A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://www.edpb.europa.eu/sme-data-protection-guide/secure-personal-data_en below:

Secure personal data | European Data Protection Board

The GDPR specifies that data controllers and data processors have to implement appropriate technical and organisational measures to ensure a level of security of personal data appropriate to the risk.

The following information sets out the basic precautions that should be considered by organisations processing personal data (i.e. data controllers and data processors). It does not aim to provide a full list of measures that can be implemented to protect personal data in all contexts. Data controllers and processors have to adapt these measures to the context (taking into account the state of the art, the context of the processing and the risk for individuals).

Read more Link Art. 32 GDPR

EUR-Lex

Security: what is at stake?

The consequences of a lack of security can be serious: companies can see their image degraded, lose the confidence of their consumers, have to pay large sums of money to recover from a security incident (for example following a data breach) or have their activity stopped. Secure personal data is in the interest of both individuals and the organisations processing the data.

In order to assess the risks generated by each processing operation, it is first advisable to identify the potential impact on the rights and freedoms of the individuals concerned. While organisations have to protect their data (personal or not) for their own interest, the following information focuses on the protection of individuals’ data.

Data security has three main components: to protect the integrity, availability and confidentiality of the data. Therefore, organisations should assess the risks for the following:

  1. unauthorised or accidental access to data - breach of confidentiality (e.g. identity theft following the disclosure of the pay slips of all employees of a company);
  2. unauthorised or accidental alteration of data - breach of integrity (e.g. falsely accusing a person of a wrongdoing or crime as a result of the modification of access logs);
  3. loss of data or loss of access to data - breach of availability (e.g. failure to detect a drug interaction due to the impossibility of accessing the patient's electronic record).

It is also advisable to identify the risk sources (i.e. who or what could be at the origin of each security incident?), taking into account internal and external human sources (e.g. IT administrator, user, external attacker, competitor), and internal or external non-human sources (e.g. water damage, hazardous materials, non-targeted computer virus).

This identification of the risk sources will allow you to identify the potential threats (i.e. what circumstances could allow a security incident to occur?) on supporting assets (e.g. hardware, software, communication channels, paper, etc.), which can be:

It is also advisable to:

The GDPR introduces the notion of a "data protection impact assessment (DPIA)", which is mandatory for any processing of personal data likely to result in high risk for individuals. A DPIA must contain the measures envisaged to address the identified risks, including safeguards, security measures and mechanisms to ensure the protection of personal data.

In practice

Organisational measures

Raising user awareness

It is essential to make employees or users handling personal data (data handlers) aware of the risks related to privacy, inform them of the measures taken to address the risks and the potential consequences in case of failure.

In practice

Raising user awareness can take the form of:

Another precaution is to document the operating procedures, keep them up to date and make them easily available to all data handlers concerned. In concrete terms, any personal data processing activity, whether it concerns administrative operations or the simple use of an application, should be explained in a clear language and adapted to each category of handler, in documents to which they can refer.

Set up an internal policy

The awareness of internal data handlers can take the form of a document, which should be binding and integrated into internal regulations. The internal policy should particularly include a description of data protection and safety rules.

Other organisational measures

Technical measures

Secure equipment

Confidence in the reliability of your information systems is a key issue, and implementation of appropriate security measures, which the GDPR has made mandatory, is one of the ways to provide this.

In particular, it is advisable to secure:

In practice

Protect the company's premises

Access to the premises must be controlled to prevent or slow down direct, unauthorised access to paper files or to computer equipment, particularly servers.

What to do

Under-dimensioning or neglecting the maintenance of the server room environment (air conditioning, UPS, etc.). A breakdown in these installations often results in the shutdown of the machines or the opening of access to the rooms (air circulation), which de facto neutralises the security measures.

To go further

It may be appropriate to keep a record of access to rooms or offices that hold material containing personal data that could have a serious negative impact on the individuals concerned. Inform data handlers of the implementation of such a system, after informing and consulting staff representatives.

Also, ensure that only properly authorised personnel are allowed in restricted areas. For example:

In practice

Authenticate users

To ensure that users access only the data they need, they should be given a unique identifier and should authenticate themselves before using the computer facilities.

Mechanisms to achieve person authentication are categorised according to whether they involve:

The choice of the mechanism depends on the context and different factors. A user's authentication is considered strong when it uses a combination of at least two of these categories.

In practice

Manage authorisations

Differentiated levels of authorisation profiles should be implemented according to needs. Users should only have access to data on the basis of the needs to know.

Good practice for authentication and management of authorisations:

What not to do

To go further

Establish, document, and regularly review any access control policy, as it relates to the treatments implemented by the organisation, that should include:

In practice

Pseudonymise data

Pseudonymisation is the processing of personal data in such a way that it is no longer possible to attribute the personal data to a specific natural person without the use of additional information. Such additional information has to be kept separately and be subject to technical and organisational measures.

In practice, pseudonymisation consists in replacing directly identifying data (name, first name, personal number, phone number, etc.) in a data set with indirectly identifying data (alias, sequential number, etc.). It makes it possible to process the data of individuals without being able to identify them in a direct way. However, it is possible to trace the identity of these individuals thanks to the additional data. As such, pseudonymised data is still personal data and is subject to the GDPR. Pseudonymisation is also reversible, unlike anonymisation.

Pseudonymisation is one of the measures recommended by the GDPR to limit the risks associated with the processing of personal data.

Read more Link Art. 32 GDPR

EUR-Lex

Encrypt data

Encryption is a process which consists of converting the information into a code in order to prevent unauthorised access. That information can only be read again by using the correct key. Encryption is used to guarantee the confidentiality of data. Encrypted data is still personal data. As such, encryption can be considered as one of the pseudonymisation techniques.

In addition, hash functions, can be used to ensure data integrity. Digital signatures, not only ensure integrity, they also make it possible to verify the origin of the information and its authenticity.

Anonymise data

    Personal data can be rendered anonymous in such a manner that the individual is not or no longer identifiable. Anonymisation is a process that consists in using a set of techniques to make personal data anonymous in such a way that it becomes impossible to identify the person by any means that are reasonably likely to be used.

    Anonymisation, when implemented properly, may enable you to use data in a way that respects the rights and freedoms of individuals. Indeed, anonymisation opens up the potential for the reuse of data that is initially not permitted due to the personal nature of the data, and can thus allow organisations to use data for additional purposes without interfering with the privacy of individuals. Anonymisation also makes it possible to keep data beyond the retention period.

    When the anonymisation is implemented properly, the GDPR no longer applies to the anonymised data. However, it is important to keep in mind that the anonymisation of personal data in practice is not always possible or easy to achieve. It has to be assessed whether the anonymisation can been applied to the data at issue and maintained successfully, considering the specific circumstances of the processing of the personal data. Additional legal or technical expertise would often be needed to successfully implement the anonymisation in compliance with the GDPR.

    How to verify the effectiveness of anonymisation?

    European data protection authorities define three criteria to ensure that a dataset is truly anonymous:

    1. Singling out: it should not be possible to isolate information about an individual in the dataset.
    1. Linkability: it should not be possible to link separate data pieces regarding the same individual.
    1. Inference: it should not be possible to deduce, with near certainty, information about an individual.

    In practice

    Read more Link Opinion 05/2014 on Anonymisation Techniques

    WP29

    Specific situations

    Security measures for teleworking

    In the context of teleworking, it is necessary to guarantee the security of the processed data while respecting the privacy of individuals.

    What to do:

    Security measures for BYOD (Bring your own device)

    With the development of BYOD, especially in SMEs, the boundary between professional and personal life is disappearing. Even if BYOD does not represent, in itself, a processing of personal data, it is still necessary to ensure data security.

    The acronym "BYOD" stands for "Bring Your Own Device" and refers to the use of personal computer equipment in a professional context. An example of this would be an employee who uses personal equipment such as a computer, tablet or smartphone to connect to the company network.

    The possibility of using personal tools is primarily a matter of employer choice and national legislation. The GDPR requires that the level of security of personal data processed be the same, regardless of the equipment used. Employers are responsible for the security of their company's personal data, including when it is stored on terminals over which they have no physical or legal control, but whose use they have authorised to access the company's IT resources.

    The risks against which it is essential to protect your organisation range from a one-off attack on the availability, integrity and confidentiality of data to a general compromise of the company's information system (intrusion, virus, etc.).

    Example checklist

    An example of what a checklist to improve the level of security in place in your organisation could look like:


    RetroSearch is an open source project built by @garambo | Open a GitHub Issue

    Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

    HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.3