What is the GDPR?

The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) are regulations which are intended to strengthen and unify data protection for all individuals within the European Union.

It primarily relates to any information of a natural person or ‘Data Subject’, that can be used to directly or indirectly identify the person. It could be anything from a name, a photo, an email address, bank details, posts on social networking websites, medical information, to a computer IP address.

The GDPR comes into effect from the 25th May 2018 and will carry penalties; where organizations may be fined up to 4% of annual global turnover for breaching GDPR or €20 Million for serious infringements e.g. not having sufficient customer consent to process data or violating the core of Privacy by Design concepts.

The protection of all personal data within your company or organizations is of the utmost importance, this relates to your customers and your employees personal information. Any Data breaches of unencrypted data, must be notified to the Data Protection Authority within 72 hours and to the affected individuals without undue delay.

How the File Encryption & Management Software helps

Encryption couldn't be easier, all that is required is to simply save your files and documents through the ProtectorApp Encryption Program to encrypt, and you may then organise them in whatever filing system you wish to implement.

Our encryption program provides a file protection solution, that encrypts and secures data, file names, file categorisation, search engine encrypted file sharing, file retrieval, exporting encrypted files with password protection, file expiry handling, audit logs, auto logout features for added security and more.

It provides each organisation with an individualised encryption key, making each organisation a stand alone secure encryption file environment. Protectorate Solutions will never have access to an organisations encrypted documents, we only provide the means for you to encrypt your file organisation structure, your files or documents and save them to a storage location of your choice.

Our File Encryption and Management Software can enable a Data Controller to become their own Data Processor. This encryption program allows companies and organizations to choose where they would wish their data stored, it encrypts all files and file organizational structures to the highest encryption standards available. (AES 256) Encryption reduces risks associated with data processing as the encrypted data will not be accessible without the encryption key protocol, which is unique to each organizations version of the application.

This File Encryption and Management program also provides an Audit trail for file access and actions, full event logging is also an additional option. This program gives your complete control of your data, you can administer to user groups, choose where to host your data and see all audit logs.

Protectorate Solutions will never see your data, the application will never communicate with us, it can be run on a completely offline system it does not require any internet connections to work.

This program, ProtectorApp, is an ideal tool to aid in compliance with the General Data Protection Regulations (GDPR). In the event of a data breaches such as a laptop is stolen or a server being hacked... The GDPR states authorities should be notified of any data breach within 72 hours. The individuals affected by the data breach should also be notified, unless the data is encrypted and the organization can prove there is no way for said individuals to be identified from the stolen data.

Protectorate Solutions Ltd., provides an encryption programming service that provides the highest standards of encryption, commercially available, through a user-friendly interface, which requires minimum training for its immediate use.

This encryption program assists businesses in compliance with a major portion of the GDPR, (encryption) and assists the designated Controllers and Processors to comply with their responsibilities and requirements.

It allows pseudonymisation and encryption of data - Art. 32.1(a)
It adds confidentiality and integrity to the processing systems - Art. 32.1(b)
It aids the assessment of the security level of the processing system - Art. 32.2
It provides an Audit log - Art. 32.4
It helps avoid serious heavy financial penalties - Art. 83
It reduces the need to inform customers of encrypted data breaches - Art. 34.3

It reduces the possibilities of any damage to the business reputation, possibilities of litigation, brand damage, loss of customers, loss of business, loss of time as a result of investigations surrounding breaches of non encrypted data, bad publicity, credit monitoring, audits and the attention of the Data protection Commissioner's office.