<?xml version="1.0" encoding="UTF-8"?><toc><section id="foreword.nat"><title>Foreword</title></section><section id="introduction.nat"><title>Introduction</title></section><section id="sub-1"><label>1</label><title>Scope</title></section><section id="sub-2"><label>2</label><title>Normative references</title></section><section id="sub-3"><label>3</label><title>Terms and definitions</title><section id="sub-3.1"><label>3.1</label><title>Anonymity assessment</title></section><section id="sub-3.2"><label>3.2</label><title>Approved security function</title></section><section id="sub-3.3"><label>3.3</label><title>Architectural blueprint</title></section><section id="sub-3.4"><label>3.4</label><title>Bitcoin</title></section><section id="sub-3.5"><label>3.5</label><title>Cryptographic algorithm</title></section><section id="sub-3.6"><label>3.6</label><title>Cryptographic key</title></section><section id="sub-3.7"><label>3.7</label><title>Certificate</title></section><section id="sub-3.8"><label>3.8</label><title>Decentralized application</title></section><section id="sub-3.9"><label>3.9</label><title>Distributed ledger</title></section><section id="sub-3.10"><label>3.10</label><title>Distributed ledger technology</title></section><section id="sub-3.11"><label>3.11</label><title>Entity</title></section><section id="sub-3.12"><label>3.12</label><title>Entropy</title></section><section id="sub-3.13"><label>3.13</label><title>Ephemeral key</title></section><section id="sub-3.14"><label>3.14</label><title>Hashed object</title></section><section id="sub-3.15"><label>3.15</label><title>Hash value</title></section><section id="sub-3.16"><label>3.16</label><title>Input data</title></section><section id="sub-3.17"><label>3.17</label><title>Interoperability</title></section><section id="sub-3.18"><label>3.18</label><title>IT System</title></section><section id="sub-3.19"><label>3.19</label><title>Key management</title></section><section id="sub-3.20"><label>3.20</label><title>Ledger</title></section><section id="sub-3.21"><label>3.21</label><title>Off-chain</title></section><section id="sub-3.22"><label>3.22</label><title>On-chain</title></section><section id="sub-3.23"><label>3.23</label><title>Peer-to-peer</title></section><section id="sub-3.24"><label>3.24</label><title>Privacy by Design</title></section><section id="sub-3.25"><label>3.25</label><title>Organisational Measures</title></section><section id="sub-3.26"><label>3.26</label><title>Pruning</title></section><section id="sub-3.27"><label>3.27</label><title>Record</title></section><section id="sub-3.28"><label>3.28</label><title>Security function</title></section><section id="sub-3.29"><label>3.29</label><title>Technical Measures</title></section><section id="sub-3.30"><label>3.30</label><title>Timestamp</title></section><section id="sub-3.31"><label>3.31</label><title>Trust</title></section><section id="sub-3.32"><label>3.32</label><title>Validation</title></section><section id="sub-3.33"><label>3.33</label><title>Validator</title></section></section><section id="sub-4"><label>4</label><title>Symbols and abbreviations</title></section><section id="sub-5"><label>5</label><title>Personal data</title><section id="sub-5.1"><label>5.1</label><title>Personal data in general</title></section><section id="sub-5.2"><label>5.2</label><title>Defining Personal data</title></section><section id="sub-5.3"><label>5.3</label><title>Practical consideration about identifiability and identifiers</title></section><section id="sub-5.4"><label>5.4</label><title>Identifying personal data in a blockchain context</title></section><section id="sub-5.5"><label>5.5</label><title>Requirement of an Anonymity assessment</title></section></section><section id="sub-6"><label>6</label><title>GDPR awareness</title></section><section id="sub-7"><label>7</label><title>Principles of data protection and their risks from the perspective of Privacy by Design</title><section id="sub-7.1"><label>7.1</label><title>General</title></section><section id="sub-7.2"><label>7.2</label><title>Fundamental principles of data protection</title></section><section id="sub-7.3"><label>7.3</label><title>Assessing the risk of processing personal data</title><section id="sub-7.3.1"><label>7.3.1</label><title>General</title></section><section id="sub-7.3.2"><label>7.3.2</label><title>Traditional risk assessment methodology</title></section><section id="sub-7.3.3"><label>7.3.3</label><title>Risk assessment from the perspective of data protection law</title></section></section><section id="sub-7.4"><label>7.4</label><title>Initial assessment of risks in a blockchain application</title></section></section><section id="sub-8"><label>8</label><title>Mitigating the risk of processing and decreasing identifiability through technical measures</title><section id="sub-8.1"><label>8.1</label><title>General</title></section><section id="sub-8.2"><label>8.2</label><title>Technical measures</title><section id="sub-8.2.1"><label>8.2.1</label><title>Categories of technical measures of data protection:</title></section><section id="sub-8.2.2"><label>8.2.2</label><title>Techniques to improve data protection or mitigate risk of processing</title></section></section><section id="sub-8.3"><label>8.3</label><title>Architectural blueprint for an IT system processing personal data utilizing a blockchain-based tamper-proof access log</title><section id="sub-8.3.1"><label>8.3.1</label><title>General</title></section><section id="sub-8.3.2"><label>8.3.2</label><title>DLT-based tamper-proof access log</title></section><section id="sub-8.3.3"><label>8.3.3</label><title>Decentralized Personal Data Storage</title></section><section id="sub-8.3.4"><label>8.3.4</label><title>Consent Management System</title></section></section></section><section id="sub-a"><label>Annex A</label><title>Recommendations for handling personal data in blockchain applications (normativ)</title></section><section id="sub-b"><label>Annex B</label><title>GDPR awareness (normativ)</title><section id="sub-b.1"><label>B.1</label><title>General</title></section><section id="sub-b.2"><label>B.2</label><title>Controllership and processors in a BC/DLT-system</title></section><section id="sub-b.3"><label>B.3</label><title>Right to Erasure (art. 17 GDPR)</title></section><section id="sub-b.4"><label>B.4</label><title>Justifications for immutability</title></section><section id="sub-b.5"><label>B.5</label><title>Right to rectification</title></section><section id="sub-b.6"><label>B.6</label><title>Data Portability (art. 20 GDPR)</title></section><section id="sub-b.7"><label>B.7</label><title>Processing Agreements between Controllers and Processors</title></section><section id="sub-b.8"><label>B.8</label><title>Household exemption</title></section><section id="sub-b.9"><label>B.9</label><title>Identification requirements for controllers</title></section><section id="sub-b.10"><label>B.10</label><title>Personal data vs Privacy enhancing technology (ISO/IEC 27018)</title></section><section id="sub-b.11"><label>B.11</label><title>Automated decision making (art. 22 GDPR)</title></section><section id="sub-b.12"><label>B.12</label><title>Staff training + obligation (art. 29 and art. 32(4) GDPR)</title></section><section id="sub-b.13"><label>B.13</label><title>Data protection impact assessment (art. 35 GDPR)</title></section><section id="sub-b.14"><label>B.14</label><title>Documentation + record of processing activities (art. 5(2) GDPR)</title></section><section id="sub-b.15"><label>B.15</label><title>Right to information (art. 13, 14 GDPR)</title></section><section id="sub-b.16"><label>B.16</label><title>Data minimization (Art. 5 (1) lit. c GDPR)</title></section><section id="sub-b.17"><label>B.17</label><title>Data Protection Officer (Art. 37 (1) GDPR)</title></section><section id="sub-b.18"><label>B.18</label><title>Privacy by Design &amp; Default</title></section><section id="sub-b.19"><label>B.19</label><title>Notification of data breach to authorities and data subjects (art. 33/34 GDPR)</title></section><section id="sub-b.20"><label>B.20</label><title>Right of access by the data subject</title></section><section id="sub-b.21"><label>B.21</label><title>Right to object (art. 21 GDPR)</title></section><section id="sub-b.22"><label>B.22</label><title>Transfer to third countries</title></section></section><section id="sub-c"><label>Annex C</label><title>Questionnaire: Extent of the implementation of data protection principles in a DLT, in particular blockchain solution (normativ)</title></section><section id="sub-d"><label>Annex D</label><title>Summary of applicable risk assessment methodologies (informativ)</title></section><section id="sub-e"><label>Annex E</label><title>Additional Information on Technical Measures (informativ)</title></section><section id="sub-annex.bibliography.nat"><title>Bibliography</title></section></toc>