The Guarantor's Privacy Statement of November 27, 2008The Guarantor for Personal Data Protection has determined that from February 28, 2009 (extended to December 15, 2009) all private and public companies must record and store System Administrator access data on the systems they manage, In order to facilitate the "verification of their activity by those who own the databases and computer systems" (Official Gazette 300, 24 December 2008). Become a Reseller
What it means?
Each company, having identified the systems (network devices, databases, security systems, and complex software systems) that contain the most critical data and appointed directors, must have a Log Management that traces operator access to the devices and applications they manage. This system will have to keep the data safely for a minimum of six months and will be available for consultation by the company and the authorities.
The Log Management service supports throughout the technical and organizational process small, medium and large companies in compliance with the disposition of the Personal Data Protection Guarantor.
How to get in good shape
Thanks to the Log Management service, any company can choose the most appropriate technology solution to suit all Security to the provisions of the Privacy Guard. But not only.
The Secure Online Desktop staff can support you in all the technical/organizational activities required to put your business in line with the Guarantor's requirements. Below is a list of the main activities we can offer you:
- detection of systems to monitor;
- uniquely identifying system administrators and creating users connected to the physical person;
- analysis and dimensioning of servers and network devices to be monitored;
- legal and technical-organizational advice on the Order;
- the possible implementation of a Strong Authentication system that gives the company and administrator greater security as it is guaranteed that the credentials used to access a system actually match the physical person.
GDPR - GENERAL DATA PROTECTION REGULATION
Estimated reading time: 6 minutes L'impatto crescente delle minacce informatiche, su sistemi operativi privati op… https://t.co/FimxTS4o9G
Estimated reading time: 6 minutes The growing impact of cyber threats, on private or corporate operating systems… https://t.co/y6G6RYA9n1
Tempo di lettura stimato: 6 minuti Today we are talking about the CTI update of our services. Data security is… https://t.co/YAZkn7iFqa
Estimated reading time: 6 minutes Il tema della sicurezza delle informazioni è di grande attualità in questo peri… https://t.co/tfve5Kzr09
Estimated reading time: 6 minutes The issue of information security is very topical in this historical period ch… https://t.co/TP8gvdRcrF