Creasoft
Creasoft

GDPR organisational measures

Technical and Organisational Measures under Article 32 GDPR
Documentation of technical and organisational measures in accordance with Article 32 GDPR

1. Anonymisation / Pseudonymisation
What measures are taken to ensure the anonymisation of personal data?

Anonymisation means the processing of personal data in such a way that the data can no longer be attributed to a data subject.

Pseudonymisation means the processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information (through a potential linking identifier), provided that such additional information is stored separately and is subject to technical and organisational measures ensuring that the personal data is not attributed to an identified or identifiable natural person.

  • personal data is replaced with random codes that can no longer be recovered afterwards

  • masking of data without the possibility of restoring it to its original form
    X complete deletion of data

  • other method:

2. Encryption
What measures are taken to ensure the encryption of personal data?

Data encryption measures transform plain text, based on an additional piece of information (known as a key), into corresponding secret text (ciphertext or encrypted text), which must not be decipherable by anyone who does not possess the key.

  • use of cryptographic tools
    X data dispersion in such a way that it does not allow identification of the data subject through direct access to a specific portion

  • encryption of storage media
    X encryption of communications

  • other method:

3. Ability to ensure confidentiality
What measures are taken to ensure the ongoing confidentiality of data?

Confidentiality means that personal data is protected against unauthorised disclosure.

  • electronic access control system

  • secured doors and/or windows

  • bars on windows and doors

  • security staff at the facility, gatekeeper

  • alarm system

  • video surveillance

  • special protection for the server room
    X procedures for connecting to the database hosted in Microsoft Azure cloud based on individual password authentication, with or without two-factor authentication (the option belongs to the Beneficiary)

  • additional login for certain applications
    X automatic client/session lockout (timeout expiry)
    X permission management
    X permission documentation

  • system encryption
    X encryption of communications
    X encryption of storage media/external laptops (e.g. through operating systems, BitLocker, DiskCryptor, TrueCrypt, SafeGuard Easy, WinZip)

  • encrypted remote connections (VPN - Virtual Private Network)

  • secured WLAN
    X SSL encryption for internet access

  • other method:

4. Ability to ensure integrity
What measures are taken to ensure the ongoing integrity of data?

Integrity refers to the accuracy and completeness of data and to the correct functioning of systems. When the term integrity is used in relation to data, it means that the data is complete and unaltered.

X use of access rights

  • system logs
    X clearly defined functional responsibilities with clear segregation

  • other method:

5. Ability to ensure availability
What measures are taken to ensure the ongoing availability of data?

The availability of IT systems and services, IT applications, and the related functions or information of IT networks is ensured if users are able to use them at any time in accordance with their intended purpose.

X backup procedures
X hard disk mirroring

  • uninterruptible power supply
    X antivirus/firewall protection
    X emergency plan

  • air conditioning

  • fire and flood control

  • alarm system

  • proper archiving and destruction

  • other method:

6. Ability to ensure resilience
What measures are taken to ensure the ongoing resilience of data?

Systems are resilient when they can withstand disruptions sufficiently so as to preserve their functionality even in the event of unforeseen access or overload.

X penetration testing

  • other method:

7. Recovery
What measures are taken to ensure the availability and accessibility of personal data in the event of a security incident?

X backup procedures
X uninterruptible power supply
X emergency plan

  • delegated arrangements

  • other methods:

8. Process for periodic testing
How is it ensured that data security measures are periodically tested?

X there is a predefined testing procedure
X test reports are evaluated
X implementation of improvement proposals

  • other method:

9. Unauthorised access to personal data
What measures are taken to prevent access to and availability of personal data to unauthorised persons?

X individual password-based login procedures, with the option of two-factor authentication
X additional login for certain applications
X automatic client/session lockout (timeout expiry)
X permission management
X permission documentation

  • system encryption

  • other method:

10. Training of natural persons (employees)
How do you ensure that personal data is processed strictly in accordance with the controller's instructions?

X involvement of employees in codes of conduct
X implementation of internal confidentiality rules

  • employee commitments regarding data secrecy

  • periodic employee training

  • training process carried out at onboarding

  • assignment of a contract and a project manager for the relevant orders

  • other method:

11. Certifications attesting the Operator's/Processor's capacity to ensure quality and security measures in the operations provided to data subjects

X ISO 9001 certification
X ISO 27001 certification

  • PSI-DSS certification

  • other PCI compliance certifications

  • other certifications: ...

12. Auditing of the application(s) or exposed systems and cybersecurity / vulnerability assessment / compliance verification

  • latest pentest conducted on:

  • latest security audit conducted on 1 March 2025

  • latest GDPR audit conducted on: .......

  • other audit processes: .....