DE | English
Avoiding data breaches – 8 steps for businesses.
The EU General Data Protection Regulation (GDPR) has now been in force for over a year. The number of data breach reports received by the Data Protection and Freedom of Information supervisory authority in Baden-Württemberg has increased more than tenfold compared to the same period last year and shows no signs of slowing down. What can businesses do to stay secure?

Share article

  1. 1.
  2.  
  3. Take responsibility.
  4. Companies and authorities that use software or commission a service are responsible for the lawful processing of data, NOT the software vendor or commissioned service provider as many people assume. For this reason, Controllers must check the lawfulness of data processing. If commissioned data processing is carried out by a service provider, companies must ensure that a commissioned data processing contract has been signed. If a service provider uses data for its own purposes, as a rule, both the service provider and company bear joint responsibility and the company must ensure that processing is carried out lawfully.


  5.  
  6.  
  7.  
  1. 2.
  2.  
  3. Think about the “state of the art”.
  4. Article 32 GDPR stipulates that, amongst others, the state of the art as well as the risk to the rights and freedoms of the data subject need to be taken into account with regard to IT security. The company Controller therefore has to take into consideration the development stages of advanced processes, facilities and operating methods that leading experts certify as guaranteeing that specified goals can be achieved. That means being on top of current developments in IT security and aligning with the German Federal Office for Information Security (BSI) baseline protection.


  5.  
  6.  
  1. 3.
  2.  
  3. Limit access rights.
  4. The Need-to-Know principle applies for the safeguarding of all data. Only those who need the information for their work should be able to view it. Even IT administrators should not have direct access to information in databases or applications, particularly when these data are sensitive. It must therefore be made technically impossible to view the data, for example, by using encryption.

  5.  

 

  1. 4.
  2.  
  3. Encrypt storage media.
  4. The most common reason for a data breach has always been lost or stolen storage media such as mobile devices, USB sticks, hard drives, memory cards and notebooks. For this reason, mobile devices in particular should be encrypted. Every modern operating system has its own process for encryption (BitLocker, FileVault, LUKS and GELI).


  5.  
  1. 5.
  2.  
  3. Encrypt e-mails. 
  4. Controllers should send and receive e-mails and attached files using end-to-end encryption—a technology that has been available for decades. Transport encryption alone is often not enough, particularly for sensitive data, as this only secures the transmission.   
  5.  

More information (German)

 

 

  1. 6.
  2.  
  3. Secure remote maintenance access.  
  4. Companies should secure their external communications using by means of a VPN or two-factor authentication, for example. Data should be only be transmitted after being encrypted using a state-of-the-art encryption process.


  5. More information (German) 


  6.  
  1. 7.
  2.  
  3. Limit tracking by third parties.  
  4. The GDPR also brings with it new rules for tracking on websites and in smartphone apps. Before a third party coverage analysis can be carried out, the data subject must give informed, voluntary, active, prior and revocable consent.

  5.  

    More information (German)
  6.  
  1. 8.
  2.  
  3. Report data breaches.  
  4. There is an obligation to report personal data breaches. The company must report these breaches to the responsible data protection authority within 72 hours. Data loss is a reportable incident. The Controller must also check if the data subject needs to be informed, depending on whether there is a risk to its rights and freedoms.

 

The supervisory authorities support companies in the case of any questions as the main focus of their work is on advising and not on monitoring. In 2018, a total of 4,440 requests for advice were received, which represents a year on year increase of 50% from the corporate and public sectors and a 270% increase from the private sector.

 

Those who seek out advice will find out that sensationalist headlines such as “Nursery blacks out photographs”, “Doorbells no longer allowed to display names” and “Schools ban parents from taking photographs” are nothing to be concerned about. Alvar Freude describes them as being completely blown out of proportion: “These headlines neither reflect the intention of the law, nor do the authorities interpret them that way, let alone pursue such perceived breaches.”

 

 
Any questions? Talk to us.

Bechtle advises and accompanies companies and authorities on the topics of data protection, IT security and IT law. Our qualified specialists offer workshops and training courses for data protection awareness, offer manufacturer-independent solutions for company organisation, appoint external data protection officers, assume operational responsibility and carry out data protection audits. 

 

INFO AND CONTACT

Contact person.

Heiner Golombek
Head of the Data Protection and Security Competence Centre
Bechtle IT Systems Integrator Neckarsulm

heiner.golombek@bechtle.com

 

 

Links.

 

Newsletter. 

Get the best from the Bechtle update every two months directly into your mailbox. Click here to register:
 

NEWSLETTER

 

 

Keep on reading.

Lights, camera, action! Remaking a data centre.

IT-Security – From chore to future-driver.

Digitalising working environments – 20 years of HanseVision.

Published on Jul 17, 2019.