Chapter 10 (Security of Personal Data) Flashcards
Article 5(1)(f) of the GDPR establishes what principle?
The security principle.
Article 32 expands upon Article 5(1)(f) of the GDPR by setting out that the security principle requires what?
The taking of appropriate technical and organizational measures to ensure a level of security that is appropriate to the level of prevailing security risk.
Are Articles 5(1) and 32 of the GDPR focused on controllers or processors?
Article 5(1) is focused on the processing of personal data.
Article 32 is directed at both the controller and processor.
The accountability principe in Article 5(2), in conjunction with Article 24 places an obligation on whom to do what?
An obligation on controllers to demonstrate they are operating in a compliant fashion.
What Article of the GDPR places an obligation on processors to demonstrate they are operating in a compliant fashion?
Article 28(3)(h) of the GDPR.
What is the effect of Article 30 of the GDPR?
Requires controllers and processors to understand the full extent of their data processing operations.
Article 32 of the GDPR establishes what and whom does this obligation apply to?
It establishes the obligation to keep personal data secure, and it applies to both controllers and processors.
What are the 3 domains of security covered by Article 32 of the GDPR?
- Preventative security
- Incident detection and response
- Remedial security
What is preventative security?
The controller and processor should act so as to limit risks of insecurity.
What is incident detection and response?
When security breaches happen, the controller and processor need to detect possible security failures and respond appropriately. Breach notification falls within this domain.
What is remedial security?
In reaction to security risks and incidents, the controller and processor need to take steps to improve security.
What does the phrase appropriate and technical organizational measures refer to within the context of the GDPR?
Controls to protect against complex technological threats such as malware and denial-of-service (DoS) attacks and other criminal threats, as well as to guard against negligent employees. Controller and processors are required to implement these controls.
Under the GDPR, does a security breach automatically result in a violation of the law?
No- regulators can’t assume legal failure from operational failure.
Article 32 of the GDPR requires what type of approach to making decisions about security controls? What 2 articles of the GDPR reinforce that approach?
Article 32 requires a risk-based approach to assessing what are appropriate controls.
Articles 25 and 35 reinforce the requirements for risk assessments.
What are 3 aspects of Article 32’s risk assessments?
- Must reflect on the nature of the data that are to be processed and reasonably foreseeable threats that will exploit business process and technical systems vulnerabilities.
- Include a state-of-the-art test
- Must consider costs of controls
Describe the state-of-the-art test employed under Article 32’s risk assessment.
It has the effect of requiring controllers and processors to consider industry best practices, not just industry average practices.
What are 3 examples of the importance of the consensus of professional opinion in the realm of security?
- Encryption (adopted even before legally required because in a security sense it was the right thing to do)
- Requirements of “confidentiality, integrity, availability, and resilience” codified in Article 32(1)(b), (c), and (d).
- Article 32(3) which talks about the role that can be played by codes of conduct and certification mechanisms in proving compliance with the security principle.
Article 32(4) is concerned about what types of activities?
The activities of employees and other workers who act under the authority of the controller or processor. Essentially, a duty of confidence created by the work relationship.
Article 28 contains specific provisions for what rule of relationships?
The controller-processor relationship and the supply chain. It is concerned with the entirety of the relationship between the controller and processor and all the data protection principles, not just security.
What is the intention of Article 28(1) of the GDPR with regard to the security principle?
To flow down the security principle and security requirements into the processor’s organization and through the supply chain to sub-processors.
What device does Article 28 of the GDPR use to limit the controller’s use of processors?
Limits them to processors who can provide sufficient guarantees about the implementation of appropriate technical and organizational measures for compliance with the GDPR.
What are some methods controllers can uses to assess proof of processors’ competence in providing sufficient guarantees about implementing proper security controls?
- Inspections
- Third-party assessments
- Provision and validation of certificates
- Audits
How does Article 4(12) of the GDPR define a personal data breach?
As a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.