What are the four security attributes anticipated under article 32, GDPR?
RISK-BASED APPROACH - The controller and processor must implement appropriate technical and organisational measures, with security level appropriate to risk considering the state of art, costs, nature, context, scope and purpose of the processing.
Absolute security NOT REQUIRED.
What should controllers seek from processors in terms of security assurance under article 28, GDPR?
What is a data breach under article 4(2), GDPR?
Breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of or access to personal data.
What are the applicable breach notification thresholds and timeframes?
What are the three key policy areas addressed by NISD / NISD II?