The Seven Sins of Personal-Data Processing Systems under GDPR

AI-generated keywords: GDPR Personal-Data Processing Systems Privacy Security Breaches Compliance

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Authors: Supreeth Shastri, Melissa Wasserman, and Vijay Chidambaram
  • Topic: Privacy and security breaches in personal-data processing systems under GDPR
  • Introduction of GDPR by the European Union in 2018 to address privacy concerns
  • Approach to GDPR from a system design perspective
  • Highlighted clashes between GDPR regulations and modern system design, architecture, and operation:
  • Storing data indefinitely
  • Reusing data without discretion
  • Fostering walled gardens and black markets for data exchange
  • Engaging in risk-agnostic data processing practices
  • Concealing data breaches from stakeholders
  • Making decisions lacking transparency or explanation
  • Treating security as a secondary priority
  • Struggle between GDPR requirements and contemporary system evolution
  • Need for comprehensive solutions for GDPR compliance rather than mere patching of issues
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Supreeth Shastri, Melissa Wasserman, Vijay Chidambaram

Accepted for publication at USENIX HotCloud 2019

Abstract: In recent years, our society is being plagued by unprecedented levels of privacy and security breaches. To rein in this trend, the European Union, in 2018, introduced a comprehensive legislation called the General Data Protection Regulation (GDPR). In this paper, we review GDPR from a system design perspective, and identify how its regulations conflict with the design, architecture, and operation of modern systems. We illustrate these conflicts via the seven GDPR sins: storing data forever; reusing data indiscriminately; walled gardens and black markets; risk-agnostic data processing; hiding data breaches; making unexplainable decisions; treating security as a secondary goal. Our findings reveal a deep-rooted tussle between GDPR requirements and how modern systems have evolved. We believe that achieving compliance requires comprehensive, grounds up solutions, and anything short would amount to fixing a leaky faucet in a sinking ship.

Submitted to arXiv on 08 Mar. 2019

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1903.09305v2

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "The Seven Sins of Personal-Data Processing Systems under GDPR," authors Supreeth Shastri, Melissa Wasserman, and Vijay Chidambaram delve into the pressing issue of privacy and security breaches that have plagued our society in recent years. The European Union introduced the General Data Protection Regulation (GDPR) in 2018 to address this growing concern. The authors approach GDPR from a system design perspective and highlight how its regulations clash with the design, architecture, and operation of modern systems. These include storing data indefinitely, reusing data without discretion, fostering walled gardens and black markets for data exchange, engaging in risk-agnostic data processing practices, concealing data breaches from stakeholders, making decisions that lack transparency or explanation, and treating security as a secondary priority. The findings of the study underscore a fundamental struggle between the stringent requirements set forth by GDPR and the evolutionary trajectory of contemporary systems. The authors argue that achieving compliance with GDPR demands comprehensive solutions built from the ground up; anything less would be akin to merely patching a leaky faucet on a sinking ship. This nuanced exploration sheds light on the intricate challenges faced by organizations striving to align their operations with GDPR standards while navigating the complexities of modern technological landscapes.
Created on 04 Mar. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.