Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

LGPD: Data Protection and Information Security in Brazil

Published November 16, 2020 / Updated October 9, 2024
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

LGPD Data Protection and Information Security in Brazil

For some years now we have seen some legislative moves around the world with regard to the protection of personal data. More intensely, since Regulation 2016/679 (known as GDPR) in force since May 25, 2018, we have seen more discussions and innovations on the topic. So it was with Germany (Federal Data Protection Act 2017 - Bundesdatenschutzgesetz - BDSG) and France (Data Protection Act nº 2018-493 June 2018), in addition, of course, Brazil, with our LGPD, Law 13.709 / 18 was, in some way, inspired by the GDPR.

At this point it is essential to note that these are not laws that only concern situations of incidents of personal data violations. Obviously, the topic “personal data violation incidents” is very important. There should be a consensus that every organization will, at some point, be a victim of data incidents and, although we have said this in classes, lectures, congresses, classrooms for years, we often realize that this reality seems to be still ignored by many.

Unfortunately, we have no elements to list the reasons why this happens, but it is clear that the topic “information security” is closely related to the protection of personal data and should be viewed with great attention by the organizations.

Precisely about the LGPD we can say with certainty that it is not a law whose scope is information security, since its main concern is broader: the privacy of subjects of personal data. It is not, therefore, a law that deals with information security, but in a tangential way.

Let us look briefly at the structure of the law:

  1. Chapter I - Preliminary provisions.
  2. Chapter II - The processing of personal data.
  3. Chapter III - Rights of the data subject.
  4. Chapter IV - The processing of personal data by the Government.
  5. Chapter V - International data transfer.
  6. Chapter VI - Personal data processing agents.
  7. Chapter VII - Safety and good practices.
  8. Chapter VIII - Oversight.
  9. Chapter IX - The National Data Protection Authority (ANPD) and the National Council for the Protection of Personal Data and Privacy.
  10. Chapter X - Final and transitional provisions.

Still in Chapter I the LGPD says in art. 6, VII, that personal data processing activities must observe good faith and the principle of security, defining it as the use of technical and administrative measures capable of protecting personal data from unauthorized access and accidental or destruction, loss, alteration, communication or dissemination. There is, however, no breakdown of what would be acceptable in terms of technical measures for the protection of personal data.

Further on, in Chapter II, art. 12, §3º when the LGPD reads about anonymization, there is mention that the national authority may provide for standards and techniques and carry out checks on its security, after hearing the National Council for the Protection of Personal Data.

With regard to international transfers, in Chapter V, precisely in art. 34, the LGPD determines that the data protection level of the foreign country or the international body will be assessed by the national authority, which will take into account the adoption of security measures provided for in regulations (although there is no clear mention to which regulation it refers to).

In Chapter VI, art. 38 the LGPD determines that the national data protection authority may determine that the personal data controller prepare a personal data protection impact report and its sole paragraph states that the report may require demonstration of the methodology used to the collection and to guarantee the security of information and the analysis of the controller in relation to measures, safeguards and risk mitigation mechanisms adopted. Art. 40 provides that the national authority may provide for safety standards, among others.

In art. 44 we also verify the mention of security when it determines that the processing of personal data will be irregular when it fails to observe the legislation or when it does not provide the security that the data subject can expect, considering the analysis of the way in which it is performed (I) , the result and the risks reasonably expected of it (II) and the data processing techniques available at the time it was performed (III).

It is in Chapter VII, however, that the LGPD has a greater focus on information security when, in art. 46, establishes that the treatment agents must adopt security, technical and administrative measures capable of protecting personal data. And art. 47 continues to determine that the treatment agents or any other person who intervenes in one of the phases of treatment is obliged to guarantee the security of the information provided for by law.

Art. 48 is the main device that mentions violations to personal data and determines that the controller notifies the national data protection authority and the data subject of the occurrence of a security incident that may cause risk or damage to the subject, but, for this, it does not impose a specific deadline, mentioning that this must be done within a reasonable period. However, it establishes the minimum communication requirements, which include the description and nature of the data affected, information on the data subjects involved, the indication of the technical and security measures used to protect the data, subject to commercial and industrial secrets, the risks related to the incident, the reasons for the delay, in case the communication was not immediate, and also the measures that were or will be adopted to reverse or mitigate the effects of the damage.

Paragraph 2 provides that the national authority will verify the severity of the incident and may order the controller to make extensive disclosure in the media and to take measures to reverse or mitigate the incident.

In turn, Paragraph 3 says that the judgment of the severity of the incident must take into account the evidence that adequate technical measures have been taken to make the affected personal data unintelligible, within the scope and technical limits of its services, to unauthorized third parties to access them.

It should be noted, however, that the rules that discuss incidents of violations are not specific in terms of processes or tools, not to mention penetration tests or DLP. And art. 49 proves this statement insofar as it says that the systems used for the processing of personal data must be structured in order to meet security requirements, standards of good practice and governance and the general principles set out in this Law and other rules regulatory requirements.

But then, how to deal with technical issues? In order to achieve compliance with the law more comprehensively, it is suggested to follow the provisions of art. 50, which provides guidelines for what can be called a digital compliance or privacy compliance program. That is, to follow the pillars of a privacy compliance program so that you can have the support of senior management, so that risk assessments are carried out for risk areas, that rules are formalized in policies and codes of conduct, that there are means of monitoring and auditing of personal data flows and providing adequate internal communication and appropriate training. Technical risks must be assessed in the context of privacy compliance so that they are incorporated with other risks for the protection of personal data.

The LGPD is not a law focused only on information security. Instead, it provides key principles and guidelines to help ensure better management and protection of personal data.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security for Financial Services: Turn Risk Into competitive Advantage
Financial services run on sensitive data. AI is now in fraud detection, underwriting, risk modelling, and customer service, raising both upside and risk. Institutions...
View More
Securiti and Databricks: Putting Sensitive Data Intelligence at the Heart of Modern Cybersecurity
Securiti is thrilled to partner with Databricks to extend Databricks Data Intelligence for Cybersecurity. This collaboration marks a pivotal moment for enterprise security, bringing...
View More
Navigating China’s AI Regulatory Landscape in 2025: What Businesses Need to Know
A 2025 guide to China’s AI rules - generative-AI measures, algorithm & deep-synthesis filings, PIPL data exports, CAC security reviews with a practical compliance...
View More
All You Need to Know About Ontario’s Personal Health Information Protection Act 2004
Here’s what you need to know about Ontario’s Personal Health Information Protection Act of 2004 to ensure effective compliance with it.
Maryland Online Data Privacy Act (MODPA) View More
Maryland Online Data Privacy Act (MODPA): Compliance Requirements Beginning October 1, 2025
Access the whitepaper to discover the compliance requirements under the Maryland Online Data Privacy Act (MODPA). Learn how Securiti helps ensure swift compliance.
Retail Data & AI: A DSPM Playbook for Secure Innovation View More
Retail Data & AI: A DSPM Playbook for Secure Innovation
The resource guide discusses the data security challenges in the Retail sector, the real-world risk scenarios retail businesses face and how DSPM can play...
DSPM vs Legacy Security Tools: Filling the Data Security Gap View More
DSPM vs Legacy Security Tools: Filling the Data Security Gap
The infographic discusses why and where legacy security tools fall short, and how a DSPM tool can make organizations’ investments smarter and more secure.
Operationalizing DSPM: 12 Must-Dos for Data & AI Security View More
Operationalizing DSPM: 12 Must-Dos for Data & AI Security
A practical checklist to operationalize DSPM—12 must-dos covering discovery, classification, lineage, least-privilege, DLP, encryption/keys, policy-as-code, monitoring, and automated remediation.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New