Article 32 GDPR
Legal Text
1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:
- (a) the pseudonymisation and encryption of personal data;
- (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
- (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
2. In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
3. Adherence to an approved code of conduct as referred to in Article 40 or an approved certification mechanism as referred to in Article 42 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article.
4. The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law.
Relevant Recitals
Commentary
Article 32(1) GDPR reflects the principle of integrity and confidentiality enshrined in Article 5(1)(f) GDPR. The controller and the processor must implement appropriate technical and organizational measures in order to realise an appropriate level of security, In doing so, they must take into account the state of the art, the implementation costs and the nature, scope, context and purposes of processing. Consideration must also be given to the implications that processing operations may have for the rights and freedoms of natural persons.[1]
(1) Controller must ensure a Level of Security Appropriate to the Risk
Article 32 GDPR requires controllers and processors to implement measures that ensure an appropriate level of security.[2] In doing so, these parties must take into account eight criteria: state of the art, implementation costs, nature, scope, circumstances and purposes of the processing, as well as different probability of occurrence and severity of the risk to the rights and freedoms of natural persons.[3]
Risk Assessment
The first step, therefore, shall be the performance of an assessment that identifies the risks tied to the processing operations. The provision applies to all types of risks although, according to Article 32(2) GDPR, specific attention should be paid to certain categories such as the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
Recital 83 GDPR also suggests that not all the risks mentioned above are relevant. In fact, the risk should also “lead to physical, material or non-material damage”. It can be argued, therefore, that a potential risk of, say, “destruction” will not be relevant if it is structurally unable to inflict a tangible harm to the data subject.
Technical and Organisational Measures
The second step consists of the identification of the security measures that can mitigate the identified risks. Tue GDPR does not require the use of any particular technology or technical standard with regard to data security. Indeed, Recital 15 stipulates that "the protection of natural persons should be technologically neutral and should not depend on the techniques used".
However, Article 32(1) GDPR enumerates four examples of security measures.[4] that controllers and processors should implement "as appropriate".[5] This includes pseudonymisation and encryption of personal data (Article 32(1)(a) GDPR); the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems (Article 32(1)(b) GDPR); the ability to restore the availability and access to personal data in a timely manner in case of an incident (Article 32(1)(c) GDPR) and a process for regularly testing, assessing and evaluating the effectiveness of security measures (Article 32(1)(d) GDPR).
In addition to technical measures, organisational measures should also be implemented. Examples are the distribution of responsibility between controller and processor, as well as the training activities of each person authorised to process personal data, internal policies, disciplinary measures, internal guidelines as well as adherence to codes of conduct or certification mechanisms.
Choice of Appropriate Measures
After having identified a list of theoretically applicable measures, controllers and processor must make a choice and implement the measure or measures which can ensure a level of security “appropriate” to the risk. This indicates that controllers and processors must implement the measures that are able to mitigate (at least) those risks which are the most likely to materialise and those whose impact would be the most severe.[6]
(2) Certain Risks must always be Taken into Account
Pursuant to Article 32(2) GDPR, in assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
(3) Codes of Conduct and Certification Mechanisms
In line with the accountability principle, Article 32(3) GDPR stipulates that adherence to codes of conduct or certification mechanisms can be used as an element to demonstrate compliance with the Regulation. Neither of these two requirements shall automatically reduce the liability of the data controller and/or data processor (Article 42(4) GDPR). However, they will undoubtedly be facilitated should they be called upon to prove that they have done everything possible to avoid the violation.[7]
(4) Natural Persons Acting under the Authority of the Controller or the Processor
Decisions
→ You can find all related decisions in Category:Article 32 GDPR
References
- ↑ The EUCJ has consequently recognised data security as an integral part of the right to data protection in Article 8 of the Charter of Fundamental Rights of the European Union. See, EUCJ, 8 April 2014, Digital Rights Ireland Ltd, C‑293/12 joint with EUCJ, Kärntner Landesregierung, C‑594/12, ECLI:EU:C:2014:238, margin number 29 (available here).
- ↑ The word 'appropriate' appears not less than three times in Article 32(1): "the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate" (em�phasis added). According to Burton, this "indicates that controllers and processors must identify the situation� specific risks, assess their potential impact having regard to the particular circumstances of the processing and implement measures to mitigate (at least) those risks which are the most likely to materialise and those whose impact would be the most severe". The Author also correctly points out that "references to 'appropriateness' can be seen as a way of expressing the importance of the principle of proportionality, which is a general principle of EU law, in determining how to ensure data security. A proportionality analysis generally inquires whether the means used to achieve an aim corresponds to the importance of the aim and whether it is neces�sary for its achievement". See, Burton, in Kuner et al., The EU General Data Protection Regulation (GDPR), Article 34 GDPR, p. 635 (Oxford University Press 2020).
- ↑ Hladjk, in Ehmann, Selmayr, Datenschutz-Grundverordnung, Article 32 GDPR, margin number 4 (C.H. Beck 2018, accessed on 23 April 2021).
- ↑ Hladjk, in Ehmann, Selmayr, Datenschutz-Grundverordnung, Article 32 GDPR, margin number 6 (C.H. Beck 2018, accessed on 23 April 2021).
- ↑ Piltz correctly points out that the German version of the GDPR contains a translation error according to which the measures listed could be considered mandatory. The other language versions, however, clearly suggest that the measures contained in the list are merely illustrative. The English version, for example, uses the expression 'as appropriate'. Piltz, in Gola, Datenschutz-Grundverordnung, Article 32 GDPR, margin number 24 (Beck 2018, 2nd ed.) (accessed 22 February 2022).
- ↑ Burton, in Kuner et al., The EU General Data Protection Regulation (GDPR), Article 9 GDPR, p. 636 (Oxford University Press 2020).
- ↑ Riccio, Scorza, Belisario, GDPR e normativa privacy, p. 299 (Wolters Kluwer 2018).