Data Protection in Greece

Security in Greece

EU regulation

The GDPR is not prescriptive about specific technical standards or measures. Rather, the GDPR adopts a proportionate, context-specific approach to security. Article 32 states that controllers and processors shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk of the processing. In so doing, they must take account of the state of the art, the costs of implementation, and the nature, scope, context and purposes of processing. A 'one size fits all' approach is therefore the antithesis of this requirement.

However the GDPR does require controllers and processors to consider the following when assessing what might constitute adequate security:

  1. the pseudonymization and encryption of personal data;
  2. the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
  3. the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and
  4. a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.

Greece regulation

The Greek Data Protection Law does not provide for additional requirements in relation to security measures other than those set forth in the GDPR. Only with regard to special categories of data, the Greek Data Protection Law provides an indicative list of the security measures, which should be taken. More specifically, when processing special categories of personal data, appropriate security measures to safeguard the data subject’s interests should be adopted. Such measures may include:

  • Technical and organizational measures to ensure that processing complies with the GDPR;
  • Measures to verify and establish whether and by which party personal data were fed into, altered or removed;
  • Data Protection awareness;
  • Data classification and access rights;
  • Designation of a DPO;
  • Pseudonymization of personal data;
  • Encryption of personal data;
  • Measures to restore confidentiality, integrity, availability and resilience of processing systems and services, including the ability to restore availability and access to data in the event of physical or technical incident;
  • Process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.

Requirements according to the Greek Cybersecurity Law

The Greek Cybersecurity Law applies to specific categories of entities defined therein, regardless of the nature of the information they use (personal data or not). It entered into force on 27 November 2024. Therefore, in case personal data is processed, both the Greek Cybersecurity Law and GDPR / Greek data protection rules apply in parallel. 

The Greek Cybersecurity Law obliges specific categories of entities to: 

  • implement specific minimum organisational and technical security measures (Article 15(2)), similar to those mentioned in Article 21 of NIS2 Directive, namely:
    • policies and procedures for risk analysis and information system security;
    • incident handling;
    • business continuity management;
    • supply chain security;
    • security in network and information systems acquisition, development and maintenance;
    • policy and procedures for the assessment of risk management measures;
    • cyber hygiene practices and training;
    • cryptography and encryption measures;
    • access control policies and asset management;
    • multi-factor authentication and secured voice, video and text communications;
  • adopt a single cybersecurity policy, based on the standardized template, which will be created by the National Cybersecurity Authority (Article 15 (5)(b));
  • maintain a comprehensive ICT asset inventory (Article 15(5)(c));
  • report significant incidents to the National Cybersecurity Authority and to recipients of the services affected (Article 16);
  • designate an appropriate skilled staff member as Information and Communication Systems Security Officer, who will be responsible for i) monitoring the compliance of the entity with the legal requirements for cybersecurity risk management and incident reporting requirements and ii) communicating with the National Cyber Security Authority (Article 15(5)(a)).

Continue reading

  • no results

Previous topic
Back to top