Article 27 – Security of processing
|1. Member States shall provide that the controller and the processor implements appropriate technical and organisational measures to ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected, having regard to the state of the art and the cost of their implementation.2. In respect of automated data processing, each Member State shall provide that the controller or processor, following an evaluation of the risks, implements measures designed to:
(a) deny unauthorised persons access to data-processing equipment used for processing personal data (equipment access control);
(b) prevent the unauthorised reading, copying, modification or removal of data media (data media control);
(c) prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data (storage control);
(d) prevent the use of automated data-processing systems by unauthorised persons using data communication equipment (user control);
(e) ensure that persons authorised to use an automated data-processing system only have access to the data covered by their access authorisation (data access control);
(f) ensure that it is possible to verify and establish to which bodies personal data have been or may be transmitted or made available using data communication equipment (communication control);
(g) ensure that it is subsequently possible to verify and establish which personal data have been input into automated data-processing systems and when and by whom the data were input (input control);
(h) prevent the unauthorised reading, copying, modification or deletion of personal data during transfers of personal data or during transportation of data media (transport control);
(i) ensure that installed systems may, in case of interruption, be restored (recovery);
(j) ensure that the functions of the system perform, that the appearance of faults in the functions is reported (reliability) and that stored personal data cannot be corrupted by means of a malfunctioning of the system (integrity).
3. The Commission may adopt, where necessary, implementing acts for specifying the requirements laid down in paragraphs 1 and 2 to various situations, notably encryption standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 57(2).