Privacy · · 4 min read

What is Personal Data

In this article, I want to break down what Personal Data is, the types of, considerations and how to best protect yourselves, as individuals from preventing this getting into the wrong hands.

What is it?

Personal data, as per GDPR (UK, EU) is defined as information relating to an Identified or Identifiable natural person (the "data subject"). What does this mean?

Any data held about an individual that can be directly or indirectly identify to them, as a person. This can include pseudonymous data, which is data that has been processed in such a way that it can no longer be attributed to an individual without the use of additional resources/ information.

Pseudonymised data is still personal data under GDPR because re-identification is possible, even if unlikely. This is strictly different compared to anonymised data, where an individual cannot be identified by the data or information collected.

💡
Pseudonymous data: The identifiers (like names, ID numbers, IPs) are replaced with pseudonyms (like hashes or unique codes), but the data can still be re-linked to an individual if you have access to additional information (like a key or mapping table).

The Types of Personal Data

Where This Matters

There are 2 primary cases where personal data matters.

  1. You as a consumer.
  2. You as an employee, working with other businesses/ organisations.
💡
While GDPR does not distinguish between consumer and B2B personal data in the law, the context of processing plays a big role in how obligations are interpreted.

Personal Data in the Consumer Context

First off, let's give some examples;

GDPR Considerations with Personal Data in the Consumer Space

Sharing of Personal Data in the Consumer Space

Personal Data in the Business (B2B) Context

Again, let's run through some examples;

GDPR Considerations with Personal Data in the Business Space

Sharing of Personal Data in the Business Space

Sharing B2B contact details with relevant third parties (e.g. subcontractors, SaaS providers) is permitted, but must follow GDPR guidelines/ principles:

Consent is not typically required for business-related communication (e.g. sales follow-ups, account management), but opt-outs must be respected.

Personal Data going AWOL

There was a recent data breach within Coinbase, which is America's largest cryptocurrency exchange. This breach detailed information such;

One of the big ones in that list is Identification images. Cryptocurrency exchanges such as Coinbase need to adhere to certain laws and regulations surrounding individuals accounts, typically around KYC checks.

A KYC check is where you provide your identification images, such as passports or driver's licence, and it is then Coinbase's responsibility to mitigate risk and minimise any form of data loss when and if a breach occurs. Sadly, in the event of a breach and access to this data is obtained, you could face;

In this instance, investigations are continuing, so no further comment can be made.

Prevent your Data getting into the Wrong Hands

While regulations like GDPR offer strong protections, the best defense starts with being selective about what data you share and who you share it with. Before handing over your personal details, especially identification documents, payment info, or addresses, take a moment to verify the legitimacy and reputation of the company or service. Look for signs like;

If something feels off or too invasive, trust your instincts and walk away.

Where possible, use alternative services that prioritize privacy. For example, consider using email aliases (e.g. through services like SimpleLogin or ProtonMail), payment intermediaries like Apple Pay or PayPal, or search engines and browsers that don’t track you, such as DuckDuckGo or Firefox with privacy extensions. Many companies offer guest checkout options, use them to avoid creating accounts unnecessarily.

A few tips to help you stay in control:

Staying informed and cautious won’t eliminate all risks, but it significantly reduces the chance of your data falling into the wrong hands.

Read next