Art. 3 Technical and organisational measures
1 In order to guarantee confidentiality, the controller and the processor must take appropriate measures to ensure that: - a.
- authorised persons only have access to those personal data that they require to fulfil their tasks (data access control);
- b.
- only authorised persons have access to the premises and facilities in which personal data are processed (premises and facilities access control);
- c.
- unauthorised persons are unable to use automated data processing systems by means of data transmission devices (user control).
2 In order to guarantee availability and integrity, the controller and the processor must take appropriate measures to ensure that: - a.
- unauthorised persons are unable to read, copy, alter, move, delete or destroy data carriers (data carrier control);
- b.
- unauthorised persons are unable to save, read, alter, delete or destroy stored personal data (storage control);
- c.
- unauthorised persons are unable to read, copy, alter, delete or destroy personal data in the event of the disclosure of personal data or when data carriers are being transported (transport control);
- d.
- the availability of personal data and access to them can be rapidly restored in the event of a physical or technical incident (restoration);
- e.
- all functions of the automated data processing system are available (availability), malfunctions are reported (reliability) and stored personal data cannot be damaged by system malfunctions (data integrity);
- f.
- operating systems and application software always meet the latest security standards and known critical vulnerabilities are resolved (system security).
3 In order to guarantee traceability, the controller and the processor must take appropriate measures to ensure that: - a.
- it can be verified what personal data were entered or altered in the automated data processing system at what time and by which person (entry control);
- b.
- it can be verified to whom personal data are disclosed with the aid of data transmission devices (disclosure control);
- c.
- breaches of data security are recognised rapidly (recognition) and measures are taken to mitigate or eliminate the consequences (elimination).
|