32—Elements for principle of integrity, confidentiality and availability

32. The elements necessary to implement the principle of integrity, confidentiality and availability include—

(a)  having an operative means of managing policies and procedures for information security;

(b)  assessing the risks against the security of personal data and putting in place measures to counter identified risks;

(c)  processing that is robust to withstand changes, regulatory demands, incidents, and cyber-attacks;

(d)  ensuring only authorised personnel have access to the data necessary for their processing tasks;

(e)  securing transfers shall be secured against unauthorised access and changes;

(f)  securing data storage from use, unauthorised access and alterations;

(g)  keeping back-ups and logs to the extent necessary for information security;

(h)  using audit trails and event monitoring as a routine security control;

(i)  protecting sensitive personal data with adequate measures and, where possible, kept separate from the rest of the personal data;

(j)  having in place routines and procedures to detect, handle, report, and learn from data breaches; and

(k)  regularly reviewing and testing software to uncover vulnerabilities of the systems supporting the processing.

188  PART V—ELEMENTS TO IMPLEMENT DATA PROTECTION BY DESIGN OR BY DEFAULT