Article 32
Security of processing
(25) Whereas the principles of protection must be reflected, on the one hand, in the obligations imposed on persons, public authorities, enterprises, agencies or other bodies responsible for processing, in particular regarding data quality, technical security, notification to the supervisory authority, and the circumstances under which processing can be carried out, and, on the other hand, in the right conferred on individuals, the data on whom are the subject of processing, to be informed that processing is taking place, to consult the data, to request corrections and even to object to processing in certain circumstances;
(37) Whereas the processing of personal data for purposes of journalism or for purposes of literary of artistic ex
(46) Whereas the protection of the rights and freedoms of data subjects with regard to the processing of personal data requires that appropriate technical and organizational measures be taken, both at the time of the design of the processing system and at the time of the processing itself, particularly in order to maintain security and thereby to prevent any unauthorized processing; whereas it is incumbent on the Member States to ensure that controllers comply with these measures; whereas these measures must ensure an appropriate level of security, taking into account the state of the art and the costs of their implementation in relation to the risks inherent in the processing and the nature of the data to be protected;
Regulation
Art. 32 1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: a) the pseudonymisation and encryption of personal data; b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing. 2. In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed. 3. Adherence to an approved code of conduct as referred to in Article 40 or an approved certification mechanism as referred to in Article 42 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article. 4. The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law. |
Directive
Art. 17 1. Member States shall provide that the controller must implement appropriate technical and organizational measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. Having regard to the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected. 2. The Member States shall provide that the controller must, where processing is carried out on his behalf, choose a processor providing sufficient guarantees in respect of the technical security measures and organizational measures governing the processing to be carried out, and must ensure compliance with those measures. 3. The carrying out of processing by way of a processor must be governed by a contract or legal act binding the processor to the controller and stipulating in particular that: - the processor shall act only on instructions from the controller, - the obligations set out in paragraph 1, as defined by the law of the Member State in which the processor is established, shall also be incumbent on the processor. 4. For the purposes of keeping proof, the parts of the contract or the legal act relating to data protection and the requirements relating to the measures referred to in paragraph 1 shall be in writing or in another equivalent form. |
Poland
In force until May 25, 2018: The Act on Personal Data Protection Art. 36 1. The controller shall be obliged to implement technical and organisational measures to protect the personal data being processed, appropriate to the risks and category of data being protected, and in particular to protect data against their unauthorised disclosure, takeover by an unauthorised person, processing with the violation of the Act, any change, loss, damage or destruction. 2. The controller shall keep the documentation describing the way of data processing and measures referred to in paragraph 1.
Art. 37 Exclusively persons who were granted an authorization by the controller shall be allowed to carry out the processing of data.
Art. 38 The controller shall be obliged to ensure supervision over the following: which data, when and by whom have been entered into the filing system and to whom they are transferred.
Art. 39 1. The controller shall keep the register of persons authorized to carry out the processing of data, which should contain the following: 1) full name of the authorized person, 2) date of granting and expiring, as well as the scope of an authorization to access personal data, 3) identifier, in case where data are processed in a computer system, 2. The persons authorized to carry out the processing of data shall be obliged to keep these personal data and the ways of their protection confidential. |
Austria
In force until May 25, 2018: Data Security Measures § 14 DSG 2000 (1) Measures to ensure data security shall be taken by all organisational units of a controller or processor that use data. Depending on the kind of data used as well as the extent and purpose of the use and considering the state of technical possibilities and economic justifiability it shall be ensured that the data are protected against accidental or intentional destruction or loss, that they are properly used and are not accessible to unauthorized persons. (2) In particular, the following measures are to be taken insofar as this is necessary with regard to the last sentence of para. 1: 1. The distribution of functions between the organisational units as well as the operatives regarding the use of data shall be laid down expressly, 2. The use of data must be tied to valid orders of the authorized organisational units or operatives, 3. every operative is to be instructed about his duties according to this federal law and the internal data protection regulations, including data security regulations, 4. The right of access to the premises of the data controller or processor is to be regulated, 5. The right of access to data and programs is to be regulated as well as the protection of storage media against access and use by unauthorised persons, 6. The right to operate the data processing equipment is to be laid down and every device is to be secured against unauthorized operation by taking precautions for the machines and programs used, 7. Logs shall be kept in order that the processing steps that were actually performed, in particular modifications, consultations and transmissions can be traced to the extent necessary with regard to their permissibility, 8. A documentation shall be kept on the measures taken pursuant to sub-paras. 1 to 7 to facilitate control and conservation of evidence. These measures must, taking into account the technological state of the art and the cost incurred in their execution, safeguard a level of data protection appropriate with regard to the risks arising from the use and the type of data to be protected. (3) Unregistered transmissions from data applications subject to an obligation to grant information pursuant to § 26 shall be logged in such a manner that the right of information can be granted to the subject pursuant to § 26. Transmissions provided for in the standard ordinance (§ 17 para. 2 lit. 6) and the model ordinance (§ 19 para. 2) do not require logging. (4) Logs and documentation data may not be used for purposes that are incompatible with the purpose of the collection – viz., monitoring the legitimacy of the use of the logged and documented data files. In particular, any further use for the purpose of supervising the data subjects whose data is contained in the logged data files, as well as for the purpose of monitoring the persons who have accessed the logged data files, or for any purpose other than checking access rights shall be considered incompatible, unless the data is used is for the purpose of preventing or prosecuting a crime according to § 278a StGB (criminal organisation) or a crime punishable with a maximum sentence of more than five years imprisonment. (5) Unless expressly provided for otherwise by law, logs and documentation data shall be kept for three years. Deviations from this rule shall be permitted to the same extent that the logged or documented data files may legitimately be erased earlier or kept longer. (6) Data security regulations are to be issued and kept available in such a manner that the operatives can inform themselves about the regulations to which they are subject at any time. |