Key References:

  • Art. 5(1)(f)
  • Art. 32

Art. 5

1. Personal data shall be:

(f) processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’);

Art. 32

  • Art. 32 elaborates on the Art. 5(1)(f) and lays down specific obligations on controllers and processors.
  • “Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:
    • (a) the pseudonymisation and encryption of personal data;
    • (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
    • (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
    • (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.”

Security Principle

  • Art. 5(1)(f) and Art. 32 combined are referred to as the GDPR “security principle”

The CIA Triad

  • The CIA triad is a fundamental concept of information security and refers to confidentiality, integrity, and availability.