Security of Processing (9) Flashcards
What are the 4 attributes of security controls (per Article 32 1b)?
- Confidentiality (access on need to know basis)
- Integrity (ensure accurate and complete)
- Availability (accessible when needed)
- Resilience (withstand and recover from threats)
What does GDPR require from controllers and processors regarding security?
Appropriate and technical measures to ensure a level of security appropriate to the risk
What factors should be taken into account in determining appropriate technical and organizational measures?
State of the art
Cost of implementation
Nature of data
Context in which processing is taking place
Scope of data
Purpose of processing
What are potential security-enhancing technologies?
encryption
antivirus and antispam
firewalls
identity and access management
incident detection
DLP
2-factor authentication
IP log management
regular security code peer review
What are the two main activities of security technologies?
filtering electronic communications
monitoring use of IT and communication systems
What are mechanisms to protect the physical environment?
sophisticated entry control systems
CCTV
lock and key and clean desk policies
What does Article 28 require regarding security in the controller-processor relationship?
provide sufficient guarantees of appropriate technical and organizational measures
What are sufficient guarantees?
assurance mechanisms (more than contracts) - appropriate checking and vetting of processors (certifications, validations, 3rd party assessments)
Who does a processor need to notify in a data breach?
Controller
Who does a controller need to notify in a data breach?
Supervisory Authority (within 72 hours)
Data Subject (depends, rights and freedoms)
What is the definition of a personal data breach?
a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure and access of personal data
What are the processor data breach notification duties under Article 33?
notify controller without undue delay from becoming aware of the breach
What are the controller data breach notification duties under Article 33?
notify SA without undue delay within 72 hours after becoming aware
(delay permitted if reasoned justification, exempt if unlikely to result in risk to rights and freedoms)
notify data subject if high risk, without undue delay
(exemption: unintelligible data, high risk negated, and disproportionate to efforts)
When does a controller become aware of a breach?
when the controller has reasonable degree of certainty that a security incident has occurred and has led to personal data being compromised
What 6 things does the controller need to notify to the SA for a data breach?
who (data subjects)
how many (data subject and records)
what types (categories of data)
contact (DPO)
likely consequences
follow-up (measures to be taken)