GDPR and Encryption Compliance
Is encryption required by GDPR, and what does compliant encryption actually look like in practice for SaaS and internal systems?
Does GDPR actually require encryption?
GDPR does not say “encrypt everything or you are illegal.” It does something more uncomfortable: it expects you to apply appropriate technical and organisational measures to protect personal data, and explicitly lists encryption as one of those measures.
In practice:
- If you process personal data at any scale and do not encrypt it in storage or in transit, you will have a hard time justifying that choice to a regulator after a breach.
- If you encrypt but do it badly—weak ciphers, shared passwords, keys on the same server as data—you do not get the protection you think you do.
- If you implement strong, modern encryption correctly, GDPR treats that as a key control when assessing risk, fines, and notification duties.
So encryption is not a checkbox; it is part of your overall risk story. For anything more than trivial data, the safe assumption is: yes, you should be encrypting.
What “GDPR-grade” encryption looks like technically
GDPR is technology-neutral; it does not mandate specific algorithms. Regulators and auditors, however, look for:
- Modern, public cryptographic primitives:
- Symmetric encryption with AES-256 in an authenticated mode (for example, AES-256-GCM).
- Key derivation using KDFs like PBKDF2 with high iteration counts (for example, 310k iterations).
- Separation of duties and materials:
- Keys stored separately from ciphertext.
- Access to keys controlled and auditable.
- No home-grown cryptography:
- Use well-reviewed libraries and platform APIs (for example, the Web Crypto API in browsers).
In a zero-knowledge, client-side encrypted app like Inkrypt:
- Encryption happens in the browser using the Web Crypto API.
- Keys are derived from passwords using PBKDF2 with 310k iterations.
- Content is encrypted with AES-256-GCM with a fresh IV per save.
- Servers store only ciphertext, salt, IV, and minimal metadata.
That design is aligned with both cryptographic best practice and GDPR’s expectation that personal data at rest is robustly protected against compromise.
How encryption affects breach notification and fines
Under GDPR, encryption changes the conversation when something goes wrong:
- If an attacker exfiltrates a database that holds plaintext personal data, you almost certainly have to:
- Notify the supervisory authority within 72 hours.
- Notify affected individuals if the risk is high.
- Prepare for fines and remediation.
- If an attacker steals a database that contains only strong ciphertext and you can demonstrate:
- Modern algorithms (for example, AES-256-GCM).
- Strong key management and separation.
- No exposure of decryption keys,
regulators may conclude that the risk to individuals is low, and notification obligations can be reduced or, in some cases, avoided.
This is why proper encryption is often called a “breach impact control.” It does not prevent incidents, but it can materially reduce legal and financial exposure when they happen.
Client-side encryption and zero-knowledge under GDPR
Client-side encryption and zero-knowledge architectures go further:
- Encryption and key derivation (for example, PBKDF2 with 310k iterations) happen on the client.
- Data is encrypted with AES-256-GCM in the browser via the Web Crypto API.
- The provider never sees passwords or decryption keys and cannot decrypt stored ciphertext.
From a GDPR standpoint, this has implications:
- Data controller responsibilities remain—you still process personal data.
- However, the attack surface and insider risk on the provider side are sharply reduced.
- In a database theft scenario, the provider can credibly explain that:
- They held only ciphertext and public parameters (salt, IV).
- There was no technical ability to decrypt.
Inkrypt adopts this model for notes: zero-knowledge, client-side encryption, AES-256-GCM, PBKDF2 at 310k iterations, Web Crypto API. That does not eliminate GDPR obligations, but it puts you on the strongest side of the risk discussion.
For more detail on the architecture, see:
- “Zero-knowledge encryption: what it actually means when we can't see your data”
- “Why we encrypt in the browser (and what happens to your password)”
How to talk about encryption in your GDPR documentation
GDPR expects you to document your measures, not just deploy them. For encryption, that means being precise:
- Describe:
- Where encryption happens (client-side, server-side, or both).
- Which data is encrypted at rest and in transit.
- Which algorithms and key sizes you use (for example, AES-256-GCM).
- How keys are derived (for example, PBKDF2 with 310k iterations) and stored.
- Explain:
- How you separate keys from data.
- Who can access keys and under what conditions.
- How you handle key rotation and revocation.
If you use a zero-knowledge tool like Inkrypt for specific workflows (for example, storing or sharing sensitive notes), document:
- That encryption and key derivation happen in the browser.
- That the provider only stores ciphertext and public parameters.
- That there is no password reset or key recovery by design.
This level of detail is what auditors and regulators look for when assessing whether “encryption” is more than a checkbox in a policy slide deck.
Where encryption fits in a GDPR compliance program
Encryption is one control inside a larger system. A realistic GDPR posture includes:
- Data minimisation:
- Don’t collect personal data you don’t need.
- Don’t replicate it into systems that don’t require it.
- Access control and logging:
- Limit who can see decrypted data.
- Log access with enough detail to reconstruct what happened.
- Secure development:
- Use safe APIs (like the Web Crypto API) instead of rolling your own crypto.
- Avoid logging secrets and plaintext payloads.
- Third-party tools:
- Prefer tools that implement zero-knowledge, client-side encryption where appropriate.
Products like Inkrypt help with a specific slice: how you store and share sensitive notes and operational data in a way that is aligned with strong encryption and minimal server-side visibility.
FAQ: GDPR and encryption
Q1. Is encryption mandatory under GDPR?
GDPR does not prescribe specific algorithms or mandate encryption in every case, but it explicitly lists encryption as an appropriate measure. For most modern services processing personal data, not encrypting at rest and in transit is difficult to justify.
Q2. Does encrypting data mean I don’t have to report breaches?
Not automatically. But if you can show that only strong ciphertext was exposed—using robust algorithms and key management, with no key compromise—regulators may treat the risk to individuals as low, which can change notification obligations.
Q3. What kind of encryption is considered strong enough for GDPR?
Regulators generally expect modern, standardised algorithms and correct implementation. Examples include AES-256-GCM for encryption and PBKDF2 with a high iteration count for key derivation, implemented with well-reviewed libraries or platform APIs like the Web Crypto API.
Q4. How does zero-knowledge, client-side encryption help with GDPR?
Zero-knowledge designs ensure the provider cannot decrypt stored data because encryption and key derivation happen on the client. That reduces insider and infrastructure risk and strengthens your position when explaining the impact of a compromise.
Q5. Can I mention Inkrypt as a control in my GDPR documentation?
Yes—if you use Inkrypt for specific workflows, you can document that notes are encrypted client-side with AES-256-GCM, keys are derived via PBKDF2 (310k iterations) in the browser, and the server stores only ciphertext and public parameters, with no ability to recover passwords or keys.
Where to go next
To understand the underlying crypto model:
- Read “Zero-knowledge encryption: what it actually means when we can't see your data”.
- Read “Why we encrypt in the browser (and what happens to your password)”.
If you want to add a zero-knowledge encrypted note layer to your GDPR controls, you can start using Inkrypt today at https://www.inkrypt.online and integrate it into your internal and customer-facing workflows.