Jump to content
Seite 1

The pre-filled texts serve as examples commonly found in research practice. The examples are not to be understood as exhaustive, complete or universally applicable – they serve solely as guidance and must all be checked to see whether they are relevant to the specific research project. All examples that are not applicable must be deleted or amended accordingly, and missing information must be added.

With regard to the wording of Art. 40 (8) (d) DSA, the focus is on data confidentiality and security ("are able to comply with the specific data security and confidentiality requirements associated with each request and to protect personal data"). From the perspective of the data subjects, the other risk scenarios (data unavailable, incorrect, etc.) are generally only relevant insofar as the measures also concern the disclosure/transfer of their data. Beyond that, it is of little significance to the data subjects if their data is not available for research purposes. For the researchers involved, however, the availability and integrity of the data are the very basis of their work. Not least in their own interest, they should therefore ensure that risks in this regard are also minimised.

The finished document will be sent to this email address.
Confidentiality – risk scenario: unlawful access to data
Risk source/vulnerability Risk description Potential damage – physical, material, immaterial Probability of occurrence Degree Severity of damage Degree Basic measures for risk management (according to 1.5) Risk index for basic measures If necessary according to 4.3: Risk index for additional measures Justification of the new risk index for additional measures Actions
Availability of data – risk scenario: data loss
Risk source/vulnerability Risk description Potential damage – physical, material, immaterial Probability of occurrence Degree Severity of damage Degree Basic measures for risk management (according to 1.5) Risk index for basic measures If necessary according to 4.3: Risk index for additional measures Justification of the new risk index for additional measures Actions
Data availability - risk scenario: data loss
Risk source/vulnerability Risk description Potential damage – physical, material, immaterial Probability of occurrence Degree Severity of damage Degree Basic measures for risk management (according to 1.5) Risk index for basic measures If necessary according to 4.3: Risk index for additional measures Justification of the new risk index for additional measures Actions