In a well known nursery rhyme “There was a little boat” sailors who are starving drew straws to figure out which one of them will know the evil fate.
The drawing of straws, as such of constant jurisprudence, is not open to appeal and must be executed...
Plan of action
The toolbox
Visiting the Internet site of the CCIN is an essential starting point to equip oneself with the necessary resources.
The site of the CCIN is packed with tools to help data controllers. Concretely, this may include:
The census
Visiting the Internet site of the CCIN allows you to think about how the processing is used.
For example, the reports on automated processing of personal data used by the banking establishment of Monaco is a document that can be shared by different services and departments of banking establishments to ensure that all of them carry out reporting of a specific sector of processing.
The consolidation of the different reports enables the person in charge of the CCIN formalities to count, in collaboration with the Computer service, the whole processing.
In the absence of such a report (from which you will be able to draw inspiration in all situations), the final purpose of processing pertaining to Ministerial Orders and Rulings are invaluable in helping to convey the essential parts of the processing.
Moreover, a simple questioning makes it possible to easily determine whether the processing is exploited or not:
Which processing must be declared?
Any automated processing of personal data, with the exception of those implemented by a natural person in the context exclusive of his or her personal or domestic activities necessitate a formality with the CCIN.
What are the different types of formalities?
For entities in the private sector not subject to the article 7 of law no. 1.165, there are four possible formalities that may be carried out:
Where to start?
It is often recommended to start with the simplified declaration insofar as it is the eligibility of the processing in terms of these formalities that is the question.
It is about starting to understand by practising on a simple form with few constraints.
Furthermore, it would be an opportunity to proceed with ordinary declarations if the processing differs from the scope set by the Ministerial Order, by focusing on the purpose, on the functionality, of the data exploited, the storage period, and the categories of recipients that are listed already.
Ordinary declarations that are of a purely declarative nature can be completed subsequently, with the understanding that the processing does exceed the scope of application of the Ministerial Order and is not subject to a preliminary authorisation request of the article 11-1 of law no. 1.165.
Finally, authorisation requests necessitate a thorough knowledge of the functioning of the processing and of information security. They require, very often, multiple skills and it is strongly advised that the legal or administrative staff in charge of this type of formality liaises with the service providers or IT services who are the most qualified to produce a security scheme and to provide the technical background.
Nevertheless, insofar as the ordinary declaration form and the preliminary authorisation request do not differ in terms of information security, the ordinary declarations would have provided an excellent way to gain a better understanding of the form.
I am stuck, what should I do?
It is always possible to reach an agent of the CCIN by phone or to ask the CCIN for an appointment to be helped to complete the formalities.
The security of the processing or to which degree in detail are the formalities subjected to by the CCIN?
The article 17 second paragraph of law no. 1.165 defines that “the measures implemented must ensure a level of security appropriate to the risks represented by the processing and the nature of the personal data to be protected.”
Simplified declaration form of compliance
If the data controller is not required to explain in a simplified declaration form of compliance to a Ministerial Order, the security measures applied to the processing and data, it is worth pointing out that the procedure of the simplified declaration of compliance is applicable to processing from the moment that “they implement appropriate technical and organizational measures to ensure a level of security appropriate to the risks represented by the processing and the nature of the personal data to be protected and answer legal requirements decreed in case of recourse of a service provider for the implementation of the processing as defined by the article 17 of law no. 1.165, aforementioned”.
The data controller is committed moreover “to take all necessary measures, according to the technical evolution, to allow an appropriate level of security for the protection of the processing and of the information to the risks represented”.
The recourse of the simplified declaration of compliance does not exonerate in any way the data controller from taking all necessary technical measures to ensure the security of the processing and of the personal data it contains.
The declaration called “ordinary” system
In conformity with article 8 - 7 of law no. 1.165 reference should be made to “the measures implemented to ensure the security of the processing and of the information and the guarantee of secrets protected by law”.
In the context of the declaration, this requirement materialises through questions related to the security of the processing using binary answers (yes/no) and then a free text field suitable to describe briefly the measures taken for this purpose.
For example, may be indicated non-exhaustively, the existence of a policy of identifiers and/or passwords or an IT charter within the entity, of non-disclosure agreements included in the employee contracts and/or the people with whom or for whom the companies are likely to work (clients, suppliers, external service providers, notably computer services, subcontractors, and so on), computer systems destined to preserve the security of the information systems (anti-virus, cryptography, firewalls, and so on).
The main objective is to emphasise a policy of protection of personal data through organisational and technical means adapted to the risk represented and in the current level of state-of-the-art.
The authorisation and legal advisory requests systems
It is strongly recommended to associate a jurist with a technician to accomplish the formalities related to authorisation and legal advisory requests, which necessitate transversal skills.
To break the ice, the jurist may ask the technician to explain the joke raised to the rank of adage: “the more memory a computer has, the faster it can produce error messages.” (Dave Barry).
If these two systems of formalities vary in many ways, in strict terms of security, they may be very similar.
First of all, the article 17-1 of law no. 1.165 that provides, in the case of processing subject to the articles 11 et 11-1 of law abovementioned “the specific technical and organisational measures intended to guarantee data protection”, places emphasis on access and accreditation (authorisation) management.
In this regard, the processing related to “access and accreditation” is often forgotten in the formalities with the CCIN, even though the article 30 of the Sovereign Order no. 2.230 establishing the terms and conditions of application of the law no. 1.165, requires that be designated “the people responsible for establishing the accreditation profiles adapted strictly to the purpose of the processing”.
Then, with regards to the form itself, the data controller shall describe in detail the measures to ensure the security of the processing and the personal data it contains.
He will then describe the security of the general architecture of the information and communication system, the means implemented to ensure the security of the related processing and information, and finally, the security relating to the users and to access (physical and logical).
Finally, a scheme of the technical architecture of the security of the processing and a scheme of the data flow must also be enclosed in the file.
These diagrams shall enable on one hand, an easy location within the information system of the processing which is the subject of the formality, and, on the other hand, an understanding of the security measures both in general and specific terms related to the said processing.
Example of the security analysis scheme
Vade mecum of the main principles of computer security or the twelve labours of Hercules
1. Know the information system and its users
2. Control the network
3. Authenticate the user
4. Secure terminal equipment
5. Secure the internal network
6. Protect the internal network from the Internet through secure interconnection gateways with the Internet.
7. Monitor the systems
8. Secure the administration of the network
9. Control access to premises and physical security.
10. Define usage rules of printers and photocopiers
11. Organise regular drills in case of incidents
12. Alert users to elementary computer hygiene rules and audit or carry out audits of the security
For whom the reading of this vade mecum only triggered little enthusiasm, it is modestly reminded that Hercules, still named Heracles, became immortal, was consecrated God of ephebes, and finally, married Hebe, goddess of youth.