TOM – Technical and organizational measures
The contracting parties are obliged to define the technical and organisational security measures.
Internal organisation of the contractor
The contractor shall organise its internal organisation in such a way that it meets the special requirements of data protection. In doing so, measures shall be
taken that are appropriate depending on the type of personal data or categories of data to be protected.
Concretisation of the individual measures
The requirement are met through the following measures:
1. Confidentiality
Physical access control
Measures that are suitable for preventing unauthorized persons from accessing data processing systems with which personal data is processed or saved.
Xelon AG operates its systems in two independent data centers in Zurich and Aargau (Switzerland):
- GRN: Green Datacenter AG
- NTT: NTT Global Data Centers Switzerland AG
Technical Measures |
GRN |
NTT |
Personnel and goods lock with biometric access control |
✔️ |
|
Locking system with keys and code lock in our storeroom |
✔️ |
|
Bell system with camera |
✔️ |
✔️ |
Badge system with prior identity verification |
✔️ |
✔️ |
Alarm system and secured building shafts |
✔️ |
✔️ |
Video surveillance of the entrances |
✔️ |
✔️ |
Organizational Measures |
GRN |
NTT |
Log of all entries on the personnel and goods lock |
✔️ |
✔️ |
Security operations center with security guards |
✔️ |
✔️ |
Careful selection of security guards |
✔️ |
✔️ |
Log of all entries after identity verification at the security operations center |
✔️ |
✔️ |
Key regulation / list of keys |
✔️ |
✔️ |
Employee and guest badges |
✔️ |
✔️ |
Guests without permanent access only when accompanied by authorized persons |
✔️ |
✔️ |
Careful selection of cleaning service employees |
✔️ |
✔️ |
Logical access control
Measures that are suitable to prohibit virtual access to data processing systems by unauthorized persons.
Technical Measures |
Organizational Measures |
✔️ Login with MFA |
✔️ Information security policy |
Privilege control
Measures that ensure that those authorized to use a data processing system can only access the data subject to their access authorization and that personal data while processing, using and after saving cannot be read, copied, changed or removed without authorization.
Technical Measures |
Organizational Measures |
✔️ Paper shredder (security level P-1) |
✔️ Use of authorization concepts |
Separation Control
Measures to ensure that data collected for different purposes can be processed separately. This can be ensured, for example by logically and physically separating the data.
Technical Measures |
Organizational Measures |
✔️ Separation of production and test environment |
✔️ Control via authorization concept |
Pseudonymization
The processing of personal data in such a way that the data can no longer be assigned to a specific person without consulting additional information, provided that this additional information is stored separately and is subject to appropriate technical and organizational measures.
Technical Measures |
Organizational Measures |
✔️ In the case of pseudonymization: Separation of the assignment data and storage in a separate and secure system (encrypted) |
✔️ Internal instruction to anonymize and if possible pseudonymize personal data in the event of disclosure or after the statutory deletion period, respectively our preservation interest, has expired |
2. Integrity
Disclosure control
Measures to ensure that personal data during electronic transmission or during their transport or while saving onto disks can not be unauthorized read, copied, changed or removed and that it can be checked and determined to which external parties a transfer of personal data through facilities for data transmission is intended.
Technical Measures |
Organizational Measures |
✔️ Use of VPN |
✔️ Documentation and logging of the data recipients as well as the duration of the planned transfer or the deletion periods |
Input control
Measures to ensure that it can be subsequently checked and determined whether and by whom personal data has been entered, changed or removed in data processing systems.
Technical Measures |
Organizational Measures |
✔️ Technical logging of creation, change and deletion of personal data |
✔️ Overview of tools which are used to create, change or delete personal data |
3. Availability and resilience
Availability control
Measures to ensure that personal data is protected against accidental destruction or loss.
Technical Measures |
Organizational Measures |
✔️ Redundant emergency power systems with diesel generators and batteries operated by DC |
✔️ Backup & recovery concept |
4. Procedures to periodically review, assess and evaluate
Privacy management
Data protection encompasses all measures to prevent the undesirable processing of personal data and its consequences.
Technical Measures |
Organizational Measures |
✔️ Central documentation of all procedures and regulations with access options for employees as required / authorized |
✔️ Internal data protection officer |
Incident-Response-Management
Security breach response assistance
Technical Measures |
Organizational Measures |
✔️ Use of firewall with regular updates |
✔️ Documented process for detecting and reporting security incidents / data breaches (also with regard to the obligation to report to the supervisory authority) |
Privacy friendly presets
Privacy by design / Privacy by default
Technical Measures |
✔️ No more personal data is collected than is required for the respective purpose |
Order control (Outsourcing to third parties)
Measures to ensure that personal data processed on behalf of the client can only be processed in accordance with the client’s instructions. In addition to data processing on behalf, this item also includes the performance of maintenance and system support work both on site and via remote maintenance.
If the Contractor uses service providers in the sense of commissioned processing, the following points must always be regulated with them.
Organizational Measures |
✔️ Prior verification of the safety measures taken by the contractor and their documentation |
PDF download
Create a free account
Create an account and discover Xelon HQ for yourself.
Already got an account? Login