{"id":176,"date":"2018-05-26T05:00:26","date_gmt":"2018-05-26T05:00:26","guid":{"rendered":"http:\/\/www.techandtrain.in\/blog\/?p=176"},"modified":"2025-10-22T14:55:34","modified_gmt":"2025-10-22T09:25:34","slug":"general-data-protection-regulation-gdpr-laymans-introduction","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2018\/05\/general-data-protection-regulation-gdpr-laymans-introduction\/","title":{"rendered":"General Data Protection Regulation (GDPR) &#8211; Layman&#8217;s Introduction"},"content":{"rendered":"<ul>\n<li>Data of any EU citizen \/ entity cannot be shared without explicit consent. Terms &amp; Conditions \/ Privacy checkbox doesn&#8217;t suitably give consent as per this law. Explicit consent is required<\/li>\n<li>Records of when consent was given, how, what time, when revoked, etc. must be stored<\/li>\n<li>Any breach of data or hacking must be informed to the stakeholders within 72 hours<\/li>\n<li>It applies to whole of EU<\/li>\n<li>Consent can be withdrawn anytime &amp; when they want, and data processor \/ controller must comply<\/li>\n<li>There is an option for right to be forgotten. If someone says to a data processor \/ controller that &#8220;FORGET ME&#8221; they must remove all data on them. It applies to all places which store &amp; process \/ control the relevant data<\/li>\n<li>GDPR applies to Production environment of Digital Systems which have data on EU citizens or entities. If Test \/ Pre-Production environment has unmasked data of EU citizens \/ entities again this law applies<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/gdpr-an-executive-guide-to-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.zdnet.com\/article\/gdpr-an-executive-guide-to-what-you-need-to-know\/\u00a0<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Data of any EU citizen \/ entity cannot be shared without explicit consent. Terms &amp; Conditions \/ Privacy checkbox doesn&#8217;t [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[50],"tags":[51],"class_list":["post-176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr","tag-gdpr"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/05\/GDPR.jpg?fit=1080%2C720&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-2Q","jetpack-related-posts":[{"id":1449,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/05\/what-analytics-can-we-run-for-a-biometric-solution-and-its-associated-portal-part-1collated-with-help-of-ai\/","url_meta":{"origin":176,"position":0},"title":"What analytics can we run for a biometric solution and it&#8217;s associated portal? &#8211; Part 1(Collated with help of AI)","author":"Neil Harwani","date":"May 30, 2025","format":false,"excerpt":"Running analytics for a biometric solution and its associated portal involves monitoring both technical performance and user interaction, along with security and compliance metrics. Below is a categorized list of analytics you can track: \ud83d\udd10 1. Biometric System Analytics These metrics assess how the biometric engine performs: Enrollment Metrics Total\u2026","rel":"","context":"In &quot;Biometrics&quot;","block_context":{"text":"Biometrics","link":"https:\/\/www.techandtrain.com\/blog\/category\/biometrics\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1541,"url":"https:\/\/www.techandtrain.com\/blog\/2026\/04\/dimensions-for-artificial-intelligence-genai-llms-deep-learning-neural-networks-data-science-to-ponder-on-part-1-assisted-by-ai-chatgpt\/","url_meta":{"origin":176,"position":1},"title":"Dimensions for Artificial Intelligence \/ GenAI \/ LLMs \/ Deep Learning \/ Neural Networks \/ Data Science to ponder on &#8211; Part 1-Assisted by AI &#8211; ChatGPT","author":"Neil Harwani","date":"April 17, 2026","format":false,"excerpt":"\ud83e\udde0 1. Model Performance & Quality Beyond accuracy: Precision \/ Recall \/ F1-score ROC-AUC Calibration (probability correctness) Generalization ability Robustness (noise, adversarial inputs) Stability (variance across runs) Overfitting \/ Underfitting control Latency (response time) Throughput (requests per second) \u2696\ufe0f 2. Responsible AI \/ Ethics Along with fairness, bias, explainability, interpretability:\u2026","rel":"","context":"In &quot;AIML&quot;","block_context":{"text":"AIML","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiml\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/Dimensions.jpg?fit=640%2C360&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/Dimensions.jpg?fit=640%2C360&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/Dimensions.jpg?fit=640%2C360&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1242,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/04\/cyber-security-tips-for-portals-generated-by-chatgpt-gemini-part-1\/","url_meta":{"origin":176,"position":2},"title":"Cyber security tips for Portals &#8211; Generated by ChatGPT &amp; GEMINI &#8211; Part 1","author":"Neil Harwani","date":"April 8, 2024","format":false,"excerpt":"Cyber security is a critical concern for portal applications, which often serve as gateways to a wide range of resources and services. Here are some vital tips to enhance the cyber security posture of portal applications: 1. Use Strong Authentication Mechanisms: Implement multi-factor authentication (MFA) to add an extra layer\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1459,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/07\/problems-with-growth-at-any-cost-part-1-sourced-from-ai\/","url_meta":{"origin":176,"position":3},"title":"Problems with growth at any cost &#8211; Part 1 (Sourced from AI)","author":"Neil Harwani","date":"July 2, 2025","format":false,"excerpt":"The idea of \"growth at any cost\"\u2014whether in business, economics, or personal success\u2014often leads to serious long-term problems despite short-term gains. Here's a breakdown of the key problems with such an approach: \ud83d\udea9 1. Environmental Degradation Unchecked industrial growth \u2192 pollution, deforestation, climate change. Example: Overuse of fossil fuels, water\u2026","rel":"","context":"In &quot;Growth&quot;","block_context":{"text":"Growth","link":"https:\/\/www.techandtrain.com\/blog\/category\/growth\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/07\/Growth.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/07\/Growth.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/07\/Growth.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/07\/Growth.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/07\/Growth.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1414,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/02\/major-optimization-techniques-in-data-science-categorized-by-constrained-vs-unconstrained-scenarios-part-1\/","url_meta":{"origin":176,"position":4},"title":"Major optimization techniques in Data Science categorized by constrained vs. unconstrained scenarios &#8211; Part 1","author":"Neil Harwani","date":"February 6, 2025","format":false,"excerpt":"1. Unconstrained Optimization Methods (Used when there are no explicit constraints on variables) Gradient-Based Methods Second-Order Methods Heuristic & Meta-Heuristic Methods Bayesian Optimization 2. Constrained Optimization Methods (Used when optimization involves constraints on variables) Convex Optimization Methods Augmented Lagrangian Methods Penalty Methods Sequential Quadratic Programming (SQP) Interior-Point Methods Constraint-Specific Heuristic\u2026","rel":"","context":"In &quot;Data Science&quot;","block_context":{"text":"Data Science","link":"https:\/\/www.techandtrain.com\/blog\/category\/data-science\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/frequency-wave-7776034_1280.jpg?fit=1200%2C674&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/frequency-wave-7776034_1280.jpg?fit=1200%2C674&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/frequency-wave-7776034_1280.jpg?fit=1200%2C674&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/frequency-wave-7776034_1280.jpg?fit=1200%2C674&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/frequency-wave-7776034_1280.jpg?fit=1200%2C674&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":573,"url":"https:\/\/www.techandtrain.com\/blog\/2020\/02\/data-analysis-process-in-analytics-data-science\/","url_meta":{"origin":176,"position":5},"title":"Data Analysis Process in Analytics \/ Data Science","author":"Neil Harwani","date":"February 19, 2020","format":false,"excerpt":"This article is based on understanding from Wikipedia article on Data Analysis & my experiences in Data Science \/ Analytics \/ AI \/ ML -\u00a0https:\/\/en.wikipedia.org\/wiki\/Data_analysis Various areas like\u00a0Data Mining, Predictive Analysis, Exploratory Data Analysis, Text Analytics, Business Intelligence, Confirmatory Data Analysis and Data Visualization\u00a0overlap with this area Before starting your\u2026","rel":"","context":"In &quot;Analytics&quot;","block_context":{"text":"Analytics","link":"https:\/\/www.techandtrain.com\/blog\/category\/analytics\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Geometry.jpg?fit=960%2C538&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Geometry.jpg?fit=960%2C538&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Geometry.jpg?fit=960%2C538&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Geometry.jpg?fit=960%2C538&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=176"}],"version-history":[{"count":3,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/176\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/176\/revisions\/190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/191"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}