YOU MIGHT ALSO LIKE
ASSOCIATED TAGS
appropriate  breach  breaches  compliance  encryption  measures  organizations  personal  principle  privacy  protection  secure  security  technical  things  
LATEST POSTS

What Is the Principle 4 Security of Personal Data—and Why It’s Not Just About Locking Things Down?

And that’s where things get messy.

Where Principle 4 Fits in the Data Protection Puzzle

The concept of data protection isn’t new. It evolved slowly, like sedimentary rock, layer by layer, until the EU’s GDPR crystallized it into seven core principles. Principle 4—security of processing—sits right in the middle, both literally and philosophically. Before it, you have fairness, purpose limitation, data minimization. After it, accuracy, storage limits, accountability. But this one? It’s the hinge. The others depend on it holding. If security fails, the rest crumble like wet cardboard. You can collect data fairly, limit its use, minimize what you take—but if it leaks, none of that matters.

And yet, people don’t think about this enough: Principle 4 isn’t just about preventing hackers from walking off with databases. It’s about resilience. It’s about knowing what happens when things go wrong—which they will. Because breaches aren’t outliers. They’re inevitabilities. The average cost of a data breach in 2023? $4.45 million. Up 15% from three years prior. In healthcare, it’s nearly double. So yes, security measures are mandatory. But more than that—they’re economic survival.

The Legal Definition: What the Law Actually Says

Under GDPR Article 5(1)(f), personal data must be “processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures.” That’s the full sentence. Dry, dense, packed with legalese. But the key word here is “appropriate.” Not maximum. Not perfect. Appropriate. Which means context-dependent. A small nonprofit running a volunteer database doesn’t need military-grade encryption. A bank storing biometric login data? Different story. The law expects proportionality. Risk-based thinking. Judgment calls.

Why “Appropriate” Is the Most Dangerous Word in Data Law

“Appropriate” sounds reasonable. Flexible. Sensible. But it’s also a trap. Because it gives cover to underinvestment. To cutting corners. To saying, “We did what we could,” after a breach exposes 10 million records. The issue remains: who decides what’s appropriate? And based on what? The regulation points to factors like the state of the art, implementation costs, the nature of the data, and the risk to individuals. That’s 17 variables if you unpack it. Most companies assess three. At best. And that’s exactly where compliance starts to rot from the inside.

How Security Measures Actually Work in Real Organizations

Let’s take a real case: a mid-sized SaaS company in Berlin. They handle HR data for clients across Europe. Nothing classified. But names, addresses, salary details, performance reviews—plenty to ruin lives if leaked. Their “security strategy”? Two-factor authentication for employees, encrypted databases, quarterly vulnerability scans, and a one-day security training module during onboarding. Sounds solid? Maybe. But their backup server was left accessible via an unsecured API endpoint for 11 days in early 2022. Why? Because the DevOps lead assumed the cloud provider handled it. They didn’t. A researcher found it, reported it, no data was stolen. But it was close. Too close.

That changes everything when you realize: technical controls fail not because they’re weak, but because they’re disconnected. Firewalls don’t talk to training programs. Encryption keys aren’t rotated because no one owns the process. People skip steps because the system makes it hard to do the right thing. Security isn’t a feature. It’s a culture. And cultures take years to build. You can’t audit your way into one.

Technical Measures: More Than Just Encryption

Encryption is the poster child of data security. And sure, encrypting data at rest and in transit should be baseline. But it’s not magic. If your decryption keys are stored on the same server, or if an admin account is compromised, encryption becomes theater. Real protection means segmentation, access controls, zero-trust models. Think of it like a high-security building: guards at the door are good, but useless if every janitor has a master key. Modern tools—like tokenization, differential privacy, or hardware security modules—add layers. But they cost money. Time. Expertise. Small firms often skip them. Not out of ignorance. Out of necessity.

Organizational Measures: The Human Firewall

Here’s the uncomfortable truth: most breaches start with a human. A phishing email. A misconfigured cloud bucket. A password written on a sticky note. No amount of software fixes that. You need policies. Training. Clear roles. Incident response plans that don’t gather dust. One study found that companies with regular simulated phishing drills reduced successful attacks by 67% over 18 months. Another showed that documented data protection roles (like DPO appointments) correlated with faster breach reporting—cutting average notification time from 42 to 19 days. Structure shapes behavior. But because these measures don’t show up in penetration tests, they’re often deprioritized.

Data Security vs. Privacy: Why People Confuse the Two

You’d think security and privacy were twins. They’re not. They’re cousins who show up to the same family reunion but argue over politics. Security is about protecting data from harm—like a lock on a door. Privacy is about how data is used—like whether anyone should have entered the room in the first place. You can have strong security and terrible privacy (think: a well-protected database of facial recognition scans collected without consent). You can have weak security and decent privacy (a small dataset, minimally used, but poorly stored). Principle 4 deals with the first. The others handle the second. Conflating them leads to bad decisions—like spending $200,000 on encryption while ignoring whether the data should exist at all.

Security Without Purpose Is Waste

I am convinced that too many organizations obsess over securing data they shouldn’t have collected in the first place. That’s backward. Imagine buying a vault to store junk mail. It’s secure. But why do you have it? Data minimization—Principle 1—should come before security. Because less data means fewer targets, lower risk, simpler compliance. A hospital that retains patient records for 30 years “just in case” isn’t being cautious. It’s being reckless. Every extra year multiplies exposure. And honestly, it is unclear how many organizations calculate that cost.

The Cost of Over-Securing Low-Risk Data

One fintech startup I reviewed spent 14% of its IT budget on securing internal employee feedback forms—anonymous surveys stored in a password-protected tool. Meanwhile, their customer support logs, which included partial payment references, used basic access controls. Priorities were upside down. Risk isn’t measured in data volume. It’s measured in impact. A spreadsheet with 10,000 email addresses is dangerous. One with 50 employee satisfaction scores? Not so much. The problem is, compliance checklists treat all personal data the same. They don’t account for nuance. And that’s where common sense should kick in—but often doesn’t.

Frequently Asked Questions

Does Principle 4 Require Encryption?

No. The law doesn’t mandate specific technologies. It demands “appropriate” measures. Encryption is usually appropriate for sensitive data—like health records or financial details. But for a public directory of office phone numbers? Overkill. The decision should stem from a risk assessment, not a default setting. Many regulators, including the UK ICO, list encryption as a best practice but stop short of requiring it in all cases. Context rules.

What Happens If We Breach Principle 4?

Depends. The GDPR allows fines up to €20 million or 4% of global turnover—whichever is higher. But fines aren’t automatic. Regulators look at intent, remediation, prior record. A company that detects its own breach, reports it within 72 hours, and fixes the flaw fast will face lower penalties than one that ignores warnings. Reputation damage, though? That’s harder to contain. One survey found that 68% of consumers stopped doing business with a company after a data breach. Trust evaporates fast.

Can Cloud Providers Fulfill Our Security Obligations?

No. You can outsource infrastructure, but not accountability. If you use AWS, Azure, or Google Cloud, they secure the platform. You secure the data on it. Misconfigurations—like public S3 buckets—are your fault, not theirs. Shared responsibility models make this clear, yet breaches keep happening. Why? Because teams assume “cloud = secure.” We’re far from it. A 2021 study found 73% of cloud breaches stemmed from customer error, not provider failure.

The Bottom Line

Principle 4 isn’t about achieving impenetrable security. That’s a fantasy. It’s about showing you’ve thought deeply about risk, acted reasonably, and built systems that adapt when flaws emerge. The strongest defenses aren’t perfect. They’re visible. Auditable. Continuously improved. My recommendation? Start with a simple question: “If this dataset vanished tomorrow, who would be harmed—and how badly?” Answer that. Then design your safeguards around real impact, not regulatory checkboxes. Because in the end, security isn’t a compliance task. It’s a promise. And we all know how rare those are. Suffice to say, treating it like a formality is a gamble no one can afford.

💡 Key Takeaways

  • Is 6 a good height? - The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.
  • Is 172 cm good for a man? - Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately.
  • How much height should a boy have to look attractive? - Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man.
  • Is 165 cm normal for a 15 year old? - The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too.
  • Is 160 cm too tall for a 12 year old? - How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 13

❓ Frequently Asked Questions

1. Is 6 a good height?

The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.

2. Is 172 cm good for a man?

Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately. So, as far as your question is concerned, aforesaid height is above average in both cases.

3. How much height should a boy have to look attractive?

Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man. Dating app Badoo has revealed the most right-swiped heights based on their users aged 18 to 30.

4. Is 165 cm normal for a 15 year old?

The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too. It's a very normal height for a girl.

5. Is 160 cm too tall for a 12 year old?

How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 137 cm to 162 cm tall (4-1/2 to 5-1/3 feet). A 12 year old boy should be between 137 cm to 160 cm tall (4-1/2 to 5-1/4 feet).

6. How tall is a average 15 year old?

Average Height to Weight for Teenage Boys - 13 to 20 Years
Male Teens: 13 - 20 Years)
14 Years112.0 lb. (50.8 kg)64.5" (163.8 cm)
15 Years123.5 lb. (56.02 kg)67.0" (170.1 cm)
16 Years134.0 lb. (60.78 kg)68.3" (173.4 cm)
17 Years142.0 lb. (64.41 kg)69.0" (175.2 cm)

7. How to get taller at 18?

Staying physically active is even more essential from childhood to grow and improve overall health. But taking it up even in adulthood can help you add a few inches to your height. Strength-building exercises, yoga, jumping rope, and biking all can help to increase your flexibility and grow a few inches taller.

8. Is 5.7 a good height for a 15 year old boy?

Generally speaking, the average height for 15 year olds girls is 62.9 inches (or 159.7 cm). On the other hand, teen boys at the age of 15 have a much higher average height, which is 67.0 inches (or 170.1 cm).

9. Can you grow between 16 and 18?

Most girls stop growing taller by age 14 or 15. However, after their early teenage growth spurt, boys continue gaining height at a gradual pace until around 18. Note that some kids will stop growing earlier and others may keep growing a year or two more.

10. Can you grow 1 cm after 17?

Even with a healthy diet, most people's height won't increase after age 18 to 20. The graph below shows the rate of growth from birth to age 20. As you can see, the growth lines fall to zero between ages 18 and 20 ( 7 , 8 ). The reason why your height stops increasing is your bones, specifically your growth plates.