From 4f2d8256a24873908d63e4957f4b4506e4b7c0e9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marko=20Rintam=C3=A4ki?= <marko.rintamaki@jamk.fi> Date: Tue, 6 Apr 2021 15:30:51 +0300 Subject: [PATCH] Add new file --- .../library/gdpr-and-security.md | 45 +++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 docs/90-Quality-and-support/library/gdpr-and-security.md diff --git a/docs/90-Quality-and-support/library/gdpr-and-security.md b/docs/90-Quality-and-support/library/gdpr-and-security.md new file mode 100644 index 0000000..19f0356 --- /dev/null +++ b/docs/90-Quality-and-support/library/gdpr-and-security.md @@ -0,0 +1,45 @@ +Source : European data protection, Law and Practise, second edition 2019. An IAPP Publication. + + + +So, what can data protection professionals do to put their organisations in the best +position possible? Where should they look to understand the meaning of ‘appropriate +technical and organisational measures’? As well as consulting with their internal +security professionals about the nature of the security threats and risks and the nature +of the response strategy, they can seek to familiarise themselves with some of the key +pieces of readily available learning. Fruitful areas for review include: + +• Related pieces of the legislative framework that contain security provisions, + +such as the NIS Directive, the ePrivacy Directive, the Cybercrime Directive +and the Payment Services Directive No. 2.14 + +• The output of institutions, such as WP29, the European Data Protection + +Supervisor and the European Union Agency for Network and Information +Security. + +• The output of security centres of excellence, such as the National Cyber + +Security Centre in the UK. +• Policy frameworks of national governments, such as national cybersecurity +plans. +• Regulatory policy statements and other guidance issued by the national data +protection regulators and by sector regulators. +• Decisions in regulatory enforcement actions brought by the national data +protection regulators and related regulators. +• Decisions of courts and tribunals in related areas. +• National and international standards for best practice, such as the ISO 27000 +series, the Payment Card Industry Data Security Standard, CBEST and the +NIST framework. + +• Threat assessment reports and subject ma!er white papers published by IT +security companies and security consultants. +• The output of relevant professional associations and a'nity groups. There +are many operating in the space, such as the Cloud Security Alliance and the + +Information Security Forum. + +This list is not exhaustive, but it should give the data protection professional a fairly +good impression of the range of available resources in determining an appropriate level +of security. -- GitLab