Technical and organizational measures (TOM)
Confidentiality
- Physical Access Control: Protection against unauthorized entry to data processing facilities through chip keys and electronic door openers, locked doors and windows
- System Access Control: Protection against unauthorized system use through passwords (including corresponding policy), automatic lock mechanisms, two-factor authentication, encryption of storage media
- Data Access Control: No unauthorized reading, copying, modification, or removal within the system, e.g., standard authorization profiles on a “need-to-know” basis, a standard process for granting permissions, logging of access, and periodic review of granted permissions, especially for administrative user accounts
- Pseudonymization: Wherever feasible for a given data processing activity, primary identifiers in personal data are removed within the respective application and stored separately.
Integrity
- Transmission Control: No unauthorized reading, copying, modification, or removal during electronic transmission or transport through encryption
- Input Control: Identification of whether and by whom personal data was entered, modified, or deleted in data processing systems, through logging and document management
Availability and Resilience
- Availability Control: Protection against accidental or malicious destruction or loss through backup strategies, antivirus software, firewall, alert channels, and emergency plans; security checks at the infrastructure and application level, a multi-tier backup concept with encrypted off-site storage in an alternative data center, and standard processes for when staff change roles or leave the organization
- Rapid Recoverability
- Retention and Deletion Periods: Applicable both to the data itself and to metadata such as log files
Procedures for Regular Review, Assessment, and Evaluation
- Data protection management, including regular employee training
- Incident response management
- Privacy-friendly default settings
- Contract Control: No commissioned processing within the meaning of Art. 28 GDPR without corresponding instructions from the Controller, ensured by clear contractual arrangements, formalized contract management, rigorous selection of the Processor (ISO certification, ISMS), obligation to conduct due diligence in advance, and subsequent audits