Jump to content
Introduction
Introduction

In this annex, within the meaning of Art. 40 (8) (d) DSA, it must be described that and which "appropriate technical and organisational measures" have been taken to protect the pbD in relation to the risks of the research project.

If the research project is carried out within a research organisation, the research organisation should already have documentation of the TOM for its infrastructure. In such cases, it is possible to attach the research institution's TOM documentation to the application for data access and to document in this annex only the measures that have been taken additionally for the specific research project. Similarly, the contents of the research organisation's TOM documentation can be included in this appendix and used as a basis for creating separate comprehensive documentation for the specific research project.  If the research organisation has not documented its TOMs (centrally), or if the researchers are carrying out their project in an infrastructure operated on their own responsibility (for which there are no TOMs to date), this appendix must in any case contain complete documentation of all TOMs.

There are no legal requirements as to how and in what detail the TOMs are to be presented. The following presentation is therefore a suggestion in terms of structure and depth, which can also be designed differently (a very detailed sample is available, for example, from the Bavarian supervisory authority, https://www.lda.bayern.de/media/checkliste/baylda_checkliste_tom.pdf).

The examples listed in the next step are measures that are typically taken in research operations. The examples are not to be understood as exhaustive, complete or universally applicable (some are alternatives) – they serve as guidance and must all be checked to see whether they are relevant to the specific research project. All examples that are not applicable should be deleted or amended as appropriate, and any missing information should be added.

With regard to the wording of Art. 40 (8) (d) DSA, the focus of the measures to be taken is on data confidentiality and security ("are able to comply with the specific data security and confidentiality requirements associated with each request and to protect personal data"). From the perspective of the data subjects , the other risk scenarios (data not available, incorrect, etc.) are generally only relevant insofar as the measures also concern the disclosure/transfer of their data. Beyond that, it is of little significance to the data subjects if their data is not available for research purposes. For the researchers involved, however, the availability and integrity of the data are the very basis of their work. Not least in their own interest, they should therefore ensure that strong security measures are also taken under 2. and 3.

1. Measures to ensure the confidentiality of data

Spatial access control

The rooms [relevant to research] at the research organisation have (optional)

Measures (optional)

The research organisation's servers are housed (optional)
Additional measures (optional)
Measure Actions
Measures (optional)
Additional measures (optional)
Measure Actions

Access control to data processing systems

The rooms [relevant to research] at the research organisation have (optional)

Measures (optional)
Additional measures (optional)
Measure Actions
Measures (optional)

Workplace management: (optional)

Outsourcing to third parties: (optional)
Additional Measures (optional)
Measure Actions
2. Measures to ensure the availability of data

IT infrastructure

• Measures have been taken for server rooms and other rooms of the research organisation with relevant IT infrastructure (cables, hazard warning systems, etc.) (optional)

Server rooms and other rooms of the research organisation with relevant IT infrastructure (cables, hazard warning systems, etc.) have (optional)

Measures (optional)
Additional Measures (optional)
Measure Actions
Measures (optional)
Additional Measures (optional)
Measure Actions

Server

Measures (optional)
Additional Measures (optional)
Measure Actions
Measures (optional)
Additional Measures (optional)
Measure Actions
3. Measures to ensure integrity and accuracy

Access control

Electronic transmission: (optional)

Physical transport: (optional)

Disposal, deletion (optional)
Additional Measures (optional)
Measure Actions
Measures (optional)
Measure Actions

Input control

Measures (optional)
Additional Measures (optional)
Measure Actions
Measures (optional)
Additional Measures (optional)
Measure Actions
Summary
To this email address the final document will be sent.