Chartered Engineers & Engineering Firms

As persons vested with public faith (§ 3 para. 3 ZTG 2019), civil engineers are subject to statutory confidentiality obligations (§ 14 ZTG 2019) and must retain documents for at least 30 years (§ 15 ZTG 2019). A data breach endangers not only your license but also the legal validity of your documents.

Legal Requirements & Risks

§ 14 ZTG: Confidentiality Obligation

Civil engineers are obligated to maintain confidentiality regarding all client matters. Violations can result in disciplinary penalties up to loss of license (§ 95 ZTG).

§ 15 ZTG: 30 Year Retention

Public documents must be entered in chronological registers and retained for at least 30 years. Data loss can invalidate certifications.

§ 3 para. 3 ZTG: Public Faith

Documents by civil engineers are treated like official documents. Manipulation through cyber attacks can result in liability under § 292 ZPO and criminal prosecution.

Cyber Risks for Civil Engineers

Ransomware on Project Data

Encrypted CAD files and project folders can delay construction projects by weeks. Deadlines are missed, penalties threaten – especially critical given the 30-year retention requirement.

Industrial & Project Espionage

CAD drawings, tender documents and cost calculations are valuable targets. Breaches of confidentiality obligations endanger your license.

Document Manipulation

Unnoticed changes to plans or calculations undermine the public faith of your documents. Integrity is essential according to § 18 ZTG (seal protection).

Our Solution for Civil Engineers

Managed EDR for Technical Offices

  • Protection of CAD workstations and project servers
  • Monitoring of AutoCAD, Revit, ArchiCAD and BIM software
  • Ransomware detection with automatic isolation

ZTG-Compliant Archiving (§ 15)

  • Immutable backups for the statutory 30-year retention
  • Integrity verification for chronological registers
  • Geo-redundant storage in Austrian data centers

Electronic Signature Protection (§ 15 para. 3)

  • Secure storage of certification signature per § 18 para. 3 ZTG
  • Monitoring for compromise of signature creation data
  • Encrypted transmission of plans to clients and partners

ZTG Compliance Check

Free analysis of your IT security regarding § 14, § 15 and § 18 ZTG 2019

Request Consultation