Compliance

GDPR / UK GDPR

How Scrutex Supports General Data Protection Regulation Compliance

Executive Summary

The GDPR is one of the most comprehensive data protection laws in the world, imposing strict obligations on any organisation that processes personal data of EU or UK residents, regardless of where the organisation is based. Penalties can reach 20 million euros or 4% of global annual turnover. Scrutex helps organisations meet GDPR's technical security requirements under Article 32, manage processor due diligence under Article 28, detect breaches early enough to meet the 72-hour notification window, and maintain the evidence trail that the accountability principle demands.

About GDPR / UK GDPR

The General Data Protection Regulation (GDPR) governs how organisations collect, store, process, and share personal data belonging to individuals in the EU and EEA. The UK adopted a near-identical version following Brexit. At its core, GDPR establishes that individuals have fundamental rights over their personal data, including access, correction, deletion, and portability. Organisations acting as data controllers or processors must implement appropriate technical and organisational measures to protect personal data against unauthorised access, loss, or destruction. Article 32 specifically requires measures appropriate to the level of risk, and Article 5(2) establishes the accountability principle, meaning organisations must be able to demonstrate compliance, not merely claim it. GDPR enforcement has been robust. Supervisory authorities across Europe have issued billions of euros in fines since 2018, targeting organisations of all sizes for failures in security, consent, transparency, and data subject rights.

Geographic and Sector Applicability

GDPR applies to any organisation, regardless of where it is based, that processes the personal data of individuals in the EU or EEA. This extraterritorial scope means companies in the US, Australia, Asia, or anywhere else may be subject to GDPR if they offer goods or services to EU residents or monitor their behaviour. The UK GDPR mirrors the EU regulation closely and applies to organisations processing personal data of UK residents. Businesses operating across both jurisdictions typically need to comply with both regimes. GDPR is sector-agnostic. It applies equally to banks, hospitals, tech companies, small online retailers, universities, and government agencies. Any organisation handling personal data of EU or UK individuals must comply.

Who Should Care

Data Protection Officer (DPO)

Many organisations are required to appoint a DPO who oversees GDPR compliance, advises on data protection impact assessments, and acts as the contact point for supervisory authorities.

CISO and Security Teams

Article 32's requirement for appropriate technical measures falls squarely on security teams. They must implement, test, and evidence the effectiveness of security controls protecting personal data.

Board and Executive Leadership

Fines of up to 4% of global turnover make GDPR a board-level financial risk. Senior leadership must ensure adequate resources are allocated to data protection.

Legal and Compliance

Responsible for data processing agreements, breach notification procedures, and managing regulatory engagement with supervisory authorities.

Procurement

Article 28 requires due diligence on all data processors. Procurement must ensure vendor contracts include appropriate data protection clauses and that ongoing monitoring is in place.

Key Risks of Non-Compliance

!

Administrative fines up to 20 million euros or 4% of global annual turnover, whichever is higher, for the most serious infringements.

!

Lower-tier fines up to 10 million euros or 2% of turnover for less severe violations, such as failure to maintain processing records.

!

Mandatory breach notification to the supervisory authority within 72 hours, with potential notification to affected individuals if the breach poses high risk.

!

Compensation claims from affected data subjects, including the potential for group litigation in jurisdictions that allow representative actions.

!

Reputational damage from public enforcement actions, which supervisory authorities publish on their websites.

!

Enforcement orders requiring the organisation to stop processing personal data, which can be operationally devastating.

Common Compliance Gaps

Incomplete Visibility of Data-Processing Systems

Article 30 requires a record of processing activities, which depends on knowing what systems process personal data. Shadow IT, forgotten test environments, and cloud applications provisioned outside IT governance frequently process personal data without appearing in formal records.

Reactive Breach Detection

The 72-hour notification window under Article 33 is extremely tight. Organisations that discover breaches through customer complaints or media reports have already lost valuable time. Without proactive monitoring of dark web sources, paste sites, and credential breach databases, many breaches go undetected for weeks or months.

Superficial Processor Due Diligence

Article 28 requires controllers to use only processors that provide sufficient guarantees regarding technical security measures. Many organisations rely on contractual clauses and annual questionnaires, which do not reflect a processor's actual security posture at any given point in time.

Failure to Test Security Measures

Article 32(1)(d) explicitly requires organisations to regularly test, assess, and evaluate the effectiveness of their technical and organisational measures. Many organisations lack a systematic testing programme for their external-facing infrastructure.

How Scrutex Supports GDPR / UK GDPR Compliance

Scrutex capabilities mapped to GDPR / UK GDPR requirements.

Article 32 requires controllers and processors to implement technical measures ensuring ongoing confidentiality, integrity, availability, and resilience of processing systems. Scrutex's Vulnerability Insights capability continuously discovers all externally exposed systems and assesses them for vulnerabilities, misconfigurations, and weak encryption. This addresses both the security obligation under Article 32 and the data protection by design requirement under Article 25, by identifying systems that may be processing personal data without adequate protection. Forgotten web applications, misconfigured cloud storage, and exposed APIs are common sources of data breaches that Scrutex detects before attackers do.

Scrutex Capabilities

  • Continuous external attack surface discovery
  • Automated vulnerability assessment
  • Certificate and encryption monitoring
  • Cloud misconfiguration detection
  • API exposure identification

Requirements Addressed

  • Article 32: Security of processing
  • Article 25: Data protection by design and by default
  • Article 32(1)(d): Regular testing of security measures

Article 33 requires notification to the supervisory authority within 72 hours of becoming aware of a personal data breach. Article 34 extends this to informing affected individuals in high-risk cases. Early detection is everything. Scrutex continuously monitors a broad range of sources for exposed personal data, breached credentials, leaked databases, and references to the organisation in underground channels. This includes dark web marketplaces, paste sites, Telegram channels, open cloud buckets, and breach databases. Discovering a breach through proactive monitoring rather than waiting for it to surface through complaints or media reports can make the difference between a manageable incident and a regulatory crisis.

Scrutex Capabilities

  • Breached credential monitoring
  • Personal information exposure detection
  • Dark web marketplace surveillance
  • Paste site and Telegram monitoring
  • Open cloud bucket scanning
  • Leaked session and API key detection
  • VIP and executive exposure monitoring

Requirements Addressed

  • Article 33: Breach notification to supervisory authority (72-hour window)
  • Article 34: Communication of breach to data subjects
  • Article 5(1)(f): Integrity and confidentiality principle

Phishing attacks using lookalike domains and fake websites are one of the most common methods for harvesting personal data from an organisation's customers and employees. Under GDPR, a successful phishing attack that results in personal data being captured by attackers may constitute a data breach, triggering notification obligations. Scrutex's Brand Insights capability detects lookalike domains, rogue mobile applications, and fake social media profiles that impersonate the organisation, enabling rapid takedown before personal data is compromised. This proactive approach supports the Article 32 obligation to protect personal data against unauthorised access.

Scrutex Capabilities

  • Lookalike domain detection and monitoring
  • Rogue mobile application identification
  • Fake social media profile detection
  • Brand mention monitoring
  • Takedown facilitation

Requirements Addressed

  • Article 32: Protection against unauthorised access to personal data
  • Article 5(1)(f): Integrity and confidentiality

Articles 28 and 29 place specific obligations on data controllers to ensure their processors implement appropriate security measures. Controllers must conduct due diligence before engaging a processor and monitor compliance on an ongoing basis. Scrutex provides continuous, objective assessment of processor security posture from an external perspective, covering their attack surface, vulnerability status, and data exposure indicators. This real-time view goes beyond contractual assurances and annual questionnaires, providing the kind of evidence that supervisory authorities expect to see.

Scrutex Capabilities

  • Continuous external assessment of processor security
  • Vendor risk scoring with historical trending
  • Automated alerting on vendor security changes
  • Due diligence evidence for Article 28 compliance

Requirements Addressed

  • Article 28: Processor obligations and due diligence
  • Article 32: Ensuring processor security measures

Compliance Reporting

GDPR's accountability principle (Article 5(2)) means organisations must demonstrate compliance, not merely claim it. Scrutex's compliance reporting generates structured, timestamped reports that document the organisation's external security posture, vendor risk assessments, data exposure monitoring results, and remediation activities. These reports support Data Protection Impact Assessments (DPIAs), regulatory inspections, and the ongoing evidence trail that the accountability principle requires.

Scrutex Capabilities

  • GDPR-aligned compliance reporting
  • Timestamped audit trails
  • DPIA evidence support
  • Executive dashboards for board reporting

Requirements Addressed

  • Article 5(2): Accountability principle
  • Article 35: Data Protection Impact Assessment

Quick-Start Compliance Checklist

1

Run an external attack surface discovery to identify all internet-facing systems that may process personal data.

2

Cross-reference discovered assets with your Article 30 records of processing activities to identify gaps.

3

Onboard your key data processors into Vendor Insights for continuous security posture monitoring.

4

Activate Data Exposure Insights to monitor for breached credentials, leaked personal data, and dark web references.

5

Enable Brand Insights to detect phishing infrastructure targeting your organisation's brand.

6

Generate a baseline compliance posture report to support your next DPIA or regulatory engagement.

7

Establish a monthly review cadence using Scrutex dashboards to track security posture improvement.

Summary

GDPR compliance is an ongoing obligation, not a one-time project. The regulation demands appropriate technical measures, continuous assessment of their effectiveness, and the ability to detect and respond to breaches within extremely tight timeframes. Scrutex helps organisations satisfy these obligations by providing continuous external visibility, vendor intelligence, data exposure monitoring, brand protection, and accountability-ready reporting. In a regulatory environment where compliance must be demonstrated with evidence, Scrutex ensures that organisations can show they are doing what GDPR requires.

Related Regulations and Standards

NIS2 Directive: Essential and important entities subject to NIS2 face additional cybersecurity obligations that overlap with GDPR's security requirements.

DORA: Financial entities in the EU must comply with both GDPR and DORA, which adds specific ICT risk management and third-party oversight requirements.

PCI DSS v4.0: If processing cardholder data that includes personal data, both GDPR and PCI DSS requirements apply simultaneously.

ISO 27001: ISO 27001 certification is widely accepted as evidence of appropriate technical measures under Article 32.

Ready to Strengthen Your Compliance Posture?

Book a personalised demonstration and receive a complimentary external exposure assessment.