Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

What GDPR Means For Employee Data

Get Free GDPR Assessment
Published August 10, 2021 / Updated October 17, 2024
Contributors

Anas Baig

Product Marketing Manager at Securiti

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

What is the EU’s GDPR

The European Union’s General Data Protection Regulation (GDPR) is designed to protect European Union’s residents in relation to the processing of their personal data. It treats natural persons including consumers as well as employees equally and grants them several rights and safeguards.

This article provides a complete guide to the Human Resource Management team of an organization aiming to comply with the GDPR. Let’s first look into some of the key provisions of the GDPR that a Human Resources Management team must consider while handling employees’ personal data:

Lawfulness of processing

As per Article 6 of the GDPR, data controllers must have a legal basis to process personal data. For most data processing happening under workplace circumstances, the legal basis cannot be the employee’s consent because of the imbalance of power between an employer and employee. The employee may worry that his/her refusal to consent may have severe negative consequences on his/her employment relationship. As a result, the employee’s consent cannot be considered to be freely given.

Employers can rely on an employee's consent only in very few exceptional circumstances such as to retain job applicant’s data for future roles as there are no adverse consequences on the employment relationship for refusal. Such consent must be freely given, specific, informed, unambiguous and documented.

However, in the context of work , employers should rely on other lawful bases as indicated in Article 6 of the GDPR. The most common legal bases relied upon by employers are the performance of the employment contract, the legitimate interests of the employer, and the compliance with a legal obligation to which the employer is subject. Employers must apply the principles of proportionality and subsidiarity regardless of the applicable legal basis for processing employees’ personal data.

Securiti’s Data Mapping Solution enables organizations to conduct effective and automated data mapping that can help organizations identify the correct legal basis and ensure lawful data processing.

Principles relating to processing of personal data

Article 5 of the GDPR sets out 7 key data protection principles that all data controllers need to abide by. These data protection principles are:

  • Lawfulness, fairness and transparency
  • Purpose Limitation
  • Data Minimization
  • Accuracy
  • Storage Limitation
  • Integrity and confidentiality
  • Accountability

The employer must ensure complete compliance with all of the above-mentioned data protection principles when it comes to handling employees’ personal data. This would include employers’ obligation to notify its employees of the existence of any monitoring activity (or any surveillance if carried out), the purposes for which the personal data is to be processed for and any other information necessary to guarantee fair processing.

Securiti can help organizations map data to their owners, create privacy notices and incorporate sensitive data intelligence to ensure that all data protection principles are complied with.

Data protection by design and by default

Article 25 of the GDPR requires employers to implement the principles of data protection "by design and default" in all data processing activities and projects. As an example, where an employer issues devices to employees, the most privacy-friendly solutions should be selected if tracking technologies are involved. Data minimization must also be taken into account.

Securiti can help organizations map data to their owners, create privacy notices and incorporate data intelligence in an automated fashion to help organizations achieve privacy compliance across all data processing activities and projects.

Data protection impact assessment (DPIA)

Article 35 of the GDPR requires data controllers to conduct data protection impact assessments where data processing is likely to result in a high risk to data subjects. In an employment context, the employer must carry out a DPIA before using new technologies or where data processing is likely to result in a high risk to the fundamental rights and freedoms of employees.

A DPIA is necessary for the following situations:

(1) Systematic and extensive evaluation of personal data or profiling.
(2) Processing on a large scale of personal data relating to criminal convictions and offences.
(3) Systematic monitoring of publicly accessible areas on a large scale.
(4) The use of newer technologies and biometric procedures.

Securiti incorporates AI to enable Assessment Automation (PIAs, DPIAs, Readiness Assessments, Transfer Impact Assessments) to trigger and conduct risk-based assessments.

Records of processing activities

As per Article 30 of the GDPR, the employer must maintain records of data processing activities under its responsibility. This obligation does not apply to enterprises employing fewer than 250 persons unless the processing it carries is likely to result in a risk to the rights and freedoms of data subjects, the processing is not occasional, or the processing includes special categories of data or relates to criminal convictions and offences.

These records can be audited at any time to see if the organization is compliant with the GDPR.

Securiti’s Data Mapping Solution allows organizations to create Automated ROPA reports helping them stay in compliance with the GDPR.

Personal data breach notification

As per Articles 33 and 34 of the GDPR, employers must notify personal data breaches to the regulatory authority where a breach is likely to result in a risk to the rights and freedoms of employees. They must notify not later than 72 hours after having become aware of the breach. Where such risk is high, the employer must notify impacted employees without undue delay.

Securiti’s Data Breach Management Solution swiftly identifies compromised data and impacted data subjects in a security incident. It utilizes built-in privacy research to help organizations deliver breach notifications within hours of a security incident.

Data sharing with third parties

While sharing an employee's personal data with external third parties and vendors such as HR services, security contractors or medical insurance services, etc, the employer must assess their privacy practices and their third-party/vendor’s compliance with GDPR’s requirements. It is best practice to have contractual agreements containing safeguards for the protection of the transferred data.

Securiti’s Vendor Management Solution allows organizations to assess their vendors based on a predefined risk score and also offers a centralized process to assess how compliant the third-party vendors are with the GDPR.

Cross-border data transfers

Given cross-border data protection requirements in the GDPR (Article 44 to 50), companies must ensure that personal data transfers to a third country outside the EU take place only where an adequate level of protection is ensured and that the data shared outside the EU and subsequent access by other entities within the group remains minimally necessary for the intended purposes.

Securiti offers an all-encompassing and comprehensive Schrems-II solution to enable companies to conduct effective cross-border data transfer risk assessments, identify and review data transfers from the EU and remediate discovered vendor risks.

Data subjects’ rights

As per Articles 12 to 23 of the GDPR, an employee has the following rights in relation to his/her personal data:

(1) Right to Information
(2) Right of Access
(3) Right to rectification
(4) Right to erasure
(5) Right to restriction of processing
(6) Right to data portability
(7) Right to object
(8) Right not to be subject to automated decision-making.

Employers are required to fulfill the DSR requests of their employees within stipulated deadlines.

Securiti offers the DSR Automation Solution to help organizations honor all rights and simplify the process of exercising these rights. This process turns manual work into an automated system that will help enterprises swiftly process data subject requests and enable coordination between stakeholders for reviews and approvals.

Specific member states’ rules

As per Article 88 of the GDPR, member states may provide for more specific rules with respect to the processing of employees’ personal data. Therefore, employers must also look into national and local employment laws relevant to their jurisdiction while handling employees’ personal data.

Operationalizing the GDPR

HR Management must meet the requirements of the afore-mentioned provisions of the GDPR. To achieve compliance, organizations need to operationalize their processes.

This can be done in the following ways:

  • Disclose how you collect, process, retain, share, and process employees’ data through transparent formal policies.
  • Develop formal policies and procedures for the collection and handling of employees’ data.
  • Update privacy policies as needed and share with all employees as well as consumers.
  • Ensure privacy policies and notices are easily accessible and understandable to your workforce as well as incorporated in your employees’ handbooks.
  • Review and update your processes.
  • Maintain proper documentation with regards to your employees’ personal data.

Performing these tasks through manual methods can increase the risk of human error, not to mention the time and money to complete them. Organizations are advised to incorporate automation that can simplify and speed up the compliance process.

Securiti’s Sensitive Data Intelligence Solution can help your organization to discover, analyze, and protect large datasets. It offers you a 360 solution to all your compliance needs. See a demo of our Sensitive Data Intelligence solution and let Securiti help you on your road to GDPR compliance.

Securiti also offers automated data mapping, DSR rights fulfillment, data breach management and security controls to help you comply with the obligations required by the GDPR.


Frequently Asked Questions (FAQs)

Employee data includes personal information related to employees, such as names, addresses, contact details, payroll information, performance evaluations, and any other data collected in the employment context. It can also include sensitive data like health records or biometric data if relevant to employment.

Yes, GDPR covers employee data when employers process it. Employers are subject to GDPR requirements regarding the processing of personal data of their employees.

Article 88 of GDPR allows EU member states to create specific rules for handling employee data in the workplace and grants flexibility for countries to establish laws protecting employee rights during the processing of their personal data for employment purposes. Other relevant GDPR articles include Article 6, which defines lawful bases for personal data processing; Article 9, addressing sensitive data processing; Article 30, mandating record-keeping for processing activities; and Article 35, requiring a Data Protection Impact Assessment (DPIA) in certain cases to mitigate risks to employee rights.

No, GDPR applies to all individuals whose personal data is processed by organizations, including employees, customers, clients, and any other data subjects.

For example, this applies when the data isn’t personal or when the user isn’t a business or organization. GDPR also doesn’t apply to data used for crime investigations, law enforcement, or national security.

Securiti for Workday

Security | PrivacyOps | Governance | Compliance

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

AI TRiSM View More

What is AI TRiSM and Why It’s Essential in the Era of GenAI

The launch of ChatGPT in late 2022 was a watershed moment for AI, introducing the world to the possibilities of GenAI. After OpenAI made...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New