Data Protection in Slovenia

Security in Slovenia

The GDPR is not prescriptive about specific technical standards or measures. Rather, the GDPR adopts a proportionate, context-specific approach to security. Article 32 GDPR states that controllers and processors shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk of the processing. In so doing, they must take account of the state of the art, the costs of implementation, and the nature, scope, context, and purposes of processing. A 'one size fits all' approach is therefore the antithesis of this requirement.

However, the GDPR does require controllers and processors to consider the following when assessing what might constitute adequate security:

  1. The pseudonymization and encryption of personal data;
  2. The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
  3. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and
  4. A process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.

ZVOP-2 provides no general additional requirements in relation to security measures. In the context of archiving, scientific or historical research purposes or statistical purposes, the ZVOP-2 sets out specific rules including anonymization or pseudonymization requirements.

Security measures are also detailed for each special regime but resemble the GDPR.

However, Article 22 ZVOP-2 provides additional requirements regarding data security by prescribing the so‑called "processing log" (dnevnik obdelave), namely by specifying:

  • who must ensure processing logs;
  • for which processing activities;
  • what the processing log must contain;
  • for which purposes the processing log can be used; and
  • data retention periods in processing logs.

Article 23 ZVOP-2 specifies data security requirements in the field of special processing. These requirements apply to particularly risky information systems processing large amounts of sensitive, confidential, or otherwise protected data, including special categories of personal data.

Article 21 ZVOP-2 also includes provisions related to the protection of personal data in proceedings related to such personal data.

Continue reading

  • no results

Previous topic
Back to top