Technical and Organizational Measures (TOMs)
To protect personal data, we implement a variety of technical and organizational measures (TOMs) in accordance with Art. 32 GDPR (DSGVO). These measures ensure the confidentiality, integrity, availability, and resilience of systems and services that process personal data. This page provides an overview of the security measures implemented by Lumi Education UG (haftungsbeschränkt).
Responsible Entity
The responsible entity according to Art. 4 No. 7 GDPR is:
Lumi Education UG (haftungsbeschränkt)
Brückenstraße 8
38312 Ohrum
Germany
Email: [email protected]
The company is legally represented by Jan Philip Schellenberg.
Data Protection Officer
We have appointed an external Data Protection Officer (DPO):
heyData GmbH
Schützenstraße 5
10117 Berlin
Germany
Website: https://www.heydata.eu
Email: [email protected]
Confidentiality
Confidentiality ensures that personal data is protected from unauthorized access.
Physical Access Control
Measures prevent unauthorized persons from accessing systems that process personal data.
Examples include:
Employees are instructed not to work in public environments (e.g. cafés)
Work is primarily performed in home office environments
Employees are instructed to work in separate workspaces whenever possible
These measures reduce the risk of unauthorized physical access to devices and data.
System Access Control
Measures ensure that only authorized users can access systems.
Implemented safeguards include:
authentication using username and password
firewalls protecting infrastructure
disk encryption on devices
encrypted laptops and tablets
user role and permission management
two-factor authentication
visitor logging where applicable
requirement to lock devices when leaving workstations
Data Access Control
Access to personal data is restricted according to user roles.
Measures include:
logging of data access and system activities
limiting the number of system administrators
central user permission management
use of screen privacy filters where appropriate
internal policies limiting printing of personal data
controlled deletion procedures for personal data
Separation of Data
Measures ensure that data collected for different purposes is processed separately.
Examples include:
separation of production and testing environments
separate storage of pseudonymization mapping files
implementation of a permission and authorization concept
database-level access control
internal procedures to anonymize or pseudonymize data whenever possible
Integrity
Integrity ensures that personal data cannot be altered or manipulated without authorization.
Secure Data Transfer
To prevent unauthorized access during transmission or storage, the following safeguards are implemented:
encrypted Wi-Fi connections (WPA2)
logging of data access and transfers
secure transmission via encrypted protocols such as HTTPS or SFTP
use of cryptographic signing procedures where applicable
Input Control
Input control ensures traceability of who entered, modified, or deleted data.
Measures include:
logging of data entry, modification, and deletion
traceability through individual user accounts
permission-based control of data editing
clearly defined responsibilities for data deletion
internal procedures for controlled data removal
Availability and Resilience
To ensure the availability of services and protect against data loss, the following safeguards are implemented:
regular automated backups
documented backup and recovery procedures
hosting with professional infrastructure providers
These measures ensure that personal data remains available and protected against accidental loss or destruction.
Security Management and Review Processes
We regularly review and improve our data protection measures.
Data Protection Management
Organizational safeguards include:
use of the heyData platform for privacy management
appointment of an external Data Protection Officer
confidentiality agreements for employees
regular employee training on data protection
maintenance of a record of processing activities (Art. 30 GDPR)
Incident Response Management
Procedures are in place for responding to potential data protection incidents.
These include:
procedures for reporting data breaches to authorities (Art. 33 GDPR)
procedures for notifying affected individuals (Art. 34 GDPR)
involvement of the Data Protection Officer in incidents
use of security tools such as firewalls
Privacy by Design and Privacy by Default
Our platform is developed according to the principles of Art. 25 GDPR.
This includes:
internal training on privacy by design and privacy by default
collection of only the personal data necessary for the service provided
Processor Control
When subprocessors are used, we ensure that data processing follows strict requirements.
Measures include:
written data processing agreements (DPAs)
secure deletion of data after the end of processing
confirmation that subcontractors also commit employees to confidentiality
careful selection of subprocessors
continuous monitoring of subcontractors and their activities
Questions
If you have questions regarding our technical and organizational measures, data protection practices, or our Data Processing Agreement (AAV), please contact: