily, in case they take place despite
best efforts.

β€’β€― Ensure documented processes are in place to illustrate compliance and
accountability.
ADDITIONS: XENITH’S ADVANCED
SECURITY PACKAGE

β€’β€― Automatically analyse print, scan and copy streams to detect sensitive data

β€’β€― Redact sensitive data before it’s printed

β€’β€― Block documents from being printed entirely
β€’β€― Trigger workflows to get approval for printing

β€’β€― Trigger workflows to add security stamps/barcodes

β€’β€― Alert the security officer of a scanned or printed document

All done behind the scenes, without affecting the master document.

Contact us about our advanced security package.
A Short Guide:
How to keep printing, scanning & copying
processes GDPR Compliant

Our new guide explains: 

β€’β€― How GDPR affects printing/copying/scanning

β€’β€― How to secure your printing/scanning/copying
processes

β€’β€― How to automatically analyse print, scan and
copy streams to detect sensitive data that can be
redacted or blocked or trigger security alerts
DOWNLOAD A COPY

More Related Content

PDF
Keep Calm and GDPR
PPTX
12 steps to gdpr compliance unleashed
PDF
3GRC approach to GDPR V 0.1 www.3grc.co.uk
PDF
PREPARING FOR THE GDPR
PPTX
GDPR practical info session for development
PPTX
GDPR Presentation slides
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PDF
[Presentation] GDPR - How to Ensure Compliance
Keep Calm and GDPR
12 steps to gdpr compliance unleashed
3GRC approach to GDPR V 0.1 www.3grc.co.uk
PREPARING FOR THE GDPR
GDPR practical info session for development
GDPR Presentation slides
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
[Presentation] GDPR - How to Ensure Compliance

What's hot (19)

PDF
How IBM Supports Clients around GDPR and Cybersecurity Legislation
PDF
GDPR and Irish SMEs May 2017
PPTX
GDPR – The Practicalities of a New Reality
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PPT
Data privacy & social media
PDF
Frukostseminarium om molntjΓ€nster
PDF
Information security and research data
PPTX
Online privacy & security
PPTX
GDPR security services - Areyou ready ?
PPTX
Privacy by design for peerlyst meetup
PDF
How to safe your company from having a security breach
PPSX
Best Practices For Information Security Management 2011
PDF
GDPR what you should know and how to minimize impact on your business
PPTX
Privacy issues and internet privacy
PPTX
GDPR Part 1: Quick Facts
PPTX
Security v. Privacy: the great debate
PDF
Are you preparing for GDPR?
PDF
Don't panic - cyber security for the faint hearted
Β 
PPTX
Data protection within development
How IBM Supports Clients around GDPR and Cybersecurity Legislation
GDPR and Irish SMEs May 2017
GDPR – The Practicalities of a New Reality
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Data privacy & social media
Frukostseminarium om molntjΓ€nster
Information security and research data
Online privacy & security
GDPR security services - Areyou ready ?
Privacy by design for peerlyst meetup
How to safe your company from having a security breach
Best Practices For Information Security Management 2011
GDPR what you should know and how to minimize impact on your business
Privacy issues and internet privacy
GDPR Part 1: Quick Facts
Security v. Privacy: the great debate
Are you preparing for GDPR?
Don't panic - cyber security for the faint hearted
Β 
Data protection within development
Ad

Similar to How to keep printing processes GDPR compliant (20)

PDF
5 key steps for SMBs for reaching GDPR Compliance
PDF
Bring your own device guidance
PDF
10 Key GDPR Requirements You Must Know to Protect Your Business
PPTX
CBC GDPR The Physics
PDF
1. introduction to cyber security
PDF
GDPR 9 Step SIEM Implementation Checklist
PPTX
GDPR How to get started?
PDF
Five strategies for gdpr compliance
PDF
A Survey On Data Leakage Detection
PDF
Protecting Data Privacy Beyond the Trusted System of Record
PPTX
My presentation- Ala about privacy and GDPR
PDF
How to implement gdpr in your document repository
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
Β 
PDF
Data security and privacy
PDF
Master Data in the Cloud: 5 Security Fundamentals
PPTX
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
PPTX
EMS GDPR Generic_Overview Deck_June 2017.pptx
PDF
A Cybersecurity Planning Guide for CFOs
Β 
PDF
08 pdf show-239
PDF
A Case For Information Protection Programs
5 key steps for SMBs for reaching GDPR Compliance
Bring your own device guidance
10 Key GDPR Requirements You Must Know to Protect Your Business
CBC GDPR The Physics
1. introduction to cyber security
GDPR 9 Step SIEM Implementation Checklist
GDPR How to get started?
Five strategies for gdpr compliance
A Survey On Data Leakage Detection
Protecting Data Privacy Beyond the Trusted System of Record
My presentation- Ala about privacy and GDPR
How to implement gdpr in your document repository
Keep Calm and Comply: 3 Keys to GDPR Success
Β 
Data security and privacy
Master Data in the Cloud: 5 Security Fundamentals
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
EMS GDPR Generic_Overview Deck_June 2017.pptx
A Cybersecurity Planning Guide for CFOs
Β 
08 pdf show-239
A Case For Information Protection Programs
Ad

More from Xenith Document Systems Ltd (6)

PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PDF
How BAE Systems Changed the World with Content Management
PDF
Xenith Document Systems - An Introduction
PDF
From KPIs to Outcomes - the Shift from Service Delivery to Strategy
PDF
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
PDF
Showcasing the business value of MPS - ROI is king
Digital Transformation and Security for the Modern Business Part 1 – Finance
How BAE Systems Changed the World with Content Management
Xenith Document Systems - An Introduction
From KPIs to Outcomes - the Shift from Service Delivery to Strategy
9 Reasons Why Outsourcing of Print Fleet Management Is so Popular
Showcasing the business value of MPS - ROI is king

Recently uploaded (20)

PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
innovation process that make everything different.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
Ethics in Information System - Management Information System
PPTX
artificial intelligence overview of it and more
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Introduction to the IoT system, how the IoT system works
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Internet___Basics___Styled_ presentation
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Introduction to cybersecurity and digital nettiquette
Module 1 - Cyber Law and Ethics 101.pptx
innovation process that make everything different.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Ethics in Information System - Management Information System
artificial intelligence overview of it and more
An introduction to the IFRS (ISSB) Stndards.pdf
Introduction to the IoT system, how the IoT system works
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Paper PDF World Game (s) Great Redesign.pdf
Sims 4 Historia para lo sims 4 para jugar
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Tenda Login Guide: Access Your Router in 5 Easy Steps
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Internet___Basics___Styled_ presentation
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
newyork.pptxirantrafgshenepalchinachinane
Introduction to cybersecurity and digital nettiquette

How to keep printing processes GDPR compliant

  • 1. How to keep printing, scanning & copying processes GDPR compliant.
  • 2. WHAT IS THE GENERAL DATA PROTECTION REGULATION (GDPR?)
  • 3. The General Data Protection Regulation (GDPR) is set to replace the Data Protection Act 1998 (DPA) and will come into effect from the 25th May 2018. It will regulate the processing and holding of personal data. While similar to it’s predecessor, GDPR has some key differences in terms of personal data classification and scope, accountability and compliance, breach notification procedures and penalties.
  • 4. PERSONAL DATA CLASSIFICATION AND SCOPE The type of data protected has vastly increased and includes economic, cultural, usernames, pseudonyms, online footprint information, etc. For example, under GDPR, IP addresses are classified as personal data.
  • 5. ACCOUNTABILITY AND COMPLIANCE β€œThe new accountability principle in Article 5(2) requires you to demonstrate that you comply with the principles and states explicitly that this is your responsibility.” Β  [Information Commissioner’s Office]
  • 6. BREACH NOTIFICATION PROCEDURE New breach notification procedures are required - and there’s a 72 hr time limit for reporting a breach. β€œYou should ensure that you have an internal breach reporting procedure in place. This will facilitate decision-making about whether you need to notify the relevant supervisory authority or the public. In light of the tight timescales for reporting a breach - it is important to have robust breach detection, investigation and internal reporting procedures in place.” [Information Commissioner’s Office]
  • 7. PENALTIES Β  The penalties being introduced with GDPR could be enough to put some organisations out of business. With penalties amounting to as much as €20 million or 4% of global annual turnover (whichever is greater), it’s worrying to think that all of this can be the result of a poorly protected print/ scan/copy process.
  • 8. In order to remain compliant with the GDPR, you need to implement measures to: Protect sensitive information within documents Prevent sensitive data from being shared inadvertently Have robust processes to detect possible breaches quickly Have documented processes
  • 9. WHY IS PRINT SECURITY AN ISSUE? (AND HOW WILL IT AFFECT GDPR COMPLIANCE?)
  • 10. Initially, it may not be clear how document and print security might affect GDPR compliance, but when you consider that around 50% of printed pages get thrown away [Xerox], what if your employees are putting sensitive data straight in the bin? As much as sixty-two percent of data breaches are down to human error [Computer Weekly]. Think of the stories you hear when people leave sensitive data on the train or in a cafe, it’s potentially easily done when people aren’t aware of what personal data is and such cases could be liable for penalties under GDPR.
  • 11. Organisations need to be able to protect sensitive information within documents and prevent sensitive data from being printed and shared inadvertently. This will mean having robust processes to detect possible breaches quickly and documenting processes, whether that be preventing a document from being printed or alerting someone to what’s happened.
  • 12. HOW TO SECURE YOUR PRINTING PROCESSES
  • 13. BASIC SECURITY MEASURES Here’s what we recommend you put in place as basic security measures. In most cases, these features come a standard with Xenith’s MPS Plus: Cisco Trustsec Helps identify, monitor and manage devices from a central location. Real- time views and control over all users and devices on a network. McAfee Secure Device Whitelisting Allows only approved files to run on MFDs, offering significantly more protection than traditional black listing tactics. Encryption Ensures that data travelling between devices is kept secure. Image Overwrite Electronically shreds copy, print, scan & fax jobs stored on the MFD’s hard disc. Follow-me printing Releasing documents only on authentication with your door entry card/ mobile/PIN code at the device prevents them getting into the wrong hands.
  • 14. 5 WAYS TO REDUCE DOCUMENT INFORMATION RISK 1) A user-centric view of document output and input 2) Monitor who prints document information within the business 3) Monitor security across document lifecycles 4) Check the vulnerability of your endpoints 5) Keep document information safe
  • 15. PRINT AND DOCUMENT SECURITY EDUCATION Educate everyone on the risks of printing sensitive data and what counts as sensitive data, because at the end of the day, if someone doesn’t know it’s wrong, why would they stop? To educate employees, you might choose to send an internal email or use an in-house communication channel. If you choose this method, make sure you have some resources that make it easily accessible and understandable, either an internal document you can share or something official.
  • 16. ADVANCED SECURITY MEASURES With advanced security measures, print/scan/copy streams can be automatically scanned to detect and block/redact the release of any sensitive data from the device. It’s even possible to redact sensitive data from the document being printed/copied/scanned without affecting the master document, or without the need for any manual intervention.
  • 17. On top of this, overlays like security stamps can be added as a rule when sensitive data is detected in a document, or alternative workflows can be triggered in order to send the document to a secure location for review before permission is granted to print it / copy it / release the scanned file.
  • 18. HOW TO KEEP PRINTING & DOCUMENT PROCESSES GDPR COMPLIANT
  • 19. With GDPR coming into effect on the 25th May 2018, it’s important to start acting now in order to remain compliant and have all procedures in place. Here’s what you need to do: β€’β€― Protect sensitive information held in digital format, and prevent access to it by unauthorised individuals. β€’β€― Prevent sensitive data from being printed. β€’β€― Detect possible breaches quickly and easily, in case they take place despite best efforts. β€’β€― Ensure documented processes are in place to illustrate compliance and accountability.
  • 20. ADDITIONS: XENITH’S ADVANCED SECURITY PACKAGE β€’β€― Automatically analyse print, scan and copy streams to detect sensitive data β€’β€― Redact sensitive data before it’s printed β€’β€― Block documents from being printed entirely β€’β€― Trigger workflows to get approval for printing β€’β€― Trigger workflows to add security stamps/barcodes β€’β€― Alert the security officer of a scanned or printed document All done behind the scenes, without affecting the master document. Contact us about our advanced security package.
  • 21. A Short Guide: How to keep printing, scanning & copying processes GDPR Compliant Our new guide explains: β€’β€― How GDPR affects printing/copying/scanning β€’β€― How to secure your printing/scanning/copying processes β€’β€― How to automatically analyse print, scan and copy streams to detect sensitive data that can be redacted or blocked or trigger security alerts DOWNLOAD A COPY