• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Most Common Misconceptions about GDPR and Data Processing

The GDPR (General Data Privacy Regulation) passed in the European Union (EU) in May of 2018 and is one of the most popular topics of discussion amongst businesses who may or may not conduct business on an international level.

November 15, 2018 Eric V. Holtzclaw Leave a Comment

who got hacked

Time and time again, businesses and even media publications have stated that GDPR (General Data Privacy Regulation) isn’t important to them, simply because they’re either “not affected” or “not governed” by these regulations. Many hold the perception that GDPR only applies to those in the EU, or those who manage business directly in the EU. There is a misconception that the GDPR does not apply to businesses who do not offer goods or services to EU consumers, or process personal EU data. However, in all these scenarios, the GDPR rules and regulations still apply.

Here are three of the most common misconceptions about GDPR and businesses:

1. My Organization Does Not Process EU Personal Data

One of the first misconceptions about GDPR results from an organization’s belief that they do not process personal data from the European Union. However, many people do not understand the full scope of the GDPR definition of personal data. The definition as allocated in the GDPR defines personal data as “anything that can directly or indirectly identify a natural person.” This is in reference to any identifier such as name or identification number, location data or any online identifier such as IP address. Additionally, many fail to realize the definition of processing as defined by the GDPR actually applies to any set of operations performed around data. This includes collecting information on customers, recording, alteration, retrieval of this information, consultation, use, erasure or destruction. Combine the far-reach of modern technology and the number of people living abroad, there’s likely information stored somewhere that affects EU citizens.

2. My Organization Does Not Have an EU Presence

GDPR applies to ‘controllers’ and ‘processors.’ A controller determines the purposes and means of processing personal data. In other words, the controller is the business that is selling a good or service. If an organization processes any sort of data for a “controller,” they are thus considered a “processor” under the GDPR.  Any size enterprise that processes data on behalf of their controllers is subject to governance, whether or not the organization in question has a physical presence in the EU. Additionally, any company that is located outside of the EU is still subject to the law if the organization is operating an online business that EU customers can access, interact with or purchase products.

Eric V. Holtzclaw is Chief Strategist of PossibleNOW. He’s a researcher, writer, serial entrepreneur and challenger-of-conventional wisdom. Check out his book with Wiley Publishing on consumer behavior – Laddering: Unlocking the Potential of Consumer Behavior. Eric helps strategically guide companies with the implementation of enterprise-wide consent and preference management solutions.

3. My Organization Does Not Offer Goods or Services to EU Customers

Whether or not an organization offers goods or services to the EU does not matter if the organization is again processing for their controllers. This labels the organization as a legal “processor.” Data processors include software providers such as Salesforce and Microsoft, call centers, payroll, accounting, and market research firms to name a few. All of these functions within any company are considered departments that store or analyze data in some way. If a EU citizen is affected, they are protected under the GDPR and the company must comply with the legalities surrounding that individual.

What’s more, many companies that do not believe GDPR impacts them, do in fact process data of EU data subjects. More specifically, GDPR has created a ground swell of countries and states that have decided to update or create new regulations that mirror GDPR. It is more important than ever for privacy to be a top priority. It is recommend to establish a proactive practice of collecting country of residence of the prospects and customers with whom an organization conducts business. Then, as appropriate, collect consent and communication preferences for each data subject. Today, “unsolicited email” in the EU is an easy target for class action lawsuits, especially as it seems consumer opinion on data protection has become increasingly negative. Organizations today must reconsider whether or not they are governed under the laws of GDPR, as it is likely that they are. The best defense is a good offense, considering ways to collect, store and easily change consent and privacy information should be a top concern for all companies.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Data Collection, Data Security, Legal

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.