When GÉANT, as Data controller (DC), engage another organization as Data processor (DP) to process personal data on behalf of GÉANT, requirements defined in Article 28. of GDPR should be met and appropriate Data processing agreement (DPA) should be signed between GÉANT and DP.
Main part of DPA contains legal framework based on GDPR requirements which is common for all services. Regarding security of processing the following general security measures are defined:
More specific security measures are defined in Annex 3.
Contains contact information of DC's and DP's Data Protection Officers (DPO).
Contains list of all personal data which will be processed and categories of Data subjects involved.
Besides general security measures defined in main part of DPA, specific security measures which should be applied by DP in order to ensure protection of personal data can be defined. When properly implemented they can provide assurance that DP can provide adequate protection of rights of data subjects. These security measures are service specific and depends on architecture, scope and other factors and those are chosen based on risk assessment. Here is list of some types of security measures which can be used as reminder. Chosen measures should be elaborated in more details as appropriate.
Aim of applying security measures is to ensure Confidentiality, Integrity and Availability (CIA) of personal data. The following table shows in more details which principle of CIA is improved by each class of security measures. Also, it shows applicability of each security measure to different parts of data processor: organizational, system administration, network administration and application development. Which security measures and to which extend will be implemented is usually based on risk assessment.
C | I | A | Class of security measures | Security measure | Organization | System admin. | Network admin. | Applications development |
---|---|---|---|---|---|---|---|---|
security policy | appropriate security policy | |||||||
personnel | trained in (personal) data security | |||||||
signed AUP or Statement of Confidentiality for (personal) data | ||||||||
access management | strong password or 2 factor authentication | |||||||
logging of data modification | ||||||||
access protection | firewall, ACL, … | |||||||
stored data protection | pseudonymisation | |||||||
anonymisation | ||||||||
database encryption | ||||||||
hard disk and removable media encryption | ||||||||
other forms of data encryption | ||||||||
data transfer protection | secure transport (IPsec, VPN, wireless, …) | |||||||
remote system access (TLS, RDP, SSH, …) | ||||||||
remote application access (TLS, SSH, …) | ||||||||
vulnerability management | timely patching | |||||||
regular vulnerability scanning of applications or systems | ||||||||
regular penetration testing of applications and systems | ||||||||
malware protection | end-station malware protection | |||||||
email malware protection | ||||||||
education of personnel | ||||||||
data leak protection | IDS | |||||||
continuous monitoring | ||||||||
removable media policy | ||||||||
personnel education | ||||||||
regular backups | backup policy | |||||||
stored on safe place | ||||||||
encrypted | ||||||||
restore regularly checked | ||||||||
incident management | incident response procedure | |||||||
timely reporting all incident to data controller | ||||||||
(D)DOS protection | on network, system or application level |
Description of personal data transfers outside EU during processing.
Process of drafting, approving and signing of DPA is shown on the following figure.
There are several roles involved in this process and each of them perform the following activities: