§ 64 BDSG
Requirements for the security of data processing
(1)The controller and the processor shall, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, in particular as regards the processing of special categories of personal data.
(2)With respect to automated processing, the controller or the processor shall, following an evaluation of the risks, implement measures designed to 1 deny unauthorised persons access to processing equipment used for processing (equipment access control),; 2 prevent the unauthorised reading, copying, modification or removal of data media (data media control),; 3 prevent the unauthorised input of personal data and the unauthorised inspection, modification or deletion of stored personal data (storage control),; 4 prevent the use of automated processing systems by unauthorised persons using data communication equipment (user control),; 5 ensure that persons authorised to use an automated processing system have access only to the personal data covered by their access authorisation (data access control),; 6 ensure that it is possible to verify and establish the bodies to which personal data have been or may be transmitted or made available using data communication equipment (transmission control),; 7 ensure that it is subsequently possible to verify and establish which personal data have been input into automated processing systems, and when and by whom the personal data were input (input control),; 8 prevent the unauthorised reading, copying, modification or deletion of personal data during transfers of personal data or during the transport of data media (transport control),; 9 ensure that installed systems may, in the case of interruption, be restored (recovery),; 10 ensure that the functions of the system perform, that the appearance of faults in the functions is reported (reliability) and; 11 ensure that personal data stored cannot be corrupted by means of a malfunctioning of the system (integrity).
(3)The controller shall, with respect to the processing of personal data in the controller's organisational unit, designate one or more system administrators. The controller shall assign, limit or revoke access authorisations and processing rights in accordance with the need-to-know principle.