
Continuously improve upon the security program while continuing to grow the business.
Compyl works with the technology your organization works with.
Begin building a scalable security program.
Build and maintain a robust risk management process.
Manage vendor due diligence and risk assessments.
Mature your security program quickly.
Create and centralize policies, standards, and procedures.
Securely store and monitor all contracts.
Streamline security with automated efficiencies.
Establish and monitor permissions for all users.
Catalog, access, and track all IT Assets.
Demonstrate the ability to effectively safeguard customer data's security, integrity, confidentiality, and privacy.
Prove the strength of your Information Security Management System to prospects and customers worldwide.
Organizations handling health information need to have measures in place & follow them.
Improve the security posture of information systems used within the federal government.
Guidelines to encourage best practices among financial institutions in Singapore.
This global security and privacy framework provides comprehensive information, risk, and regulatory protection.
We proactively monitor for the latest frameworks to ensure our customers environments remain secure at all times. Contact us and learn about the additional frameworks Compyl supports.
Let Us Guide You Through Your InfoSec & Compliance Journey.
Learn how to use the Compyl Platform.
Watch all Security Session Episodes
Real-world stories on how we help our customers.
Our mission and purpose are unique, just like the solution we created.
We are very serious about our security. See the measures we take.
Join our diverse team of intelligent, respectful, and passionate individuals.
We are ready to secure your organization today!
In 2019, First American Financial Corp experienced a massive data leak with the social security numbers, names, and account numbers of over 800,000 customers. The worst part? This sensitive data had been sitting unprotected and freely available for more than a decade. Such an embarrassing mistake wouldn’t have happened under GDPR data classification rules.
The purpose of GDPR data classification categories is to help your organization identify what types of data you process, how long you store it, how you use it, and who can access it. The classification process involves separating records into categories, usually by data security level or purpose. To be GDPR compliant, you need to create a detailed classification schema and ensure the appropriate cybersecurity controls for sensitive data.
It’s easy to underestimate just how much data your company handles regularly:
GDPR isn’t the only compliance framework with rules on data classification. HIPAA regulations dictate how healthcare companies handle protected health information, PCI DSS requires retailers to safeguard cardholder data, and NIST 800-171 has strict requirements for controlled unclassified information.
Large organizations generally use four categories to classify data:
Classifying data by sensitivity helps you create stronger cybersecurity, reducing the risk of employees accidentally storing confidential information in poorly protected areas.
While GDPR does not mandate a specific classification policy, it requires organizations to categorize and protect data appropriately based on sensitivity and risk. There are several categories of data.
Under GDPR, personal data refers to all information that can directly or indirectly identify an individual. Direct personal data includes names, ID numbers, telephones, credit cards, and anything else that ties to a specific person in the EU.
Even someone’s Amazon or Netflix account number would be personal data for those companies and any advertising partners. With a few clicks, the individual’s real name and payment information are available.
Your business must take extra precautions with especially sensitive types of data. In many cases, the GDPR explicitly prohibits processing special personal data categories:
Health data is also considered a special data category under GDPR, but processing it is allowed for health insurers and healthcare professionals. These companies still need to get appropriate consent from patients.
GDPR doesn’t apply to truly anonymous data. Counting the total website visitors to your site or the number of shoppers in your store doesn’t require you to get consent for processing.
Some organizations (researchers, especially) take the time to completely anonymize data. They get rid of personal identifiers, ending up only with groups of individuals (e.g., “25% of the men surveyed chose product B”).
Some businesses replace PII with pseudonyms for privacy reasons. For example, instead of storing a customer’s name as “Richard White,” the company could use “Client34120094.” Encryption is another type of pseudonymization.
This process is good for cybersecurity, but it doesn’t usually eliminate GDPR requirements. Why? If your company still has the “key” to unlock the real data, then encryption is only a protective layer. The real personal data is still there underneath.
Data classification plays an integral role in GDPR compliance.
Before you can properly protect PII, you need to know what data you have and where it’s located. This requires a thorough assessment of all company records. Automation tools such as Compyl are a huge help in streamlining the process.
To accurately categorize personal data by sensitivity, you have to carry out a privacy impact assessment. This internal risk assessment analyzes which types of data would have the largest impact on data subjects and what information is most vulnerable to cyberattacks.
At this point, your organization is ready to classify its data. Create “buckets” for low-risk, medium-risk, and high-risk data. Any GDPR special data categories must always go in the high-risk data classification and receive additional cybersecurity protections.
Once you have your data sensitivity categories in place, organize the data into other “buckets” based on your processing and GDPR compliance needs. For example, sorting personal information by data subject makes it easier to comply quickly with obligatory deletion requests and information requests.
Data classification is an ongoing process. GDPR requires companies to maintain an accurate list of all data types, available to inspectors on request. Keep track of who, what, where, when, and why for all PII.
GDPR data classification requirements can seem overwhelming, especially for large organizations with millions of records. Automation platforms such as Compyl are practically essential for efficiently, accurately, and cost-effectively managing the process. Contact us to see why you can trust Compyl for data classification and GDPR compliance.