Skip to main content
All CollectionsData Processing Agreement
Technical and Organizational Security Measures
Technical and Organizational Security Measures

Common Paper Data Processing Agreement terms: Technical and Organizational Security Measures

Mark Frantz avatar
Written by Mark Frantz
Updated over 9 months ago

Technical and Organizational Security Measures is a variable that appears in the Data Processing Agreement Cover Page, in the Changes to the Annex II section.

How to fill this out

Check the line items that are applicable to the company’s practices and make sure you provide at least some information about the actual practices in the description field. You are not required to include a response for each section.

Note that there may be overlap across the types of measures listed, and some of your responses may repeat or cross-reference others. In addition, the company may publish policies on its website that directly address some of these items, and it’s fine to reference those policy provisions here.

Included below are examples of measures companies often take.

Measures of pseudonymization and encryption of personal data

Explain in what contexts the company uses pseudonymization and/or encryption (for data in transit and/or at rest) to maintain data security.

TIP: The GPDR defines “pseudonymization” as “the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.” (Art. 4(5))

Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services

This section can be an overview of the company’s security procedures and frameworks. That might include implementation of data security tools like encryption, firewalls, DDos protection, and the like, as well as processes for testing, risk assessment and mitigation, audit trails, access controls, incident response, and so on. It might also include things like data protection training for personnel. In your response, you can cross-reference applicable measures that you’ve indicated elsewhere in this section, or provide a link to your company’s security policy, if applicable. Alternatively, you can provide a comprehensive summary here and cite to this section for other responses.

Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident

List measures that the company takes to protect data so that it can be restored in case of corruption or accidental loss, such as remote storage.

Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing

Describe any process for regular audits, company certifications, bug bounty programs, etc.

Measures for user identification and authorization

Explain how users are authenticated on companies’ systems (e.g., password requirements, multi-factor authentication) and how credentials are secured.

Measures for the protection of data during transmission

A typical example is the use of cryptographic protocols to protect data in transit.

Measures for the protection of data during storage

Common measures include industry-standard encryption, access controls such as passwords and data segregation, logical access controls to manage different levels of personnel access, physical access controls (see below), policies for remote work, etc.

Measures for ensuring physical security of locations at which personal data are processed

Describe any physical security measures that the company has in place, such as locked facilities, building security, etc.

Measures for ensuring events logging

Describe processes the company has in place for events logging, e.g., for auditing and incident response purposes.

Measures for ensuring system configuration, including default configuration

Describe the management of configuration, maintenance and monitoring of company systems.

Measures for internal IT and IT security governance and management

Describe structure and procedure for the company’s IT group, including, for example, roles and responsibilities for incident response.

Measures for certification/assurance of processes and products

If the company holds any security certifications, you can mention those here.

Measures for ensuring data minimization

Explain how the company keeps the amount of data processed at reasonable levels, such as limiting data collection only to what is needed, and deleting data once it’s no longer in use.

Measures for ensuring data quality

The GDPR sets out some expectations regarding data quality: “Personal data shall be … accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’).” GDPR Art. 5(1)(d)

Measures for ensuring limited data retention

Explain the company’s policies and standards for data retention and deletion. You do not need to provide details that the company would consider confidential. For example, you could list company procedures to ensure deletion of personal or confidential data after an agreement ends.

Measures for ensuring accountability

Mention any company policies for regular systems testing and security audits.

Measures for allowing data portability and ensuring erasure

Explain how the company supports customers with data access and erasure requests from their users, as well as procedures the company has adopted to ensure secure data deletion and hardware disposal.

Did this answer your question?