The Guarantor's Privacy Statement of November 27, 2008The Guarantor for Personal Data Protection has determined that from February 28, 2009 (extended to December 15, 2009) all private and public companies must record and store System Administrator access data on the systems they manage, In order to facilitate the "verification of their activity by those who own the databases and computer systems" (Official Gazette 300, 24 December 2008). Become a Reseller
What it means?
Each company, having identified the systems (network devices, databases, security systems, and complex software systems) that contain the most critical data and appointed directors, must have a Log Management that traces operator access to the devices and applications they manage. This system will have to keep the data safely for a minimum of six months and will be available for consultation by the company and the authorities.
The Log Management service supports throughout the technical and organizational process small, medium and large companies in compliance with the disposition of the Personal Data Protection Guarantor.
How to get in good shape
Thanks to the Log Management service, any company can choose the most appropriate technology solution to suit all Security to the provisions of the Privacy Guard. But not only.
The Secure Online Desktop staff can support you in all the technical/organizational activities required to put your business in line with the Guarantor's requirements. Below is a list of the main activities we can offer you:
- detection of systems to monitor;
- uniquely identifying system administrators and creating users connected to the physical person;
- analysis and dimensioning of servers and network devices to be monitored;
- legal and technical-organizational advice on the Order;
- the possible implementation of a Strong Authentication system that gives the company and administrator greater security as it is guaranteed that the credentials used to access a system actually match the physical person.
GDPR - GENERAL DATA PROTECTION REGULATION
Cyber threat intelligence identify dangers before they cause damage Find threats before they become a problem… https://t.co/eoT3Mfmi7g
Analisi di Sicurezza Procedurale Verifica che le operazioni in azienda rispettino gli standard imposti per il trat… https://t.co/HYs4UsX3mP
VPN Aziendali connessioni protette sempre e dovunque Gran parte del lavoro ormai passa per la rete,la sicurezza dev… https://t.co/ZreMXSsS17
Ultimamente ci sono stati casi critici di ransomware degni di nota. L’Universita' Tor Vergata ha subito un attacco… https://t.co/oHVilx0VXx
There have been critical cases of ransomware of note lately. Tor Vergata University suffered an attack that knocked… https://t.co/FQYuyKdAv6