Waselius & Wist Navigation
  • Our team
  • In Focus
    • Recent Work
    • News
    • Legal Updates
    • Publications
    • Rankings
    • Blog
    • Pykälät töissä podcast
    • Newsletter
  • About Us
    • Corporate Social Responsibility
    • ESG Initiatives
  • Expertise
    • Banking and Finance
    • Capital Markets
    • Corporate and Commercial
    • Corporate governance and Investigations
    • Data Protection
    • Dispute Resolution
    • Employment and Incentives
    • Energy and Natural Resources
    • EU and Competition
    • Financial Regulatory and Compliance
    • Insurance
    • Intellectual Property and Technology
    • Marketing
    • Mergers and Acquisitions
    • Private Equity
    • Real Estate
    • Restructuring and Insolvency
    • Tax and Structuring
  • Careers
    • Lawyers
    • Law students
    • Support staff
    • Open Positions
    • Contact
  • Contact
  • Our team
  • In Focus
    • Recent Work
    • News
    • Legal Updates
    • Publications
    • Rankings
    • Blog
    • Pykälät töissä podcast
    • Newsletter
  • About Us
    • Corporate Social Responsibility
    • ESG Initiatives
  • Expertise
    • Banking and Finance
    • Capital Markets
    • Corporate and Commercial
    • Corporate governance and Investigations
    • Data Protection
    • Dispute Resolution
    • Employment and Incentives
    • Energy and Natural Resources
    • EU and Competition
    • Financial Regulatory and Compliance
    • Insurance
    • Intellectual Property and Technology
    • Marketing
    • Mergers and Acquisitions
    • Private Equity
    • Real Estate
    • Restructuring and Insolvency
    • Tax and Structuring
  • Careers
    • Lawyers
    • Law students
    • Support staff
    • Open Positions
    • Contact
  • Contact
In Focus
Home In Focus Covid-19 and remote work: GDPR applies even when working from home

Legal Updates01.04.2020

Covid-19 and remote work: GDPR applies even when working from home

Due to the Covid-19 outbreak more employees than ever work remotely.  Even in these special circumstances where remote work is next to the new normal and where many employers face enormous pressure on only being able to continue their business operations, it is crucial for the employer to remember that its responsibilities and obligations under the GDPR, and any other applicable data protection legislation, nevertheless continue. Even if employees are working from home it is, ultimately, the employer who is responsible for all applicable data protection legislation compliance.

Below we have gathered a few considerations relating to remote work and the processing of personal data relating to employees, customers and other business partners.

Managing the secure processing of personal data

Employers (controller) must, under the GDPR see to that personal data is processed in a secure manner, meaning that appropriate technical and organizational measures must be in place to secure the processing of any personal data. It is up to the employer to decide what is or is not an appropriate measure – what can this in practice mean?

  • Updating the risk assessment

In practice the above entails that each employer should carry out its own risk assessment and in this way identify the possible threats to any employee, customer or other personal data processed within its organization. The risk assessment must consider the nature of data processed (special category data or not for example) and foresee any threats that may take use of the organization’s processes or technical systems. When working remotely, unsupervised, lost and stolen devices obviously impose an increased security risk for personal data as well as work performed in public spaces (unsecure public wifi connections and visual hacking).

  • Implementing appropriate security measures

While the GDPR does not provide for any mandatory methods on how the processing of personal data can be secured, the GDPR still provides a list of items that may be considered suitable when processing personal data, such as pseudonymization or encryption. Pseudonymized personal data is still personal data but it can no longer be attributed to a specific person without the use of additional information. Encryption again means that personal data is converted into a code so that its contents cannot be read and understood. Should an employee laptop be lost, for example, a third party could not get access to the personal data without the encryption key or, in case of pseudonymized data, without having the missing information for pseudonymized data.

Additional security measures to be considered include, to name a few, security and authorization policies (setting forth security measures and allowing access to personal data only to those employees who need this in order to fulfil their work tasks), controlling access to devices (only strong passwords allowed), secured internet connections, prohibition to use public wifi for work related matters, updated software and appropriate antivirus software on all remote work devices.

The employer should also in these circumstances regularly test, assess and evaluate the effectiveness of its technical and organizational measures. In this connection, the employer should also remind and educate its employees of the acceptable use and rules relating to the employer’s network, software, internet connection and device. This way the employees are, again, made aware of their rights and obligations towards the employer and what work conditions apply when working remotely.

Bring your own device (BYOD)

Employers applying the “bring you own device” principle should pay specific attention to personal data being processed in a secure way. Even if the employee’s own devices are not employer owned, the employee should be made aware that security policies of the employer organization also apply for these devices. The employer should see to that it has a proper BYOD policy in place and that all employees read, sign, and understand the policy so that they are aware of their responsibilities. A BYOD policy should naturally include instructions on the acceptable use of the device, security information (e.g. how and where personal data shall be stored and kept secure, password policy, information on which third party apps may/may not be installed, employer’s right to disconnect the device if lost etc.). The employer should also see to that any (customer) data on the employee’s own device can be retained and controlled in the event the employee decides to leave the organization.

Understanding the incident management process – Finnish National Cybersecurity Centre warns of Covid-19 relating scams

Employee negligence to employer’s trainings, guidelines and rules on the processing of personal data together with phishing scams and fraudulent websites aimed at employees pose a great security risk for the employer. A data breach may, however, also stem from very simple and minor employee action such as sending emails containing personal data to wrong recipients.

Employers must be able to quickly recognize, mitigate and respond to any security incident and should review their incident management processes in order to assure that they have the capabilities to act as required. Under the GDPR certain breaches must be reported within 72 hours to the relevant regulator (in Finland the Office of the Data Protection Ombudsman) and/or data subjects without undue delay. Employers should also communicate to their employees that any data breach must immediately be reported to the employer. Additionally, employees should also be educated to identify data breaches since data breaches are not always obvious, may come in many different forms and can be a result of both accidental and deliberate causes.

Employers should also remember the GDPR requirement that controllers (employers) must document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. This documentation may retrospectively be examined by the regulator should the regulator undertake any regulatory investigations of the data breach.

For further information please contact:

Charlotta Sittnikow

Counsel

Share:
Image

Contact info

Eteläesplanadi 24 A
00130 Helsinki, Finland

+358 9 668 9520
+358 9 668 95 222
info@waselius.fi

Quick links

  • Our Team
  • In Focus
  • About Us
  • Expertise
  • Careers

E-invoicing

E-address: 003710525214
Operator: Apix Messaging Oy
Service ID: 003723327487


BUSINESS ID 1052521-4
VAT ID FI10525214

Legal notice
Privacy notice
General Terms and Conditions

© 2025 Waselius Attorneys Ltd

This website uses cookies to compile statistical data on the use of our website in order to enable us to evaluate and improve our site. OK Decline Cookie Policy
Manage Cookies

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
_lfa2 yearsMarketing & analytics (website visitor tracking) using Leadfeeder
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT