Processing Security
Processing security covers the technical and organisational measures you must implement to protect personal data against unauthorised access, loss and destruction. GDPR Article 32 requires a level of security appropriate to the risk.
Back to Dictionary- Dictionary
- Processing Security
Table of Contents
What is processing security?
Processing security is the complete set of security measures that protect personal data during processing. It is about ensuring that data is not accessed by unauthorised parties, is not lost, is not altered unintentionally and is not destroyed.
GDPR Article 32 requires that both data controllers and data processors implement appropriate measures. What is "appropriate" depends on a specific risk assessment, where you take into account the current technology, implementation costs, the nature of the processing and the potential consequence for data subjects.
Processing security is not a one-off task. You must continuously evaluate and update your measures as the threat landscape and your organisation change.
Requirements in GDPR Article 32
Article 32 mentions four specific measures that may form part of processing security:
- Pseudonymisation and encryption of personal data
- Confidentiality, integrity, availability and resilience in processing systems
- Timely restoration of access to personal data following a physical or technical incident
- Regular testing and evaluation of the effectiveness of security measures
The list is not exhaustive. You must assess what is necessary based on your specific situation. If you process sensitive personal data on a large scale, the requirements are higher than for simple contact registration.
Inadequate processing security can lead to fines and orders from the Danish Data Protection Agency.
Technical and organisational measures
The technical and organisational measures (TOMs) are at the core of processing security. They are typically divided into two categories:
Technical measures include:
- Encryption of data in transit and at rest
- Access control with role-based permissions
- Logging of access to and changes in systems
- Firewalls, antivirus software and security updates
- Backup and disaster recovery
Organisational measures include:
- Security policies and guidelines
- Training and awareness programmes for staff
- Procedures for handling data breaches
- Requirements for suppliers via data processing agreements
- Regular audits and controls
Risk assessment in practice
The starting point for processing security is always a risk assessment. You must assess the likelihood of and consequence of security incidents for data subjects.
Start by mapping your processing activities in your record of processing activities. For each activity, assess:
- What types of personal data are processed (ordinary vs. sensitive)?
- How many data subjects are affected?
- What are the potential consequences of a breach?
- What threats are realistic (hacking, human error, system failure)?
Where there is high risk, a data protection impact assessment (DPIA) may be required. Your DPO can help assess when this is necessary.
Document your risk assessment and the chosen measures. This is essential for demonstrating compliance during supervisory inspections.
Frequently Asked Questions about Processing Security
What does GDPR Article 32 require regarding processing security?
Article 32 requires that data controllers and data processors implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk. This includes pseudonymisation, encryption, the ability to ensure confidentiality, integrity and availability, and regular testing of security measures.
Who is responsible for processing security?
Both the data controller and the data processor have an independent responsibility for processing security. The data controller must ensure that the data processor provides sufficient guarantees for appropriate security measures, and this must be set out in the data processing agreement.
What are appropriate security measures?
There is no fixed list. You must assess the appropriate level based on current technological developments, implementation costs, the nature, scope and purpose of the processing, and the risk to data subjects' rights. The more sensitive the data, the stronger the measures required.
Must you document your processing security?
Yes. You must be able to document that you have assessed the risk and implemented appropriate measures. The documentation should be included in your record of processing activities and may be requested during inspections by the Data Protection Agency.
Related Terms
Technical and Organisational Measures
The security safeguards an organisation implements to protect personal data under GDPR Article 32, encompassing both technology-based and process-based measures.
gdprData Breach
A data breach is a security incident that leads to unauthorised access to, loss of or alteration of personal data, requiring notification within 72 hours.
iso_27001ISMS
An Information Security Management System (ISMS) is a systematic framework of policies, processes and controls for managing information security. The core requirement of ISO 27001.
Related Articles
Info
.legal A/S
hello@dotlegal.com
+45 7027 0127
VAT-no: DK40888888
Support
support@dotlegal.com
+45 7027 0127
Need help?
Let me help you get started
+45 7027 0127 and I'll get you started
.legal is not a law firm and is therefore not under the supervision of the Bar Council.