Skip to content

Technical and Organizational Measures (TOMs) Art. 32 GDPR

1. Confidentiality

1.1 Physical Access Control

  • Data Center:

    • Data Processing Agreement with Hetzner.
  • Office Spaces:

    • Site: PIN
    • Building: PIN
    • Room: Electronic access control system with logging

1.2 Access Control (authentification)

  • Internal Systems Used for Service Delivery:

    • Technical Measures:

      • Login with username + password
      • Multi-factor authentication required
      • Firewall
      • Use of VPN for remote access
      • Encryption of storage media
      • Encryption of notebooks
    • Organizational Measures:

      • Management of user permissions
      • Creation of user profiles
      • Use of password managers
      • Central authentication and authorization service
      • "Clean desk" policy
      • Software and hardware policies for employee devices
  • Data Processing System:

    • Technical Measures:

      • Key-based authentication
      • Firewall
      • Use of VPN for remote access
      • Encryption of storage media
      • Encryption of devices
      • Systems for detecting server manipulation
      • Login with username + password
      • Multi-factor authentication required
    • Organizational Measures:

      • Management of user permissions
      • Creation of user profiles
      • Enforcement of key-based authentication
      • Central authentication and authorization service
      • "Clean desk" policy
      • Software and hardware policies for employee devices
      • Locked steel cabinet

1.3 Access Control (authorization)

  • Technical Measures:

    • Logging of access to applications, specifically data entry, modification, and deletion
  • Organizational Measures:

    • Use of authorization concepts
    • Minimal number of administrators
    • Management of user rights by administrators

1.4 Separation Control

  • Technical Measures:

    • Separation of production and testing environments
    • Physical or logical separation (systems/databases/storage media)
    • Tenant separation for relevant applications
  • Organizational Measures:

    • Definition of database rights
    • Control through authorization concepts

2. Integrity

2.1 Disclosure Control

  • Technical Measures:

    • PGP email encryption where possible
    • Company emails via encrypted email provider
    • Transport encryption for all systems
      • Web services: https
      • Data import: sftp/ssh
      • Admin interfaces: vpn
    • Use of VPN for internal systems
    • Logging of accesses and retrievals
  • Organizational Measures:

    • Internal communication policies
    • Document shredder (minimum level 3, cross cut)

2.2 Input Control

  • Technical Measures:

    • Technical logging of data entry, modification, and deletion
    • Manual or automated review of logs
  • Organizational Measures:

    • Overview of which programs can input, modify, or delete which data
    • Traceability of data entry, modification, and deletion by individual usernames (not user groups)
    • Assignment of rights for data entry, modification, and deletion based on an authorization concept
    • Clear responsibilities for deletions

3. Availability and Resilience

3.1 Availability Control

  • Technical Measures:

    • Daily backups to the data system of a different host
    • Monitoring of backup routines
    • Immediate notification in case of faulty/incomplete backups
    • Regular tests for data recovery and logging of results
  • Organizational Measures:

    • Host’s emergency plan

4. Procedures for Regular Review, Assessment, and Evaluation

4.1 Data Protection Management

  • Technical Measures:

    • External security audits and penetration tests
  • Organizational Measures:

    • Permanent and temporary employees are trained and bound by confidentiality and data secrecy
    • The organization fulfills information duties according to Art. 13 and 14 GDPR
    • Data Protection Impact Assessments (DPIAs) are conducted as needed
    • Formalized process for handling data subject access requests is in place

4.2 Incident Response Management

  • Technical Measures:

    • Use of firewall and regular updates
    • Use of DDoS filter
    • Use of Intrusion Detection System (IDS)
    • Use of Intrusion Prevention System (IPS)
  • Organizational Measures:

    • Documented process for identifying and reporting security incidents/data breaches (including reporting obligations to supervisory authorities)
    • Documented procedure for handling security incidents
    • Documentation of security incidents and data breaches via ticketing system

4.3 Privacy by Default Settings

  • Technical Measures:
    • No more personal data is collected than necessary for the respective purpose

Version 1.1 | 2024-11-07 | legal@investigativedata.org