Last review date: 17 December 2024
Yes.
Not a strict legal requirement, but encryption is considered by the GDPR as an appropriate technical and organizational measure. In practice, the authorities expect encryption unless specific circumstances justify no encryption.
By way of an example for a sector specific law, the German Telecommunications Act includes security obligations applicable to providers of telecommunications services and networks. Other specific laws, such as Sec. 393 Social Security Code V, may contain additional requirements.
Last review date: 17 December 2024
If yes, please provide brief details of the relevant law or regulation.
Various EU level requirements directly applicable also in Germany (some of which contain a grace period for the implementation). Also a variety of sector specific German laws, e.g. the Telecommunications Act and Sec. 393 Social Security Code V.
Last review date: 17 December 2024
Yes.
"Personal data breach" means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.
Last updated date: 17 December 2024
Data protection authorities
Affected individuals
Other:
There shall be public communication or similar measure whereby the data subjects are informed in an equally effective manner (instead of informing the data subjects individually) if the communication to the data subject would involve disproportionate effort.
Last review date: 17 December 2024
Controller/ owner
Last review date: 17 December 2024
Yes.
If so, please provide brief details of the relevant law / guidance and indicate which body/bodies must be notified of the breach.
The BSIG sets out general security breach notifications applicable to all providers of critical infrastructures.
Relevant sector-specific laws include e.g. § 11 (1c) Electricity and Gas Supply Act, § 44 b Law on the peaceful use of nuclear energy and protection against its dangers, § 329 (1) sentence 2 Social Security Code V, § 54 Payment Services Supervision Act, § 26 Securities Trading Act.
Breach notification requirements under the BSIG also apply to providers of digital services as well as companies in the special public interest.
Details regarding the identified data security breach notification requirements
1. disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems, components or processes that have led to a failure or to a significant impairment of the functionality of the critical infrastructures they operate,
2. significant disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems, components or processes that have led to a failure or to a significant impairment of the or significant impairment of the functionality of the critical infrastructures they operate.
The report must contain in particular information on the disruption, possible cross-border effects and applicable technical details, in particular the suspected or actual cause, the information technology affected, the type of facility or system affected, the critical service provided and the impact of the disruption on the service. In specified cases, BSI is entitled to require among others affected critical infrastructure operators to hand over relevant information, including personal data, where necessary for handling the breach.
Sec. 8d BSIG includes sector specific exemptions from the general breach notification requirement, for instance for providers of publicly available telecommunication services (see below for information on rules applicable to such providers as one example of overriding sector-specific breach notification requirements).
1. disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems, components or processes that have led to a failure or to a significant impairment of the provision of value creation,
2. significant disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems, components or processes that could lead to a failure or significant impairment of the provision of value creation.
The notification must contain information on the disruption, the technical details, in particular the suspected or actual cause, the information technology affected, and the type of facility or system affected.
1. disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems, components or processes that have led to an incident in accordance with the Hazardous Incident Ordinance as amended,
2. significant disruptions to the availability, integrity, authenticity and confidentiality of their IT systems, components or processes that could lead to an incident in accordance with the Hazardous Incident Ordinance as amended.
The notification must contain information on the incident, technical details, in particular the suspected or actual cause, the information technology affected, and the type of facility or system affected.
A security incident means any event having an adverse effect on the security of telecommunications networks or telecommunications services. This includes incidents that lead to a reduction of availability of the services provided over a network as well as incidents that lead to an unauthorized access to users' telecommunications or data processing systems. Only incidents with a significant impact need to be notified, which needs to be assessed by the provider; non-exhaustive criteria from this assessment are set out in the law and in applicable guidance. The Federal Network Agency and the Federal Office for Information Security have to be informed. The authorities must be informed without undue delay (Sec. 168 para 1 of the German Telecommunications Act, "unverzüglich"). The notification must be made using a specific form provided by the authorities, which also sets out the information to be provided and the contact data for submitting the notification. If not all information is available initially, a first notification must be filed and a subsequent notification once all relevant information is available. The notification must generally be made via email or telefax. After the incident has been remedied, a final report must be filed without undue delay, but latest three days after the incident has been remedied.
In case of a particular and significant danger of a security incident, the affected users must be informed about available protection measures and remedies, which may be taken by the users, and in certain cases also on the danger as such.
A data breach occurs when the protection of personal data is violated - that is, there is a violation of data security that leads to the loss, unlawful deletion, modification, storage, dissemination or other illegitimate use of personal data, as well as the unlawful access to these. Both the Federal Network Agency and the Federal Commissioner for Data Protection and Freedom of Information have to be informed. The authorities have to be informed by the provider of publicly available telecommunication services without undue delay. Regarding this notification under Sec. 169 of the German Telecommunications Act this means that notification must be made within 24 hours from the point in time where the data breach has been detected (i.e. the provider has sufficient knowledge of a breach which may have caused a violation of the protection of personal data). Where not all required information is available at this point in time yet, a second notification must be made without undue delay, however latest within three days from the first notification (at a minimum, all information available at this point in time must be provided). There is no materiality threshold for this notification to the relevant authorities. The notification must be made using a specific form provided by the authorities (which also sets out the information to be provided), which must be used also for a second notification.
It is mandatory to inform affected individuals, without undue delay, in cases where it is reasonable to expect that the infringement severely violates the rights or protectable interests of such individuals (subject to exceptions, e.g., where certain security measures have been taken and documented). Users must always be informed without undue delay if the breach results from users' data processing equipment.
Providers must document personal data breaches in a registry that must be provided to the authorities upon request. Breaches that reach back more than five years need not be taken into account.