implementing-gdpr-data-protection-controls
The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill cover
Best use case
implementing-gdpr-data-protection-controls is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill cover
Teams using implementing-gdpr-data-protection-controls should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/implementing-gdpr-data-protection-controls/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How implementing-gdpr-data-protection-controls Compares
| Feature / Agent | implementing-gdpr-data-protection-controls | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill cover
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Implementing GDPR Data Protection Controls ## Overview The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill covers implementing the technical and organizational measures required by GDPR, including data protection by design and by default, Data Protection Impact Assessments (DPIAs), data subject rights management, breach notification procedures, and cross-border data transfer mechanisms. ## When to Use - When deploying or configuring implementing gdpr data protection controls capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Understanding of EU data protection law and its territorial scope - Knowledge of personal data processing activities within the organization - Familiarity with data architecture, databases, and application systems - Understanding of data flows including cross-border transfers ## Core Concepts ### Key GDPR Articles for Technical Controls | Article | Requirement | |---------|-------------| | Art. 5 | Principles: lawfulness, purpose limitation, data minimization, accuracy, storage limitation, integrity and confidentiality, accountability | | Art. 6 | Lawful basis for processing (consent, contract, legal obligation, vital interests, public task, legitimate interest) | | Art. 25 | Data protection by design and by default | | Art. 28 | Processor obligations and contractual requirements | | Art. 30 | Records of processing activities (ROPA) | | Art. 32 | Security of processing (technical and organizational measures) | | Art. 33 | Breach notification to supervisory authority (72 hours) | | Art. 34 | Communication of breach to data subjects | | Art. 35 | Data Protection Impact Assessment (DPIA) | | Art. 37-39 | Data Protection Officer (DPO) appointment and role | | Art. 44-49 | Cross-border data transfers (adequacy, SCCs, BCRs) | ### Article 32 Security Measures The regulation requires organizations to implement measures appropriate to the risk: - **Pseudonymization** and encryption of personal data - **Confidentiality, integrity, availability, and resilience** of processing systems - **Ability to restore** availability and access to personal data in a timely manner - **Regular testing** and evaluation of technical and organizational measures ### Data Subject Rights (Articles 12-22) | Right | Article | Description | |-------|---------|-------------| | Right to be informed | 13-14 | Transparent information about processing | | Right of access | 15 | Obtain copy of personal data | | Right to rectification | 16 | Correct inaccurate data | | Right to erasure | 17 | "Right to be forgotten" | | Right to restrict processing | 18 | Limit processing of data | | Right to data portability | 20 | Receive data in machine-readable format | | Right to object | 21 | Object to processing (especially direct marketing) | | Automated decision-making | 22 | Not be subject to solely automated decisions | ## Workflow ### Phase 1: Data Mapping and Assessment (Weeks 1-6) 1. Create comprehensive data inventory: - What personal data is collected - From whom (data subjects) - Why (purposes and lawful bases) - Where it's stored (systems, locations, countries) - Who has access (internal and external) - How long it's retained - What security measures protect it 2. Document Records of Processing Activities (ROPA) per Article 30 3. Identify lawful basis for each processing activity 4. Map cross-border data transfers and transfer mechanisms 5. Identify processing activities requiring DPIA ### Phase 2: Gap Analysis and Risk Assessment (Weeks 7-10) 1. Assess current state against GDPR requirements 2. Perform DPIAs for high-risk processing activities 3. Identify security gaps in Article 32 compliance 4. Evaluate data retention compliance 5. Assess data subject rights request handling capabilities ### Phase 3: Technical Controls Implementation (Weeks 11-24) 1. **Encryption**: - Data at rest: AES-256 for databases, file systems, backups - Data in transit: TLS 1.2+ for all personal data transfers - Key management: secure key storage and rotation procedures 2. **Pseudonymization**: - Implement tokenization for sensitive identifiers - Separate pseudonymization keys from data stores 3. **Access Controls**: - Role-based access control (RBAC) for personal data - Principle of least privilege - MFA for systems processing personal data - Regular access reviews 4. **Data Minimization**: - Implement data collection limits at application layer - Default privacy settings (data protection by default) - Automated data retention enforcement 5. **Erasure and Portability**: - Build data deletion workflows across all systems - Implement data export in machine-readable formats (JSON, CSV) - Cascade deletion to backups and archives 6. **Consent Management**: - Implement granular consent collection mechanisms - Consent withdrawal functionality - Consent audit trail and versioning 7. **Breach Detection**: - SIEM for personal data access monitoring - Data loss prevention (DLP) controls - Anomalous access detection ### Phase 4: Organizational Controls (Weeks 11-24) 1. Appoint Data Protection Officer (DPO) if required 2. Develop data protection policies and procedures 3. Create breach notification procedures (72-hour timeline) 4. Establish data subject request (DSR) handling procedures 5. Implement vendor management with Data Processing Agreements (DPAs) 6. Deploy privacy awareness training for all staff 7. Create data protection by design guidance for development teams ### Phase 5: Documentation and Compliance Evidence (Weeks 25-30) 1. Finalize ROPA documentation 2. Document all DPIAs and outcomes 3. Create data protection policies 4. Document technical and organizational measures 5. Establish privacy notice and consent records 6. Create international transfer documentation (SCCs, TIAs) ### Phase 6: Ongoing Compliance (Continuous) 1. Regular DPIA reviews for new processing activities 2. Annual data mapping refresh 3. Periodic security measure testing (Art. 32 requirement) 4. Data subject request tracking and SLA monitoring 5. Breach response readiness testing 6. Training refresh and awareness campaigns ## Key Artifacts - Records of Processing Activities (ROPA) - Data Protection Impact Assessments (DPIAs) - Data Processing Agreements (DPAs) - Privacy Notices and Consent Records - Breach Response Procedures and Register - Data Subject Request Handling Procedures - International Data Transfer Mechanisms (SCCs, BCRs) - Technical and Organizational Measures Documentation ## Common Pitfalls - Treating GDPR as only a legal/compliance exercise without technical implementation - Incomplete data mapping missing shadow IT or legacy systems - Failing to maintain consent audit trails - Not testing 72-hour breach notification capability - Ignoring cross-border transfer requirements for cloud services - Over-reliance on consent as lawful basis when legitimate interest applies ## References - GDPR Official Text: https://gdpr-info.eu/ - European Data Protection Board (EDPB) Guidelines - ICO (UK) GDPR Guidance: https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/ - CNIL (France) GDPR Compliance Toolkit - Article 29 Working Party Guidelines on DPIAs
Related Skills
testing-for-sensitive-data-exposure
Identifying sensitive data exposure vulnerabilities including API key leakage, PII in responses, insecure storage, and unprotected data transmission during security assessments.
performing-sqlite-database-forensics
Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode encoded timestamps, and extract evidence from browser history, messaging apps, and mobile device databases.
implementing-zero-trust-with-hashicorp-boundary
Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential brokering, session recording, and Vault integration.
implementing-zero-trust-with-beyondcorp
Deploy Google BeyondCorp Enterprise zero trust access controls using Identity-Aware Proxy (IAP), context-aware access policies, device trust validation, and Access Context Manager to enforce identity and posture-based access to GCP resources and internal applications.
implementing-zero-trust-network-access
Implementing Zero Trust Network Access (ZTNA) in cloud environments by configuring identity-aware proxies, micro-segmentation, continuous verification with conditional access policies, and replacing traditional VPN-based access with BeyondCorp-style architectures across AWS, Azure, and GCP.
implementing-zero-trust-for-saas-applications
Implementing zero trust access controls for SaaS applications using CASB, SSPM, conditional access policies, OAuth app governance, and session controls to enforce identity verification, device compliance, and data protection for cloud-hosted services.
implementing-zero-trust-dns-with-nextdns
Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking, privacy protection, and organizational policy enforcement across all endpoints.
implementing-zero-standing-privilege-with-cyberark
Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using just-in-time access with time, entitlement, and approval controls.
implementing-zero-knowledge-proof-for-authentication
Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private key) without revealing the secret itself. This skill implements the Schnorr identificati
implementing-web-application-logging-with-modsecurity
Configure ModSecurity WAF with OWASP Core Rule Set (CRS) for web application logging, tune rules to reduce false positives, analyze audit logs for attack detection, and implement custom SecRules for application-specific threats. The analyst configures SecRuleEngine, SecAuditEngine, and CRS paranoia levels to balance security coverage with operational stability. Activates for requests involving WAF configuration, ModSecurity rule tuning, web application audit logging, or CRS deployment.
implementing-vulnerability-sla-breach-alerting
Build automated alerting for vulnerability remediation SLA breaches with severity-based timelines, escalation workflows, and compliance reporting dashboards.
implementing-vulnerability-remediation-sla
Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities based on severity, asset criticality, and exploit availability. Effective SLA programs