IT Management, Policies & Certifications

Principles of GDPR compliance and the Rights of Data Subjects

This article was updated on:
Aug 20th, 2018

Principles of GDPR compliance and the Rights of Data Subjects

If GDPR applies to you, then you have some legally binding obligations. These are overarched by the principles set out in Article 5 of the GDPR and we’ll go over these here, they are:

  1. Personal Data shall be processed lawfully, fairly and in a transparent manner.
  2. Collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes.
  3. Adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed.
  4. Accurate and, where necessary, kept up to date.
  5. Kept no longer than is necessary.
  6. Processed in a manner that ensure appropriate security through technical or organisational measures.

You don’t just have to demonstrate compliance with these key principles, but you are also required to protect these rights that all citizens now have:

- Right of Access (Article 15)

Any data subject can request the information you hold on them and it must be provided in a timely manner and without charge. As with any request if there is industry regulation such as the FCA or legal requirements then this would trump the GDPR.

- Right to rectification (Article 16)

If the data you hold is incorrect you have to correct it, and if you have passed this incorrect data on to third parties (with their subjects consent of course!) then you must also notify them of the corrections to me made.

- Right to Erasure (Article 17)

Individuals will be able to demand that you delete them from your systems in their entirety. There are areas that are out of scope on this where it is not feasible or technically impossible, e.g. server backups or a piece of micro-fiche.  

- Right to request restriction of processing (Article 18)

Data subjects will be able to obtain the restriction of processing where;  

  1. The accuracy of the data is contested.  
  2. The processing is unlawful but the individual does not want the data erased.
  3. The controller no longer needs the data to process, but is required to keep it.
  4. Right to notification (Article 19)

The controller has to communicate any rectification or erasure of personal data or restriction of processing carried out.

- Right to Data Portability (Article 20)

The data subject shall have the right to receive the personal data concerning him or her, which he or she has provided to a controller, in a structured, commonly used and machine-readable format and have the right to transmit those data to another controller.

- Right to Object to Processing (Article 21)

The data subject now has the right to object, on grounds relating to his or her particular situation.

- Right to not be profiled (Article 22)

The data subject shall have the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her or similarly significantly affects him or her.

These are only snippets of the GDPR articles but hopefully it gives you a feel for your new obligations and rights of individuals under GDPR. You’ll need to read, or seek advice on the full implications for your business. You can see all the Articles here for full reading.

Talk to one of our friendly experts.
Keen to learn more? Explore our other related resources below:
August 1, 2025
Thinking About Buying Second-Hand Tech for Your Small Business? Read This First...
Telecoms & Connectivity
IT Management, Policies & Certifications
June 1, 2025
Microsoft 365 Apps: A Small Business Owner’s Toolkit!
Microsoft 365
IT Management, Policies & Certifications
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
March 1, 2025
Backup Essentials for Small Businesses: Have you explored the options?
IT Management, Policies & Certifications
November 12, 2024
7 IT Policies Your Small Business Needs
IT Management, Policies & Certifications
July 5, 2022
4 Tell-Tale Signs You Need an IT Support Partner
Microsoft 365
IT Management, Policies & Certifications
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
October 11, 2021
The Business Benefits of an IT Partner
IT Management, Policies & Certifications
July 28, 2021
Buyer's Guide: How To Choose An IT Partner
IT Management, Policies & Certifications
June 10, 2021
Microsoft Azure Migration: How Can it Benefit Your Business?
IT Management, Policies & Certifications
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 20, 2019
How do I pick the Right Support Company for my Business?
IT Management, Policies & Certifications
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
September 20, 2018
Email Spoofing Scenario
IT Management, Policies & Certifications
Cyber & Data Security
September 7, 2018
The difference between Disaster Recovery and Business Continuity
IT Management, Policies & Certifications
August 31, 2018
Office Move - IT Checklist
IT Management, Policies & Certifications
August 28, 2018
7 Signs you’ve outgrown your IT support partner
IT Management, Policies & Certifications
August 21, 2018
What types of IT Support are there?
IT Management, Policies & Certifications
August 16, 2018
How to Budget for Your IT as a Business Owner (Plus Free Template)
IT Management, Policies & Certifications
August 14, 2018
Does my small business really need a server? 
IT Management, Policies & Certifications
Telecoms & Connectivity
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications
October 12, 0202
A Beginner’s Guide to Azure Active Directory
IT Management, Policies & Certifications