IT secu­ri­ty in prac­ti­ce: infu­sing life into Artic­le 32 of the GDPR

Artic­le 32 of the GDPR requi­res con­trol­lers to ensu­re an appro­pria­te level of secu­ri­ty by imple­men­ting tech­ni­cal and orga­niza­tio­nal mea­su­res con­sis­tent with the sta­te of the art. If the­se mea­su­res pro­ve ina­de­qua­te and a data breach occurs, the con­trol­ler may face dama­ge claims from data sub­jects in addi­ti­on to hea­vy fines. Ensu­ring an appro­pria­te level of IT secu­ri­ty is the­r­e­fo­re of utmost importance for companies.

But the GDPR does not name any spe­ci­fic mea­su­res: it mere­ly cites some abs­tract examp­les of ways to pro­tect data, such as the use of encryp­ti­on. As a result, tech­ni­cal stan­dards such as the IT Base­line Pro­tec­tion (Grund­schutz) Com­pen­di­um  in con­junc­tion with fur­ther recom­men­da­ti­ons from the Fede­ral Office for Infor­ma­ti­on Secu­ri­ty (BSI) or ISO 27001 are used in prac­ti­ce to sup­ple­ment Artic­le 32 of the GDPR. While it is true in prin­ci­ple that the GDPR is Euro­pean law and that Artic­le 32 of the GDPR must be inter­pre­ted inde­pendent­ly of out­side sources, the law may be sup­ple­men­ted by gene­ral stan­dards of IT secu­ri­ty, as is the case for indus­try stan­dards such as TISAX for the auto­mo­ti­ve indus­try and the Cyber­se­cu­ri­ty Requi­re­ments for Con­nec­ted Medi­cal Devices in the health care sector.

Data pro­tec­tion aut­ho­ri­ties have also begun to address this issue in grea­ter detail recent­ly. As examp­les, we can cite the “Gui­dance for Con­trol­lers on Data Secu­ri­ty” from the Irish data pro­tec­tion aut­ho­ri­ty and the “Notes on the Hand­ling of Pass­words” from the Data Pro­tec­tion Com­mis­si­on for the Sta­te of Baden-Württemberg, which was published at the start of 2019.  While the con­tent of both of the­se docu­ments lar­ge­ly reflects the requi­re­ments which are defi­ned in exis­ting tech­ni­cal stan­dards, they pro­vi­de a bet­ter over­view and are more acces­si­ble. This fea­ture should be espe­ci­al­ly attrac­ti­ve for com­pa­nies wit­hout a dedi­ca­ted IT secu­ri­ty depart­ment. The­se docu­ments also show that con­trol­lers can act in accordance with exis­ting tech­ni­cal stan­dards wit­hout run­ning the risk of coming into con­flict with the requi­re­ments of data pro­tec­tion law.

Accor­din­gly, the chall­enge for con­trol­lers is less the avai­la­bi­li­ty of appro­pria­te gui­de­lines than the ques­ti­on of which level of secu­ri­ty is requi­red in each indi­vi­du­al case. It should be kept in mind in this regard that IT secu­ri­ty requi­re­ments are deri­ved not only from the GDPR but from a who­le cata­lo­gue of other sta­tu­tes (e.g. the Tax Code in con­junc­tion with the Gene­ral­ly Accept­ed Prin­ci­ples for Kee­ping and Pre­ser­ving Accounts, Records and Docu­ments in Elec­tro­nic Form, as well as Data Access (GoBD)). As a result, IT secu­ri­ty should not be unders­tood as a purely tech­ni­cal ques­ti­on, but rather as one which requi­res spe­cia­li­zed legal expertise.

back

Stay up-to-date

We use your email address exclusively for sending our newsletter. You have the right to revoke your consent at any time with effect for the future. For further information, please refer to our privacy policy.