Skip to content

GDPR (Regulation (EU) 2016/679)

We are not lawyers, this is not legal advise.

It is your responsibility to discover what law applies to you and how to best comply with it. In case of doubt, consult your Data Protection Officer (DPO) or equivalent.

Note

Fully implementing GDPR entails a lot of work, like:

  • Assigning a DPO;
  • Documenting Records of Processing Activities;
  • Writing Privacy Policies;
  • Signing Data Protection Agreements with your suppliers.

This page only points you to the GDPR concerns relevant for Welkin.

If you process personal data in the EU/EEA, you need to follow GDPR.

GDPR Art. 32 Security of Processing

When it comes to security, GDPR is rather broad and non-prescriptive. Pretty much everything we do in Welkin is done to secure data. This includes, for instance, that we perform vulnerability scanning both at rest and at runtime, process logs in a separate cluster controlled with restrictive access controls to make them tamper-proof from hacked applications, and that we put safeguards in place to make developers enforce network segregation per application component. And much more. In fact, we could pretty much link every single page to GDPR Art. 32, but that would be rather noisy!

Hence, if you need a more precise understanding on how Welkin protects personal data as required by GDPR Art. 32, please look at our ISO 27001 Controls, which links to both more technical controls, and continuous confidentiality, integrity, availability and resilience of processing processes, such as our go-live checklist.

GDPR Art. 17 Right to erasure ("right to be forgotten")

GDPR Art. 28 Processor

Further reading