Technical and Organisational measures​​​​​​​

 

Data protection and data security concept

This document provides a summary of the technical and organisation measures deployed across the business as per Art. 24(1) of the EU General Data Protection Regulation (GDPR) for commissioned data processing.

The effectiveness of the measures take into account the protection objectives of confidentiality, availability, integrity and capacity. This is supported by integrating data protection measures, informational security and additional measures to safeguard data processing operations.

Definition of security value terms:

Confidentiality: Protection of data, information and programmes against unauthorised access and disclosure

Integrity: Factual and technical accuracy and completeness of all information and data during processing

Availability: Information, data, applications, IT systems and IT neworks are available for processing

Resilience: Denoted as an aspect of availability and thus the capacity of information, data, applications, IT systems and IT networks in the event of malfunction, failure or heavy use.

Confidentiality

essensys implements physical and logical access controls across its networks, IT systems and services to provide authorised, granular, auditable and appropriate user access and to ensure appropriate preservation of data confidentiality, integrity and availability.

  1. Physical Access control
    Measures are implemented that deny unauthorised persons access to data processing system that process and/or use personal data. This is done by:

    1. Data Centre / Servers
      Access to data centres is restricted to named personnel only.
      Government ID is required on entry to the 24/7 manned reception.
      Video surveillance at entrances/exits
      Security gates required to access secure server rooms
      Secure, dedicated cages used to host server infrastructure
    2. Office Administration
      Physical access to essensys offices is controlled primarily via Card, Key fob or Smart Access account​​​​​​​
      24-hour CCTV on entrance and exits
      Segregated Comms room with restricted access
      ​​​​​​​
  2. Device / Systems Access control
    1. Personal User IDs are allocated
    2. Use of secure complex passwords
    3. Multi-factor authorisation enforced
    4. Centralised user administration
    5. Access authorisation is granted to users based on authorisation procedures
    6. Users can only have access to personal data according to the authorisation granted to them (by means of role allocation, functional user, etc.)
    7. VPN required to access internal network devices (when working remotely)
  3. Separation control
    1. Customer data is logically separated from other customer data
    2. Data is backed up on logically and physically separate systems
    3. There is a separate logical network for office visitors

Integrity

Factual and technical accuracy and completeness of all information and data during the processing of personal data are guaranteed. The identification and correction of unauthorised modifications must be ensured. The following checks ensure the integrity of personal data:

  1. Transfer and cryptographic controls
    1. Data transfer takes place in protected networks
    2. Use of information encryption to protect sensitive or critical information, either stored or transmitted
    3. Use digital signature certificates or message authentication codes to verify authenticity or integrity of stored or transmitted sensitive or critical information (HTTPS/SSL/TLS)
    4. Filter mechanisms prevent connections to/from unauthorised systems (firewall)
    5. Data is deleted in compliance with data protection regulations after termination of contract or at the request of the customer
  2. Input / Storage Control
    1. Storage or personal data on removable media is not permitted
    2. Personal data are exclusively stored and held on data storage devices in a central data centre with secured access
    3. Data storage devices are disposed of in accordance with data protection requirements and destroyed by a 3rd party disposal firm

Availability and resilience

It should be guaranteed that personal data are protected against the risk of accidental destruction or loss. To this end, the following measures have been implemented:

  1. Availability control
    1. Built-in redundancy across systems by design
    2. Backup and recovery procedures in place for all critical systems.
    3. Implementation of protection programs
      (virus scanners, firewalls, spam filters)
    4. Monitoring of all relevant devices
      (network, servers, application)
    5. Permanently active DDoS protection and bandwidth monitoring
    6. 24/7 Network Operations team
    7. Use of uninterruptible power supplies
    8. A Disaster Recovery / Business Continuity Plan has been prepared and is reviewed and tested annually
  2. Threat and Vulnerability
    Numerous controls are in place to mitigate threat and vulnerability risks. A summary of the controls is listed below;

    1. Layered network defence
    2. Protective monitoring
    3. Client anti-malware
    4. Server anti-malware
    5. Use of external vulnerability assessment
    6. Software versions
    7. Client patching
    8. Server patching
    9. Application patching
    10. Firmware patching

Procedures for regular review, assessment and evaluation

The effectiveness of the measures implemented must be reviewed, assessed and evaluated by means of internal processes and procedures, especially at organisational level.

  • Data Protection policy established
  • Incident Response policy in place
  • Data protection by design and by default
  • Process in place to ensure written contract exists between customer and data processor
  • Sufficient measures taken to ensure compliance with data protection by a possible sub-processor
  • Monthly internal audits
  • Monthly security meetings
  • Process in place for onboarding staff
  • Process in place for offboarding staff
  • Reviews of data protection and security standards
  • External audits of policies and procedures to maintain ISO27001 and SOC2 accreditations