Article 32 of the GDPR: why data security and accountability are the pillars of your compliance in 2026

In 2026, article 32 of the RGPD imposes a reinforced obligation of means, placing computer security at the heart of legal compliance. To ensure data protection, organizations must deploy technical and organizational measures that are proportionate to the risks (encryption, 2FA, resilience) while respecting the principle of Accountability. This responsibility requires proving the effectiveness of these devices in the face of tighter sanctions and the new requirements of the Digital Omnibus project.

By
Calixte Descamps
1
Min
Share this article
Computer security

Computer security has long been perceived as a simple technical layer relegated to specialized departments. However, under the umbrella of the General Data Protection Regulation (GDPR), it has established itself as the central hub of legal compliance. Article 32 of the GDPR does more than suggest precautions. It imposes a reinforced obligation of means which, if ignored, exposes organizations to unprecedented financial and reputational consequences. For organizations, understanding this interconnection between law, cybersecurity and accountability has become a vital necessity.

Webinar - Données de Santé
29 janvier 2026|11h00 - 12h00 : maîtrisez la conformité pour l'innovation et la recherche

Inscrivez-vous au webinar du 29 janvier pour maîtriser le cadre juridique complexe et les étapes clés de la conformité (RGPD, CNIL) encadrant la réutilisation des données de santé. Cette session vous fournira la méthodologie et les outils nécessaires pour sécuriser vos projets d'innovation clinique et d'optimisation des organisations.

Technical and organizational measures and the principle of Accountability

The text of Article 32 sets out a fundamental principle: the data controller and his subcontractor must implement appropriate technical and organizational measures in order to guarantee a level of security adapted to the risk. This concept of risk is central to any GDPR risk analysis. It means that security cannot be uniform. A structure dealing with health data will have to deploy a much more robust arsenal than a local store managing a traditional loyalty file.

At the heart of this requirement is Accountability. This principle of accountability requires organizations to not only be compliant, but to be in a position to prove it at any time. Security is no longer an end in itself, it becomes tangible proof of your Accountability. The regulation insists on four essential pillars: confidentiality, integrity, availability and resilience of systems. The major innovation lies in the obligation to test, analyze and regularly evaluate the effectiveness of these devices by constantly referring to the state of the technological art.

The impact of the Digital Omnibus project on European vigilance

The year 2026 is marked by the concrete implementation of the Digital Omnibus project. This European legislative framework aims to harmonize security obligations between the GDPR and the new directives on digital resilience. For data controllers, the impact is significant: the Digital Omnibus project reinforces the transparency required during audits and simplifies cooperation between European supervisory authorities.

Now, a security breach is no longer analyzed in isolation but in the context of your entire digital governance. This new situation increases the pressure on section 32, as the criteria for negligence have become more stringent. The documentation of your security measures, centralized on management tools, becomes your best defense against this transversal regulation.

A turning point in the severity of sanctions for lack of security

The supervisory authorities have toughened their tone, the news of the end of 2025 and the beginning of 2026 shows that the violation of personal data resulting from a lack of security is now the most frequent reason for sanctions.

  • The Nexpublica France case: in December 2025, a fine of 1.7 million euros was pronounced. The main complaint related directly to Article 32, as the company did not put in place sufficient protections for its data management software.
  • The Mobius sanction: still at the end of 2025, a fine of 1 million euros hit the Mobius company following a massive leak. The authority considered that the vulnerability exploited could have been avoided if basic security protocols had been respected.
  • The simplified procedure: the CNIL is also multiplying sanctions via its simplified procedure. Numerous decisions have been issued for amounts exceeding 100,000 euros, often targeting deficiencies in securing access for employees or lack of encryption.

These figures prove that impunity no longer exists. A security breach is now qualified as legal negligence involving the direct responsibility of the manager.

Webinar - Données de Santé
29 janvier 2026|11h00 - 12h00 : maîtrisez la conformité pour l'innovation et la recherche

Inscrivez-vous au webinar du 29 janvier pour maîtriser le cadre juridique complexe et les étapes clés de la conformité (RGPD, CNIL) encadrant la réutilisation des données de santé. Cette session vous fournira la méthodologie et les outils nécessaires pour sécuriser vos projets d'innovation clinique et d'optimisation des organisations.

Concrete risks and operational consequences for businesses

While administrative fines attract attention, the indirect risks are just as devastating. Business interruption is the first danger. A breach related to non-compliance with Article 32 often leads to a loss of data availability, paralyzing the company for several weeks.

The second major risk concerns civil liability. Article 82 of the GDPR allows anyone who has suffered damage to obtain compensation. Group actions are multiplying, transforming a technical error into a financial chasm linked to compensation. Finally, the brand image is permanently compromised. The loss of user trust is a damage that is much more difficult to repair than a simple computer system.

Best practices for robust and compliant security

To transform these obligations into a competitive advantage, several levers must be activated as a matter of priority.

  • Encryption and pseudonymization: these two techniques, explicitly mentioned by the RGPD, make it possible to make data unreadable for an unauthorized third party. In the event of data theft, if properly encrypted, the risk to individuals is considered to be zero or low, which can exempt the company from a humiliating public notification.
  • Strict management of authorizations: the principle of least privilege should be applied. Each employee should only have access to the data necessary for their missions. Access must be revoked immediately after an employee leaves
  • Strong authentication: the use of a simple password is obsolete. Two-factor authentication (2FA) should be the standard for all remote access and high-privilege accounts
  • Resilience and safeguards: security is also about knowing how to react. Having disconnected and regularly tested backups guarantees the resilience required by article 32
  • Culture of vigilance: the human factor remains the main gateway to attacks. Regular training sessions on phishing are essential to make employees the organization's first line of defense.

FAQ on Article 32 of the GDPR and Accountability

Am I liable to be punished if I have been the victim of piracy despite my efforts?

The CNIL assesses your obligation of means. If you can prove your Accountability with documents attesting to state-of-the-art measures, the penalty will be avoided or greatly mitigated. It is the absence of preventive measures that is punished.

What is a level of security adapted to the risk?

It is an analysis that combines the sensitivity of the data with the probability of a threat. The more data can impact people's lives, the more sophisticated your technical measures should be.

Does the Digital Omnibus project change the way a vulnerability is declared?

Yes, it is tending towards a centralization of incident reports. However, it does not replace the notification requirement under the GDPR but complements it to strengthen the overall resilience of the European Union.

Is certified software enough to be in compliance?

The tool is part of the solution, but compliance encompasses your internal processes. Even the best software won't protect you if your human processes fail or if your security tests are never done.

Compliance with the GDPR from a security perspective is now a governance imperative. The decisions of 2025 and the new guidelines of 2026 show that the authorities no longer tolerate any amateurism when it comes to the protection of digital assets.

Webinar - Données de Santé
29 janvier 2026|11h00 - 12h00 : maîtrisez la conformité pour l'innovation et la recherche

Inscrivez-vous au webinar du 29 janvier pour maîtriser le cadre juridique complexe et les étapes clés de la conformité (RGPD, CNIL) encadrant la réutilisation des données de santé. Cette session vous fournira la méthodologie et les outils nécessaires pour sécuriser vos projets d'innovation clinique et d'optimisation des organisations.

{{newsletter}}

The latest news

They have trusted us for years

Discover Adequacy

One of our experts introduces Adequacy to you in a real situation.