Data Protection Impact Assessment: Privacy by Design
EasyData’s approach to OCR and document processing: zero persistent data storage. Real-time processing in RAM makes our services inherently privacy-friendly.
Request DPIA Consultation
Executive Summary
EasyData processes personal data exclusively on behalf of clients through OCR and document processing. The distinguishing principle: we do not store client data. All processing happens in real-time without persistent storage of personal data, making our services inherently privacy-friendly and significantly minimizing risks. This approach aligns with our commitment to keeping client data safe at every step.
Description of the Processing
Purpose of the processing
EasyData B.V. offers OCR and document processing services to business clients and government organizations. The purpose is to digitize, recognize, extract and return structured data from documents in real-time. Our data capture technology handles everything from invoice processing to complex document classification.
Specific processing purposes:
- Real-time conversion of documents to searchable text
- Automatic extraction of data (invoice data, contract data, etc.)
- Classification and indexing of documents
- Validation and enrichment of extracted data via validation processes
- Direct return to client via APIs
Core Principle
All processing happens in RAM memory. Documents are received, processed, returned and immediately deleted from memory. There is no persistent storage of client documents or extracted personal data. Learn more about how we handle data safety in Europe.
Categories of personal data
Regular personal data
- Name, address, city details
- Contact information (phone, email)
- Date and place of birth
- National identification numbers (government clients only)
- Identification numbers
- Financial data
- Employment data
Special categories of personal data
(Limited, only if explicitly agreed)
- Medical data (when processing healthcare documents)
- Criminal record data (only for government clients with legal basis)
How we process documents
Secure Receipt
Document arrives via encrypted TLS 1.3 connection
RAM Processing
Document enters isolated RAM memory, never touches disk
OCR Analysis
OCR engine extracts structured data entirely in RAM
Secure Wiping
RAM overwritten and container destroyed immediately
Risk Identification and Analysis
Due to the absence of persistent data storage, all risks are limited to the short processing time (seconds to minutes). This makes our services inherently much safer than traditional processing services with data storage. Our ISO 27001 compliance framework provides the foundation for continuous risk management.
Unauthorized access during processing
During the short processing time, someone could gain unauthorized access to documents in RAM.
Data breach during transport
Interception of documents during transport to/from EasyData servers.
Incorrect extraction or classification
OCR errors lead to incorrect data extraction, potentially impacting decision-making.
Incomplete removal from RAM
Theoretical risk that data fragments remain in RAM after processing is complete.
Measures to Mitigate Risks
Technical measures
Transport & Encryption
- TLS 1.3 mandatory for all communication
- Certificate pinning for API connections
- No support for weak cipher suites
- End-to-end encryption option available
In-Memory Processing
- All processing in RAM (no disk writes)
- Swap/pagefile disabled
- Secure memory wiping after each transaction
- Container-based isolation
- Automatic container destruction
Access Control
- Multi-factor authentication (MFA) required
- Role-based access control (RBAC)
- Principle of least privilege
- Separated development, test and production environments
Monitoring & Logging
- Real-time monitoring of all systems
- Detailed audit logs (no document content)
- Alerting for abnormal behavior
- SIEM integration for security events
Infrastructure
- European datacenter locations
- ISO 27001-compliant hosting partners
- Redundant systems
- Automated security patching
- Regular penetration testing
Personnel & Organization
- Pre-employment screening
- Mandatory privacy & security training
- Annual awareness training
- Code of conduct for employees
- Data Protection Officer (DPO) appointed
Residual Risks
Conclusion on Residual Risks
After implementing all measures above, only minimal residual risks remain that are inherent to any form of IT services. All residual risks are very low to low and are accepted.
Prior consultation with Data Protection Authority: NOT NECESSARY
Residual risks in detail
- Zero-day vulnerabilities: Continuous monitoring and rapid patching minimize exposure time
- Advanced persistent threats (APT): Our no-storage principle significantly limits potential damage
- Natural disasters/calamities: Redundant infrastructure ensures continuity, no data lost
Rights of Data Subjects
Because EasyData does not store personal data, many rights of data subjects are practically not enforceable at EasyData. The responsibility lies with the client (data controller). Read more about our GDPR quick scan for organizations.
Right of access (Art. 15 GDPR)
EasyData has no stored data to access. Data subject must contact the client.
Right to erasure (Art. 17 GDPR)
Automatically implemented by design: data is immediately deleted. No action needed at EasyData.
Right to rectification (Art. 16 GDPR)
Not applicable at EasyData. Client can have corrected documents reprocessed.
Right to restriction (Art. 18 GDPR)
Client can stop processing by not submitting documents. EasyData stops immediately.
Specific Considerations
Special categories of personal data (Art. 9 GDPR)
EasyData only processes special categories of personal data if:
- Client has valid legal basis
- Additional processor agreement is concluded
- Extra security measures are implemented
- DPO has approved
Transfer outside EU
EasyData ensures:
- All processing within the EU
- No transfer to third countries
- Sub-processors are EU-based
- No remote access from outside EU
Automated decision-making
OCR and data extraction is automated, but:
- EasyData does not make decisions about data subjects
- Output is used for human assessment
- No profiling or automated individual decision-making
- Responsibility lies with client
Conclusion and Recommendations
General Conclusion
EasyData’s OCR and document processing services do not pose a high risk to the rights and freedoms of data subjects, provided all described measures are maintained.
The distinguishing no-storage principle is the most important risk mitigation:
- No persistent storage = no data breach of historical data possible
- Limited exposure time (seconds/minutes) = minimal risk window
- Transient processing = privacy by design
- Full GDPR compliance = trust from clients and data subjects
Recommendations
- Maintain the no-storage principle as core value of EasyData
- Actively communicate this distinguishing feature to (potential) clients
- Continue investing in security awareness for employees
- Renew this DPIA annually or upon significant changes
- Continue the ISO 27001 certification trajectory and consider NIS2 compliance for healthcare
Frequently Asked Questions about EasyData’s DPIA
What makes EasyData’s no-storage principle so unique?
Unlike traditional document processing services, EasyData does not store client documents or personal data. All processing happens in real-time in RAM memory and data is immediately deleted after delivery to the client. This eliminates the biggest privacy risk: large-scale data breaches of historical data.
Is a DPIA legally required for OCR services?
A DPIA is required when there is a high risk to the rights and freedoms of natural persons (Article 35 GDPR). For traditional OCR services with data storage, this may be the case. However, due to our no-storage principle, the risk is low, but we have still prepared a DPIA to ensure maximum transparency and compliance.
How does EasyData ensure that data is truly deleted from RAM?
We use secure memory wiping technology and container-based isolation. Each processing job runs in an isolated container that is automatically destroyed after completion. Swap/pagefile is disabled on all processing servers to prevent RAM contents from being written to disk. Regular security audits and penetration tests verify these measures. Read more about our CIS hardening approach.
What happens in case of a data breach during processing time?
Due to the short processing time (seconds to minutes), exposure during an incident is minimal. EasyData informs the client within 24 hours of a (potential) data breach. Since no historical data is stored, the scope of a breach is inherently limited to documents being processed at that moment, with no snowball effect possible.
How do data subjects exercise their GDPR rights at EasyData?
Because we do not store personal data, most GDPR rights are automatically implemented (for example: right to erasure). For other rights (such as access), data subjects must contact the client (data controller), not EasyData. The client has full control over which documents are submitted for processing. See also our GDPR quick scan for organizations.
Is EasyData suitable for processing special categories of personal data?
Yes, EasyData can process special categories of personal data (medical, criminal) if the client has a valid legal basis according to Article 9(2) GDPR. We then conclude an additional processor agreement with extra safeguards and implement additional security measures. This only happens after approval from our Data Protection Officer (DPO). Learn more about our responsible approach to AI.
Interested in GDPR-compliant document processing?
Our no-storage principle combines maximum privacy protection with high-quality OCR results. This DPIA demonstrates that we do not pose a high risk to data subjects. Organizations across Europe trust our privacy-by-design approach.
