Information for the processing of personal data made pursuant to art. 13 of D.Lgs. 196/03 “Code on the protection of personal data”
THE HOLDER OF DATA
is Secure Online Desktop based at Via Bernardino Zacchetti 6, Reggio Emilia <[email protected]>
a) The personal identification data you provide by completing the registration form will be processed to allow you to subscribe to the workshop / newsletter.
Your personal data will be treated legally and fairly, subject to the security requirements prescribed by the Code. Data processing is done through manual, computer and telematic tools with logic strictly related to the purposes themselves and, in any case, in order to guarantee the security and confidentiality of the data themselves.
GIVE THE DATA
The disclosure of the data is mandatory for the purposes of point (a). In the absence of the data we will not be able to complete its registration at the workshop / newsletter.
CATEGORIES OF SUBJECT TO WHICH DATA MAY BE COMMUNICATED
Data communication can be made to individuals whose access to data is recognized by law or regulation.
RIGHTS OF THE INTERESTED PARTIES (ARTICLE 7 OF D.LGS 196/03)
At any time, you may exercise your rights with respect to the data controller by contacting the address above; in particular it will be able to obtain:
1) the confirmation of the existence or not of data concerning you and their communication;
2) the indication of the origin of the data, the purposes and methods of processing, the logic applied in case of treatment by means of electronic means, the identification details of the data controller, of the subjects to whom the data may be communicated;
3) updating, rectifying, or integrating the data;
4) the cancellation, transformation into anonymous form or the blocking of the data processed in violation of the law;
5) oppose, in whole or in part, for legitimate reasons for the processing of data even though relevant to the purpose of the collection; to the processing of data in place for marketing purposes or for the accomplishment of market research.
Cyber threat intelligence identify dangers before they cause damage Find threats before they become a problem… https://t.co/eoT3Mfmi7g
Analisi di Sicurezza Procedurale Verifica che le operazioni in azienda rispettino gli standard imposti per il trat… https://t.co/HYs4UsX3mP
VPN Aziendali connessioni protette sempre e dovunque Gran parte del lavoro ormai passa per la rete,la sicurezza dev… https://t.co/ZreMXSsS17
Ultimamente ci sono stati casi critici di ransomware degni di nota. L’Universita' Tor Vergata ha subito un attacco… https://t.co/oHVilx0VXx
There have been critical cases of ransomware of note lately. Tor Vergata University suffered an attack that knocked… https://t.co/FQYuyKdAv6