EU Regulation Active

General Data Protection Regulation

The EU's cornerstone data protection framework mandating encryption and security measures under Article 32, where PKI ensures data-in-transit protection and integrity.

Quick Facts

Status
In Force
Type
EU Regulation
Scope
Data Protection & Privacy
Effective
2018
Key Article
Art. 32

Overview

The General Data Protection Regulation (GDPR) is the European Union's landmark privacy and data protection law. Article 32 requires controllers and processors to implement "appropriate technical and organisational measures" to ensure a level of security appropriate to the risk — explicitly citing encryption as a key safeguard.

PKI underpins several critical GDPR compliance mechanisms: TLS certificates protect personal data in transit, S/MIME certificates secure email communications containing PII, and certificate-based authentication prevents unauthorized access to processing systems. Together, these measures form the backbone of a technically sound data protection strategy.

Beyond Art. 32, GDPR's requirements also intersect with PKI through Art. 25 (data protection by design and by default) and Art. 5(1)(f) (the integrity and confidentiality principle), both of which call for built-in cryptographic controls and robust key management practices.

Key Requirements

Encryption of Personal Data (Art. 32)

Controllers and processors must implement appropriate technical measures, including encryption of personal data, to ensure a level of security appropriate to the risk.

Data-in-Transit Protection

Personal data must be protected during transmission using TLS/SSL certificates, ensuring confidentiality and integrity across all communication channels.

Certificate-Based Authentication

Access to systems processing personal data should rely on strong authentication mechanisms, including client certificates and mutual TLS, to prevent unauthorized access.

Integrity Verification

Organizations must ensure the integrity of personal data through digital signatures and certificate-based verification, detecting any unauthorized modification.

Data Protection by Design (Art. 25)

Technical measures such as PKI-based encryption and certificate management must be integrated from the earliest stages of system design, not added as an afterthought.

Pseudonymisation & Key Management

GDPR encourages pseudonymisation as a risk-reduction measure, requiring robust cryptographic key management to protect the mapping between pseudonyms and identities.

Key Milestones

12
2012

Regulation proposed

The European Commission proposes a comprehensive reform of the 1995 Data Protection Directive to address the challenges of the digital age.

16
2016

GDPR adopted

The European Parliament and Council formally adopt Regulation (EU) 2016/679, with a two-year transition period before enforcement.

18
2018

Enforcement begins

GDPR becomes fully enforceable on May 25, 2018, with supervisory authorities empowered to issue fines up to 4% of global annual turnover.

21
2021

Schrems II impact

The CJEU Schrems II ruling intensifies focus on encryption and technical safeguards for international data transfers, reinforcing Art. 32 requirements.

24
2024 Enforcement

Continued enforcement, record fines

Supervisory authorities issue record-breaking fines, with enforcement increasingly focusing on technical security measures including encryption standards.

Impact on PKI & Certificates

GDPR's encryption and security requirements have a direct and significant impact on how organizations manage their PKI infrastructure. Here are the critical areas:

1

TLS Everywhere for Personal Data Flows

Every system transmitting personal data must be protected by TLS, requiring comprehensive certificate coverage and proactive renewal management across all endpoints.

2

S/MIME for Email Containing PII

Emails containing personal data should be encrypted and signed using S/MIME certificates, ensuring confidentiality and non-repudiation for sensitive communications.

3

Mutual TLS for Controller-Processor Communications

Data exchanges between controllers and processors require strong mutual authentication via client certificates, ensuring only authorized parties access personal data.

4

Key Management for Encryption at Rest

Pseudonymisation and encryption at rest require robust cryptographic key lifecycle management, including secure generation, storage, rotation, and destruction of encryption keys.

How we help

Evertrust & GDPR

Certificate inventory for encryption coverage — Discover and map all certificates across your infrastructure to ensure every system handling personal data is properly encrypted and accounted for.

Automated TLS renewal — Eliminate certificate expiration risks with automated lifecycle management, ensuring continuous data-in-transit protection without manual intervention.

Policy enforcement for minimum standards — Enforce organizational policies on certificate key lengths, algorithms, and validity periods to meet Art. 32 security requirements.

Audit trails for DPA accountability — Generate comprehensive audit logs demonstrating your encryption posture and certificate management practices to supervisory authorities.