1. RISK ANALYSIS AND SECURITY MEASURES
1.1 RISK ANALYSIS
The approval of the GDPR represents a paradigm shift in the way any company internally manages data protection. In the previous regulatory model, derived from Directive 95/46/EC, LOPD 15/1999, and its regulations (RDLOPD), security measures were established based on the level of security of personal data processed by data controllers and processors.
In the GDPR-derived model, companies must conduct a detailed analysis of the risks associated with these processes and manage these risks by establishing security measures deemed necessary and reasonable for the treatment of such risks. ETTS has successfully implemented this.
Moreover, risk analysis helps determine whether it is advisable, necessary, or mandatory to appoint a Data Protection Officer (DPO) within the company and whether it is necessary to conduct a Data Protection Impact Assessment (DPIA) for certain processes posing a high risk to individuals’ rights and freedoms.
The data protection risk management process is structured into the following phases:
Once a risk is identified and assessed, four possibilities for its treatment are considered:
The objective of risk treatment is to bring it to an acceptable level for the Data Controller or Processor.
If a risk is not critical enough for the Data Controller, a control measure may be to accept the risk, meaning being aware of its existence and monitoring it. Conversely, if the risk poses a significant threat to information security, the decision may be to transfer, mitigate, or avoid that risk.
Risk transfer involves making a third party responsible for managing the possibility of a negative impact (realization of the risk). Generally, risks are transferred through insurance, guarantees, and/or contracts. Mitigating a risk involves reducing the likelihood of its occurrence and/or mitigating its consequences.
Finally, avoiding a risk means eliminating the threat causing it. This can be achieved by better protecting the main objectives of personal data processing from potential negative impacts or by modifying the temporal planning or scope of data processing to prevent the risk.
This risk management must balance the costs of controlling activities, the importance of data processing for the Controller or Processor’s processes, and the level of criticality of the risk.
1.1.1 RISK MANAGEMENT AND DETERMINATION OF SECURITY MEASURES APPLICATION
Article 32 of the GDPR provides that, taking into account the state of the art, the costs of implementation, the nature, scope, context, and purposes of processing, as well as the variable risks of probability and severity to the rights and freedoms of individuals, the Data Controller and Processor shall apply appropriate technical and organizational measures to ensure a level of security appropriate to the risk. With this in mind, ETTS has adopted:
For this purpose, the following classification is identified:
Depending on the treatment and its associated risks, specific security measures will be applied to accept, mitigate, transfer, or eliminate the risk.
The following basic measures have been proposed to address risks:
1.2 PREVENTIVE CONTROLS
SECURITY REGULATIONS FOR PERSONNEL:
ACCESS CONTROL
IDENTIFICATION AND AUTHENTICATION SYSTEMS
MEDIA AND DOCUMENT MANAGEMENT
BACKUP COPIES AND DATA RECOVERY
DATA PROTECTION COORDINATION
A Data Protection Coordinator has been appointed, responsible for overseeing and controlling compliance with data protection regulations.
TELECOMMUNICATIONS
Data transmitted through public or wireless electronic communications networks, especially those of special categories of data, are encrypted to ensure that the information is intelligible and not manipulated by third parties during transmission.
DATA RETENTION
Data retention periods are established based on the category of data and its purposes. Mechanisms are also established for the deletion of data once the retention period has expired, for both electronic and paper support.
DESTRUCTION OR ERASURE AND ADOPTION OF MEASURES TO PREVENT ACCESS TO INFORMATION
Data is securely destroyed or erased, particularly when discarding equipment or media (HDD, USB devices, CDs, etc.). Before recycling or eliminating them, they are formatted, deleted, and securely destroyed, making data recovery impossible.
1.3 DETECTIVE CONTROLS
IDENTIFICATION AND AUTHENTICATION
A mechanism has been established that limits the possibility of repeatedly attempting unauthorized access to the information system.
BACKUP COPIES AND DATA RECOVERY
ETTS verifies every 6 months the proper execution, functioning, and recovery of backups.
AUDIT
Periodically, information systems and data processing and storage facilities undergo internal or external audits to verify compliance with regulations.
INCIDENT LOG
ACCESS LOG
1.4 CORRECTIVE CONTROLS
BACKUP COPIES AND DATA RECOVERY
INCIDENT LOG
1.5 MEASURES APPLICABLE TO PAPER-BASED PROCESSING
The archiving of media or documents is carried out according to criteria ensuring the proper preservation of documents, location and consultation of information, as well as enabling the exercise of rights to oppose, access, rectify, and cancel.
Cabinets, file cabinets, or other elements storing paper documentation with personal data are located in areas where access is protected by doors with key-operated opening systems. The areas remain closed when access to the documents in the file is unnecessary.
When documentation with personal data is outside the storage location or is under review/processing, whether before or after archiving, the user in charge of it safeguards and prevents access by unauthorized persons at all times.
The destruction of copies or reproductions is done using a paper shredder and/or by contracting an external company responsible for these tasks, which issues a certificate accrediting the destruction.
Access to paper-based documentation is limited exclusively to authorized personnel.
Whenever physical transfer of documentation occurs, measures are taken to prevent access or manipulation of the information.
Spanish
English or French
Copyright © 2025 ETT Crypto Solutions.
We value your privacy. We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.