Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking and Finance Review - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > How consumers are getting back control of their personal data
    Business

    How consumers are getting back control of their personal data

    Published by Gbaf News

    Posted on May 12, 2018

    8 min read

    Last updated: January 21, 2026

    An illustration depicting API security in financial services, highlighting its importance in maintaining customer trust amidst rapid digital innovation. This image emphasizes the critical role of secure APIs in the evolving landscape of open banking.
    API security measures in financial services - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Jordi Gascón, EMEA Security Expert at CA Technologies 2018 is turning into a momentous year of regulatory change, with the introduction of PSD2 and GDPR. These regulations, backed by the European Union, are already having a profound impact on organisations’ processes and information systems, and will present a number of organisational and technological challenges on the journey to compliance.

    But what is the motivation for these regulations that, at first, might even seem contradictory?

    The European Union’s aim for PSD2 is “to improve the existing rules in the EU for electronic payments. It takes into account new and innovative payment services, such as internet and mobile payments.”

    Meanwhile, GDPR “lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.”

    So while on one hand, PSD2 requires banks to open their systems and share their customer data with third parties that can offer innovative payment services, on the other hand, GDPR introduces new restrictions on the use of personal data of those same clients.

    Although this seems contradictory, in practice it is not. Access to personal data will depend on three key factors: trust, context and consent. Control will ultimately always be in the hands of the consumer / citizen, who will decide what data they want to share and with whom.

    For example, if I have to be away from home for a few hours, I may need to find someone to take care of my children. Who I ask for help will depend on several factors, but above all my decision will boil down to who I feel I can trust. And there will be different degrees of confidence: from the direct family, which is usually maximum confidence, to day care services. In the latter case, trust usually comes from the recommendations of those I trust the most, like family members, neighbours and friends.

    Or take another example: the fact that a mobile application traces my location and sends information about my exact position, as a citizen, may seem beneficial to me in one case, but harmful in another, depending on the context. If I suffer a fall during a field trip and the application is able to send my coordinates to medical emergencies to send me help, it will be clearly beneficial.

    These examples show that sharing personal data is neither bad nor good. Everything depends on a third factor: to do it with the right legal ground for processing, which in many occasions would be based on consent.

    The GDPR regulation clearly describes in different articles (Recital 32, 42, 43 and articles 6, 7 and 8) that a person’s consent for the processing of personal data must be explicit and informed and specify how it should be collected.

    Clearly these regulations are not contradictory, rather they complement each other and return to citizens the control of access to their personal data.

    Trust, context and consent in the digital environment 

    The growing dependence on technology highlights the importance of properly managing the “digital identities” of consumers, especially with the new requirements to share information between different actors.

    While these regulations seek to put the consumer in the centre, the nature of computer systems puts transactions at the heart. Therefore, to comply with these regulations, companies must adapt their processes and systems, and adopt an identity centric security model.

    Technology can enable this shift. Identity management security solutions, advanced authentication based on context and risk, security and monitoring of programming interfaces used for data exchange (APIs), are just a few of the technologies that will support IT teams in ensuring that regulations are applied and implemented in the right way.

    Deploying identity governance solutions will help businesses understand who can access what information and ensure that it is only available to the appropriate users. The control of privileged users will make it impossible for administrators or users with higher levels of access to the systems to abuse their access rights. Advanced authentication solutions will also help protect users by ensuring that, once their identity has been reliably proven, they can exercise their rights set in line these regulations and directives.

    Identity management solutions will prove crucial in enabling organisations to give a full response to the technological challenges they must solve to comply with GDPR and PSD2.

    Jordi Gascón, EMEA Security Expert at CA Technologies 2018 is turning into a momentous year of regulatory change, with the introduction of PSD2 and GDPR. These regulations, backed by the European Union, are already having a profound impact on organisations’ processes and information systems, and will present a number of organisational and technological challenges on the journey to compliance.

    But what is the motivation for these regulations that, at first, might even seem contradictory?

    The European Union’s aim for PSD2 is “to improve the existing rules in the EU for electronic payments. It takes into account new and innovative payment services, such as internet and mobile payments.”

    Meanwhile, GDPR “lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.”

    So while on one hand, PSD2 requires banks to open their systems and share their customer data with third parties that can offer innovative payment services, on the other hand, GDPR introduces new restrictions on the use of personal data of those same clients.

    Although this seems contradictory, in practice it is not. Access to personal data will depend on three key factors: trust, context and consent. Control will ultimately always be in the hands of the consumer / citizen, who will decide what data they want to share and with whom.

    For example, if I have to be away from home for a few hours, I may need to find someone to take care of my children. Who I ask for help will depend on several factors, but above all my decision will boil down to who I feel I can trust. And there will be different degrees of confidence: from the direct family, which is usually maximum confidence, to day care services. In the latter case, trust usually comes from the recommendations of those I trust the most, like family members, neighbours and friends.

    Or take another example: the fact that a mobile application traces my location and sends information about my exact position, as a citizen, may seem beneficial to me in one case, but harmful in another, depending on the context. If I suffer a fall during a field trip and the application is able to send my coordinates to medical emergencies to send me help, it will be clearly beneficial.

    These examples show that sharing personal data is neither bad nor good. Everything depends on a third factor: to do it with the right legal ground for processing, which in many occasions would be based on consent.

    The GDPR regulation clearly describes in different articles (Recital 32, 42, 43 and articles 6, 7 and 8) that a person’s consent for the processing of personal data must be explicit and informed and specify how it should be collected.

    Clearly these regulations are not contradictory, rather they complement each other and return to citizens the control of access to their personal data.

    Trust, context and consent in the digital environment 

    The growing dependence on technology highlights the importance of properly managing the “digital identities” of consumers, especially with the new requirements to share information between different actors.

    While these regulations seek to put the consumer in the centre, the nature of computer systems puts transactions at the heart. Therefore, to comply with these regulations, companies must adapt their processes and systems, and adopt an identity centric security model.

    Technology can enable this shift. Identity management security solutions, advanced authentication based on context and risk, security and monitoring of programming interfaces used for data exchange (APIs), are just a few of the technologies that will support IT teams in ensuring that regulations are applied and implemented in the right way.

    Deploying identity governance solutions will help businesses understand who can access what information and ensure that it is only available to the appropriate users. The control of privileged users will make it impossible for administrators or users with higher levels of access to the systems to abuse their access rights. Advanced authentication solutions will also help protect users by ensuring that, once their identity has been reliably proven, they can exercise their rights set in line these regulations and directives.

    Identity management solutions will prove crucial in enabling organisations to give a full response to the technological challenges they must solve to comply with GDPR and PSD2.

    More from Business

    Explore more articles in the Business category

    Image for How Commercial Lending Software Platforms Are Structured and Utilized
    How Commercial Lending Software Platforms Are Structured and Utilized
    Image for Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Image for Why More Mortgage Brokers Are Choosing to Join a Network
    Why More Mortgage Brokers Are Choosing to Join a Network
    Image for From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    Image for From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    Image for Global Rankings Revealed: Top PMO Certifications Worldwide
    Global Rankings Revealed: Top PMO Certifications Worldwide
    Image for World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    Image for Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Image for The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    Image for Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Image for Using Modern Team Management Methods to Improve Collaboration in Hybrid Work Models
    Using Modern Team Management Methods to Improve Collaboration in Hybrid Work Models
    Image for Why Email Deliverability is a Business Risk Your Company Can’t Afford to Ignore
    Why Email Deliverability is a Business Risk Your Company Can’t Afford to Ignore
    View All Business Posts
    Previous Business PostTop 5 Unified Communications Trends
    Next Business PostNew poll shows 61% of small businesses want legislation around late payments