Data Security And Compliance In The Home-Officedataprotection
It is already estimated that in the future up to 25% of data security breaches will occur outside the corporate infrastructure. It is particularly alarming that employees are often unaware of regulations and measures for the secure handling of company data at home. Many companies do not even have corresponding regulations for telework.
Suitable security concepts in the form of appropriate guidelines, processes and technical protective measures for the processing of their sensitive company data are therefore highly recommended.
- Policies and processes: The company should establish a security policy and processes for data processing in the home office that provide clear rules and behavior.
- Encryption of data: Stored and transmitted data in the home office and during remote access to the company infrastructure must be encrypted using secure algorithms.
- Endpoint device protection: If private devices are used for work activities that cannot be managed by the company, alternative approaches should be chosen (e.g. recommendations to individual employees on how to protect private devices).
- Separation of private and corporate devices: Private and corporate devices should be separated if possible. Company data should never be stored on private storage media. Ensure that company devices are protected from unsecure or malware-infected employee home devices.
- Monitoring and logging: User activities can be logged using appropriate monitoring solutions. However, care must be taken in connection with unauthorized monitoring – the control of private devices can be inadmissible or problematic.
The selection of sensible protective measures is often complicated and lengthy. It is therefore advisable to orientate oneself on recognized safety standards. These include, for example, ISO/IEC 27001 and 27002, NIST CSF or even basic IT protection from the BSI.
A recognized security standard is particularly helpful in providing a framework of measures. This counteracts the danger of a confusing, inefficient, ineffective and costly implementation of individual measures that do not achieve the desired result. It ensures that the security controls in the company are both effective and economical.
The Compliance Issue
As with all other activities, in connection with work performed in the home office, it must be ensured that legal, contractual and internal data protection regulations are demonstrably complied with. To this end, many companies have already launched several data protection initiatives over the last few years, including the establishment of entire data protection management systems. In most cases, these are very much geared to conventional business operations. Compliance issues in the area of teleworking are hardly considered.
Here you will find an overview of relevant aspects to be considered:
- Examination / adjustment of data protection contracts with regard to new work situation
- Order processing
- Common responsibilities
- Updating existing records of home office operations
- List of processing activities
- Internal security guidelines
- Adaptation of the risk assessment
- Include home office activities in privacy impact and risk assessments
Pragmatically Solve Implementation Control
Companies must ensure that the implemented technical and organizational data security measures are effective and are adhered to. This is a challenge even in the normal working day, which is made even more difficult by the shift to the home office.
An effective control of the employee is only possible to a very limited extent. After all, how do you want to check whether the company’s security standards are being maintained within the private home network in a private apartment?
The definition of appropriate and effectively enforceable control rights should be solved pragmatically. Existing data security concepts must take the risks associated with teleworking sufficiently into account and provide for appropriate protective measures. It is important to provide targeted support to employees at all levels of the company to ensure effective compliance.
More home office tips for employees and managers can be found in this blog article: IT security in the home office – what should be considered?
Mag. Gerald Steiner
Gerald Steiner is a lawyer in the law firm andréewitch & partner in Vienna, where he started his career as an associate in 1999. After his studies at the University of Vienna, he worked as a legal assistant at Harnik & Finkelstein in New York and at Baker & McKenzie in Munich. His main areas of practice are employment law, data protection law, public procurement law, real estate law, construction law, warranty/compensation and litigation. He is a certified data protection officer by Austrian Standards. Mr. Steiner has published numerous professional articles and gives lectures and seminars, especially on labor law, tort law, data protection law and public procurement law.
Dipl.-Ing. David Rieger
Dipl.-Ing. David Rieger is the data protection officer of the SEC Consult Group and also advises numerous companies as a security consultant in the implementation of extensive and complex information security and data protection requirements. His focus is on the development of information security management systems according to ISO/IEC 27001:2013, risk management, data privacy impact assessments, implementation of data security compliance programs, as well as support and operational consulting in dealing with information security incidents and data breaches. David Rieger is also a multiple certified data privacy expert, ISO 27001 Lead Implementer & Auditor and Fellow of Information Privacy of IAPP.