Tresorit Encryption Whitepaper
Tresorit Encryption Whitepaper
Tresorit Encryption Whitepaper
Tresorit Whitepaper
1
Introduction: why the GDPR matters for your business
The GDPR is a comprehensive regulation that unifies data protection in all EU countries.
It has applied directly in all EU member states since 25 May 2018.
The GDPR has a very broad territorial scope and applies to any organization that
manages the personal data of individuals who are based in the EU, regardless where the
organization is registered. Non-compliance leads to severe consequences. Fines may
amount to a maximum of EUR 20 million, or 4% of global annual turnover.
“
“The GDPR will change not only the European data protection laws
but nothing less than the world as we know it.”
§
“The controller and the processor shall implement appropriate
technical and organisational measures to ensure a level of
security appropriate to the risk, including inter alia as appropriate:
the pseudonymisation and encryption of personal data”
2
2. Encryption keeps personal data secure from third party access.
The GDPR does not specify technologies such as algorithms and their applications.
However, the way encryption keys are managed is important to decide whether the
re-identification of persons from the leaked dataset is possible or not. End-to-end
encryption with client-side key management represents a significantly stronger
protection for personal data.
With channel & at-rest encryption, the cloud provider has access to the encryption
keys and the server stores the data in an unencrypted format as well. Thus, in case
of a breach, re-identification of the persons from the leaked dataset is technically
possible.
110
101
End-to-end encryption
With end-to-end encryption, the cloud provider doesn’t have access to encryption
keys. The server stores the encryption keys and user contents only in an encrypted
format. This way, end-to-end encrypted cloud service providers like Tresorit can
3
never access the contents of user files. The re-identification of persons from the
end-to-end encrypted data is infeasible, even in case of a server-side data breach.
When a breach happens, only the encrypted data leaks and no one can read the
contents. The personal data of your staff and clients is not threatened.
110
101
4
Relevant GDPR articles and how end-to-end encryption technology
helps to comply with them
Article 25. Data protection by Organizations must develop internal ✓ Data governance features: file
design and by default data protection processes and permission control, DRM, user
“The controller shall, both at the time products with data privacy in mind group management
of the determination of the means for from the ground up. ✓ Admin Center to set company-
processing and at the time of the wide security policies (IP
processing itself, implement restrictions, disabling local sync,
appropriate technical and etc.)
organisational measures.” ✓ Tresorit ZeroKit – our SDK allows
developers to integrate our end-
to-end encryption into their own
services.
5
What is personal data?
The GDPR only applies to personal data. Personal data is any information relating to an
identified or identifiable natural person (“data subject”). Examples: a name, an
identification number, location data, an online identifier, or factors specific to the
physical, physiological, genetic, mental, economic, cultural or social identity of that
person.
Under the GDPR, all businesses should take measures to minimize the amount of
personally identifiable information they store, and ensure that they do not store any
information for longer than necessary.
How does end-to-end encryption protect personal data?
The data controller’s end-to-end encrypted documents, such as a spreadsheet with
employee details stored with Tresorit, may contain personal data. As the data controller
has the encryption key to decrypt the files, they can re-identify the person the data
belongs to. However, from the perspective of the end-to-end encrypted data
processors like Tresorit, this spreadsheet does not contain any personal data because
Tresorit, as service provider, does not have the decryption keys to the files. Thus,
Tresorit is unable to re-identify the persons.
Tresorit handles all user data with utmost care, and due to our end-to-end encryption,
we are technically unable to access the contents of user files. We are currently working
on finalising our ISO27001 compliance process which complements our GDPR efforts.
Tresorit as a company itself will be compliant with GDPR by the time it is applied.
This whitepaper has been prepared only for the purposes of general information. It is not legal advice, and
should not be used as legal advice. For information specifically tailored to your business situation, please
seek professional legal counsel.