Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
|
wiki:standard-datenschutzmodell:v20:teil_e:e4 [17.11.2019 14:23] Administrator angelegt |
wiki:standard-datenschutzmodell:v20:teil_e:e4 [17.11.2019 14:36] (aktuell) Administrator |
||
|---|---|---|---|
| Zeile 1: | Zeile 1: | ||
| === E4 Stichwortverzeichnis === | === E4 Stichwortverzeichnis === | ||
| - | Nicht übernommen. | + | AK Technik................................................................................................................................59\\ |
| + | Anonymisierung.......................................................................................................................16\\ | ||
| + | Anordnung................................................................................................................................14\\ | ||
| + | Aufsichtsbehörde.....................................................................................................................23\\ | ||
| + | Auftragsverarbeiter......................................................................................................11, | ||
| + | Ausgangsrisiko..........................................................................................................................45\\ | ||
| + | Authentifizierung..........................................................................................................13, | ||
| + | Belastbarkeit.................................................................................................................22, | ||
| + | Benachrichtigungspflicht..........................................................................................................14\\ | ||
| + | Berichtigung.......................................................................................................................13, | ||
| + | Betriebskonzept.......................................................................................................................58\\ | ||
| + | Betroffenenrecht................................................................................................................13, | ||
| + | Beurteilen.................................................................................................................................53\\ | ||
| + | BSI-Baustein „CON.2 Datenschutz“..........................................................................................58\\ | ||
| + | BSI-Grundschutz.................................................................................................................44, | ||
| + | BSI-Grundschutzkonzept..........................................................................................................10\\ | ||
| + | BSI-Standard 200-2...................................................................................................................58\\ | ||
| + | Change-Request.......................................................................................................................59\\ | ||
| + | Charta der Grundrechte der Europäischen Union...................................................................11\\ | ||
| + | Data Protection by Default...........................................................................................21, | ||
| + | Data Protection by Design........................................................................................................35\\ | ||
| + | Datenformat.............................................................................................................................39\\ | ||
| + | Datenminimierung.............................................................................5, | ||
| + | Datenpanne..............................................................................................................................14\\ | ||
| + | Datenschutz-Folgenabschätzung.................................................................8, | ||
| + | Datenschutzkonferenz.............................................................................................................10\\ | ||
| + | Datenschutzmanagement..................................................................................................36, | ||
| + | Datenschutzmanagement-Prozess.....................................................................................48, | ||
| + | datenschutzrechtliche Anforderungen....................................................................................12\\ | ||
| + | Datenschutzverletzung.......................................................................................................14, | ||
| + | Datenübertragbarkeit.........................................................................................................14, | ||
| + | Diskriminierungsfreiheit.........................................................................................14, | ||
| + | Dokumentation........................................................................................................................32\\ | ||
| + | Dokumentieren........................................................................................................................53\\ | ||
| + | Drittland...................................................................................................................................24\\ | ||
| + | Einschränkbarkeit der Verarbeitung..................................................................................13, | ||
| + | Einschränkung der Verarbeitung........................................................................................19, | ||
| + | Eintrittswahrscheinlichkeit.......................................................................................................40\\ | ||
| + | Einwilligung............................................................................................................14, | ||
| + | elektronische Signatur..............................................................................................................31\\ | ||
| + | elektronisches Siegel................................................................................................................31\\ | ||
| + | EU-Datenschutz-Grundverordnung..........................................................................................11\\ | ||
| + | Europäischer Datenschutzausschuss.......................................................................................43\\ | ||
| + | Europäischer Gerichtshof.........................................................................................................16\\ | ||
| + | Evaluation.................................................................................................................................46\\ | ||
| + | Evaluierbarkeit.......................................................................................................14, | ||
| + | Fachapplikation........................................................................................................................37\\ | ||
| + | Fachverfahren..........................................................................................................................37\\ | ||
| + | Forschung.................................................................................................................................17\\ | ||
| + | Freigabe....................................................................................................................................33\\ | ||
| + | geringes Risiko..........................................................................................................................45\\ | ||
| + | Geschäftsprozess..........................................................................................................37, | ||
| + | Gewährleistungsziel........................................................................5, | ||
| + | Grundsätze der Verarbeitung...................................................................................................11\\ | ||
| + | Grundschutz-Kompendium......................................................................................................57\\ | ||
| + | hohes Risiko........................................................................................................................12, | ||
| + | Identifizierung........................................................................................................13, | ||
| + | Implementieren........................................................................................................................53\\ | ||
| + | individuelle Maßnahme...........................................................................................................47\\ | ||
| + | Informationssicherheit.............................................................................................................44\\ | ||
| + | Integrität.................................................................................................5, | ||
| + | Interoperabilität.......................................................................................................................20\\ | ||
| + | Intervenierbarkeit..........................................................................................................5, | ||
| + | Ist-Wert....................................................................................................................................56\\ | ||
| + | IT-Planungsrat............................................................................................................................6\\ | ||
| + | IT-Sicherheit.............................................................................................................................58\\ | ||
| + | Konferenz der unabhängigen Datenschutzbehörden des Bundes und der Länder.................58\\ | ||
| + | Kontrollieren.............................................................................................................................53\\ | ||
| + | Kryptokonzept..........................................................................................................................31\\ | ||
| + | Leistungs-und Verhaltenskontrolle.........................................................................................47\\ | ||
| + | Löschen.........................................................................................................................13, | ||
| + | Maßnahmen...............................................................................................................................8\\ | ||
| + | Meldepflicht.............................................................................................................................14\\ | ||
| + | Muss-Liste.................................................................................................................................43\\ | ||
| + | Nachweispflicht..................................................................................................................18, | ||
| + | Nationale E-Government-Strategie............................................................................................6\\ | ||
| + | Nichtverkettung..............................................................................................................5, | ||
| + | normales Risiko........................................................................................................................45\\ | ||
| + | Notfallkonzept..........................................................................................................................31\\ | ||
| + | Notfallplanung..........................................................................................................................22\\ | ||
| + | öffentliche Gewalt....................................................................................................................50\\ | ||
| + | öffentliches Interesse...............................................................................................................50\\ | ||
| + | PDCA-Zyklus..............................................................................................................................48\\ | ||
| + | Pilotbetrieb...............................................................................................................................54\\ | ||
| + | Planen.......................................................................................................................................53\\ | ||
| + | Profiling....................................................................................................................................21\\ | ||
| + | Protokoll...................................................................................................................................56\\ | ||
| + | Protokollieren...........................................................................................................................53\\ | ||
| + | Protokollierung.........................................................................................................................33\\ | ||
| + | Prozess......................................................................................................................................39\\ | ||
| + | Prüfen.......................................................................................................................................53\\ | ||
| + | Prüfsumme...............................................................................................................................31\\ | ||
| + | Pseudonymisierung............................................................................................................16, | ||
| + | Rechenschaftspflicht....................................................................................................18, | ||
| + | Rechte-und Rollen-Konzept.....................................................................................................31\\ | ||
| + | Rechtsgrundlage.........................................................................................................................7\\ | ||
| + | Redundanz................................................................................................................................30\\ | ||
| + | Referenzmaßnahmen...............................................................................................................30\\ | ||
| + | Referenzmaßnahmen-Katalog.......................................................................5, | ||
| + | Restrisiko......................................................................................................................41, | ||
| + | Revisionsfähigkeit.....................................................................................................................51\\ | ||
| + | Richtigkeit.................................................................................................................................17\\ | ||
| + | Risiko..........................................................................................................................7, | ||
| + | Risikoakzeptanz........................................................................................................................42\\ | ||
| + | Risikobeschränkung..................................................................................................................46\\ | ||
| + | Risikohöhe..........................................................................................................................45, | ||
| + | Risikomanagement...................................................................................................................42\\ | ||
| + | Risikotransfer...........................................................................................................................42\\ | ||
| + | Robustheit................................................................................................................................47\\ | ||
| + | Schaden....................................................................................................................................40\\ | ||
| + | Schadensereignis......................................................................................................................40\\ | ||
| + | Schadsoftware..........................................................................................................................30\\ | ||
| + | Schnittstelle........................................................................................................................32, | ||
| + | Schutzbedarf.............................................................................................................................41\\ | ||
| + | Schutzbedarfsstufe.............................................................................................................45, | ||
| + | Schutzniveau..................................................................................................................7, | ||
| + | Schwellwertanalyse..................................................................................................................48\\ | ||
| + | Schwellwert-Analyse................................................................................................................42\\ | ||
| + | Sicherheitskopie.......................................................................................................................30\\ | ||
| + | Single Point of Contact.............................................................................................................34\\ | ||
| + | Soll-Ist-Bilanz............................................................................................................................47\\ | ||
| + | Soll-Wert...................................................................................................................................54\\ | ||
| + | Speicherbegrenzung.................................................................................................................17\\ | ||
| + | Spezifikation.............................................................................................................................46\\ | ||
| + | Spezifizieren.......................................................................................................................51, | ||
| + | Stand der Technik.......................................................................................................................8\\ | ||
| + | Statistik.....................................................................................................................................17\\ | ||
| + | technische Systeme..................................................................................................................39\\ | ||
| + | technische und organisatorische Maßnahmen..................................................7, | ||
| + | Testbetrieb...............................................................................................................................54\\ | ||
| + | Transparenz..................................................................................................5, | ||
| + | Übermittlung............................................................................................................................50\\ | ||
| + | Verantwortlicher................................................................................................................11, | ||
| + | Verantwortlichkeit....................................................................................................................39\\ | ||
| + | Verarbeitung.......................................................................................................................36, | ||
| + | Verarbeitungsprozesse.............................................................................................................39\\ | ||
| + | Verarbeitungstätigkeit...................................................................................................8, | ||
| + | Verbessern................................................................................................................................53\\ | ||
| + | Vereinbarung............................................................................................................................50\\ | ||
| + | Verfügbarkeit................................................................................................5, | ||
| + | Verschlüsselung........................................................................................................................32\\ | ||
| + | Verschwiegenheitspflicht.........................................................................................................18\\ | ||
| + | Vertrag......................................................................................................................................50\\ | ||
| + | Vertraulichkeit........................................................................................5, | ||
| + | Vertretungsregelung................................................................................................................31\\ | ||
| + | Verzeichnis der Verarbeitungstätigkeiten....................................................................18, | ||
| + | Vollprotokollierung..................................................................................................................47\\ | ||
| + | Voreinstellungen......................................................................................................................21\\ | ||
| + | Weiterverarbeitung............................................................................................................15, | ||
| + | Widerruf...................................................................................................................................23\\ | ||
| + | Widerspruch.............................................................................................................................33\\ | ||
| + | Wiederherstellbarkeit..............................................................................................................22\\ | ||
| + | Wirkbetrieb..............................................................................................................................54\\ | ||
| + | Zuständigkeit............................................................................................................................40\\ | ||
| + | Zweckabgrenzung.....................................................................................................................38\\ | ||
| + | Zweckänderung........................................................................................................................51\\ | ||
| + | Zweckbindung..............................................................................................................13, | ||
| + | Zweckbindungsgrundsatz.........................................................................................................15\\ | ||
| + | Zwecktrennung.........................................................................................................................38\\ | ||