Technical and Organizational Measures (TOMs) Art. 32 GDPR
1. Confidentiality
1.1 Physical Access Control
- 
Data Center:
- Data Processing Agreement with Hetzner.
 
 - 
Office Spaces:
- Site: PIN
 - Building: PIN
 - Room: Electronic access control system with logging
 
 
1.2 Access Control (authentification)
- 
Internal Systems Used for Service Delivery:
- 
Technical Measures:
- Login with username + password
 - Multi-factor authentication required
 - Firewall
 - Use of VPN for remote access
 - Encryption of storage media
 - Encryption of notebooks
 
 - 
Organizational Measures:
- Management of user permissions
 - Creation of user profiles
 - Use of password managers
 - Central authentication and authorization service
 - "Clean desk" policy
 - Software and hardware policies for employee devices
 
 
 - 
 - 
Data Processing System:
- 
Technical Measures:
- Key-based authentication
 - Firewall
 - Use of VPN for remote access
 - Encryption of storage media
 - Encryption of devices
 - Systems for detecting server manipulation
 - Login with username + password
 - Multi-factor authentication required
 
 - 
Organizational Measures:
- Management of user permissions
 - Creation of user profiles
 - Enforcement of key-based authentication
 - Central authentication and authorization service
 - "Clean desk" policy
 - Software and hardware policies for employee devices
 - Locked steel cabinet
 
 
 - 
 
1.3 Access Control (authorization)
- 
Technical Measures:
- Logging of access to applications, specifically data entry, modification, and deletion
 
 - 
Organizational Measures:
- Use of authorization concepts
 - Minimal number of administrators
 - Management of user rights by administrators
 
 
1.4 Separation Control
- 
Technical Measures:
- Separation of production and testing environments
 - Physical or logical separation (systems/databases/storage media)
 - Tenant separation for relevant applications
 
 - 
Organizational Measures:
- Definition of database rights
 - Control through authorization concepts
 
 
2. Integrity
2.1 Disclosure Control
- 
Technical Measures:
- PGP email encryption where possible
 - Company emails via encrypted email provider
 - Transport encryption for all systems
- Web services: https
 - Data import: sftp/ssh
 - Admin interfaces: vpn
 
 - Use of VPN for internal systems
 - Logging of accesses and retrievals
 
 - 
Organizational Measures:
- Internal communication policies
 - Document shredder (minimum level 3, cross cut)
 
 
2.2 Input Control
- 
Technical Measures:
- Technical logging of data entry, modification, and deletion
 - Manual or automated review of logs
 
 - 
Organizational Measures:
- Overview of which programs can input, modify, or delete which data
 - Traceability of data entry, modification, and deletion by individual usernames (not user groups)
 - Assignment of rights for data entry, modification, and deletion based on an authorization concept
 - Clear responsibilities for deletions
 
 
3. Availability and Resilience
3.1 Availability Control
- 
Technical Measures:
- Daily backups to the data system of a different host
 - Monitoring of backup routines
 - Immediate notification in case of faulty/incomplete backups
 - Regular tests for data recovery and logging of results
 
 - 
Organizational Measures:
- Host’s emergency plan
 
 
4. Procedures for Regular Review, Assessment, and Evaluation
4.1 Data Protection Management
- 
Technical Measures:
- External security audits and penetration tests
 
 - 
Organizational Measures:
- Permanent and temporary employees are trained and bound by confidentiality and data secrecy
 - The organization fulfills information duties according to Art. 13 and 14 GDPR
 - Data Protection Impact Assessments (DPIAs) are conducted as needed
 - Formalized process for handling data subject access requests is in place
 
 
4.2 Incident Response Management
- 
Technical Measures:
- Use of firewall and regular updates
 - Use of DDoS filter
 - Use of Intrusion Detection System (IDS)
 - Use of Intrusion Prevention System (IPS)
 
 - 
Organizational Measures:
- Documented process for identifying and reporting security incidents/data breaches (including reporting obligations to supervisory authorities)
 - Documented procedure for handling security incidents
 - Documentation of security incidents and data breaches via ticketing system
 
 
4.3 Privacy by Default Settings
- Technical Measures:
- No more personal data is collected than necessary for the respective purpose
 
 
Version 1.1 | 2024-11-07 | legal@investigativedata.org