Security of Processing (9) Flashcards

1
Q

What are the 4 attributes of security controls (per Article 32 1b)?

A
  1. Confidentiality (access on need to know basis)
  2. Integrity (ensure accurate and complete)
  3. Availability (accessible when needed)
  4. Resilience (withstand and recover from threats)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does GDPR require from controllers and processors regarding security?

A

Appropriate and technical measures to ensure a level of security appropriate to the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What factors should be taken into account in determining appropriate technical and organizational measures?

A

State of the art
Cost of implementation
Nature of data
Context in which processing is taking place
Scope of data
Purpose of processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are potential security-enhancing technologies?

A

encryption
antivirus and antispam
firewalls
identity and access management
incident detection
DLP
2-factor authentication
IP log management
regular security code peer review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two main activities of security technologies?

A

filtering electronic communications
monitoring use of IT and communication systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are mechanisms to protect the physical environment?

A

sophisticated entry control systems
CCTV
lock and key and clean desk policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Article 28 require regarding security in the controller-processor relationship?

A

provide sufficient guarantees of appropriate technical and organizational measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are sufficient guarantees?

A

assurance mechanisms (more than contracts) - appropriate checking and vetting of processors (certifications, validations, 3rd party assessments)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does a processor need to notify in a data breach?

A

Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who does a controller need to notify in a data breach?

A

Supervisory Authority (within 72 hours)

Data Subject (depends, rights and freedoms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the definition of a personal data breach?

A

a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure and access of personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the processor data breach notification duties under Article 33?

A

notify controller without undue delay from becoming aware of the breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the controller data breach notification duties under Article 33?

A

notify SA without undue delay within 72 hours after becoming aware
(delay permitted if reasoned justification, exempt if unlikely to result in risk to rights and freedoms)

notify data subject if high risk, without undue delay
(exemption: unintelligible data, high risk negated, and disproportionate to efforts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When does a controller become aware of a breach?

A

when the controller has reasonable degree of certainty that a security incident has occurred and has led to personal data being compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What 6 things does the controller need to notify to the SA for a data breach?

A

who (data subjects)
how many (data subject and records)
what types (categories of data)
contact (DPO)
likely consequences
follow-up (measures to be taken)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 focuses of the NIS Directive?

A

First cybersecurity law to cover entire EU

  1. compel development of national cybersecurity strategies
  2. cross border collaboration (enhance cooperation and best practices)
  3. improve security of essential services ie energy, water, transport and digital service providers
17
Q

Why was a fine issued to social media company in Germany regarding a data breach?

A

stored passwords in plain text, not compliant with state of the art for security

18
Q

What does Article 5 (security) establish?

A

personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage using appropriate technical or organizational measures

19
Q

What does Article 30 establish with regard to records of processing activities for controllers and processors?

A

controllers must maintain records of processing activities including a general description of technical and organizational security measures

processors must maintain records of processing activities carried out on behalf of controller

20
Q

What are the 3 domains of security covered by Article 32?

A
  1. preventative security
  2. incident detection and response
  3. remedial security (steps to improve)
21
Q

What is a data breach (according to Article 4-12)?

A

breach of security leading to an accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to personal data transmitted, stored or otherwise processed

22
Q

What is the trigger to notify in cases of a data breach?

A

controller becomes aware of the data breach

23
Q

How does WP29 define “awareness of a breach”?

A

when controller has a reasonable degree of certainty that a security incident has occurred that has led to personal data being compromised

24
Q

What are some factors outlined by WP29 to use in assessing whether a breach should be notified?

A
  1. type of breach
  2. nature, sensitive, volume of personal data
  3. ease of identifying individuals
  4. severity of consequences to individuals
  5. special characteristics of individuals
  6. special characteristics of controller
  7. number of individuals affected
25
Q

Are controllers required to maintain records of personal data breaches?

A

yes, per section 33 (5)

controller must make an entry in its records, no time limit on how long records should be kept

26
Q

Who performs the assessment of the risks to rights and freedoms in a data breach? (controller, processor or both)

A

the controller

processor only obligation is to report

27
Q

When are controllers required to inform data subjects of data breaches?

A

if breaches are likely to present high risks to the rights and freedoms of individuals

28
Q

What are the 3 exceptions laid out in Article 34 to the obligation for controllers to notify data subjects of a data breach?

A
  1. where measures have made personal data unintelligible (ie encryption)
  2. where controller has taken steps to prevent high risks from materializing
  3. where breach disclosure would involve disproportionate effort
29
Q

What should a controller do in cases where a breach disclosure would involve a disproportionate effort (such as unable to identify all individuals in dataset)?

A

“substitute notice” - broad public announcement, new release or website statement

30
Q

What are some examples of high-risk breaches that may require notification to data subjects?

A

cyberattacks affecting online services that result in data exfiltration

ransomware attacks that encrypt data that cannot be easily restored

hospital medical records being unavailable for 30 hours or more

direct marketing email to multiple individuals that disclosures email addresses to every recipient

31
Q

What are the requirements for controllers to engage data processors?

A

Controllers must:

1) choose reliable processors
2) maintain quality control and compliance throughout arrangement
3) frame relationship in a contract

32
Q

What are the security and incident notification requirements for operators of essential services under the NIS Directive?

A
  1. taking appropriate and proportionate technical and organization measures to manage risks
  2. taking appropriate measures to prevent and minimize impacts of incidents

3 notifying CSIRTs or regulators of incidents with significant impact

33
Q

What changes were introduced with the NIS 2 Directive?

A
  1. inclusion of new sectors in the scope of regulation
  2. more prescriptive risk management rules for covered entities
  3. EU to coordinate risk assessments of critical ICT services
  4. new system of ICT certifications
  5. new harmonized financial penalties