The Guarantor's Privacy Statement of November 27, 2008The Guarantor for Personal Data Protection has determined that from February 28, 2009 (extended to December 15, 2009) all private and public companies must record and store System Administrator access data on the systems they manage, In order to facilitate the "verification of their activity by those who own the databases and computer systems" (Official Gazette 300, 24 December 2008). Become a Reseller
What it means?
Each company, having identified the systems (network devices, databases, security systems, and complex software systems) that contain the most critical data and appointed directors, must have a Log Management that traces operator access to the devices and applications they manage. This system will have to keep the data safely for a minimum of six months and will be available for consultation by the company and the authorities.
The Log Management service supports throughout the technical and organizational process small, medium and large companies in compliance with the disposition of the Personal Data Protection Guarantor.
How to get in good shape
Thanks to the Log Management service, any company can choose the most appropriate technology solution to suit all Security to the provisions of the Privacy Guard. But not only.
The Secure Online Desktop staff can support you in all the technical/organizational activities required to put your business in line with the Guarantor's requirements. Below is a list of the main activities we can offer you:
- detection of systems to monitor;
- uniquely identifying system administrators and creating users connected to the physical person;
- analysis and dimensioning of servers and network devices to be monitored;
- legal and technical-organizational advice on the Order;
- the possible implementation of a Strong Authentication system that gives the company and administrator greater security as it is guaranteed that the credentials used to access a system actually match the physical person.
GDPR - GENERAL DATA PROTECTION REGULATION
Tempo di lettura: 4 minMonitoraggioNegli ultimi anni abbiamo assistito ad una rapida evoluzione delle infrastruttur… https://t.co/3EQ6yPJG4g
Tempo di lettura: 6 min WastedLocker e' un software per attacchi ransomware che ha iniziato a colpire imprese e al… https://t.co/yRXHQPoAlG
syslog server - High performance service for collecting logs - Use all the strengths of the syslog-ng Premium Edit… https://t.co/NOmReNicwb
WastedLocker is ransomware attack software that began targeting businesses and other organizations in May 2020. It… https://t.co/8244AWLg8s
Tempo di lettura: 5 min Sia che si tratti di WordPress o no, il vostro sito web e' potenzialmente vulnerabile agli… https://t.co/k0NpytICpQ