SlideShare a Scribd company logo
www.yourlegalconsultants.com [email_address] Data protection and security Security Document
PERSONAL DATA PROTECTION Explanation of security document Available document in: www.yourlegalconsultants.com www.yourlegalconsultants.com [email_address]
1. SECURITY DOCUMENT (1/4) INDEX I NTRODUCTION 	4 A.SCOPE OF APPLICATION OF THE DOCUMENT 	5 High Level. Applied to files or data processing 	5 Medium level. Applied to files or data processing 	5 Basic level.  Applied to files or data processing 	5 B. MEASURES, NORMS, PROCEDURES, RULES AND STANDARDS TO GUARANTEE THE SECURITY LEVELS  REQUIRED BY THIS DOCUMENT 	7 Identification and authentication 7 www.yourlegalconsultants.com [email_address]
1. SECURITY DOCUMENT (2/4) Access Control 	8 Register of storage media and documents 	8 Filing criteria 	10 Access to data through communication networks 	12 Regime for work outside premises where the files are located 	12 Moving documentation. 	12 Temporary files 	12 Copy or reproduction 	12 Back-up copies 	12 Security Manager 	13 www.yourlegalconsultants.com [email_address]
1. SECURITY DOCUMENT (3/4)  C. GENERAL PROCEDURE OF INFORMATION FOR STAFF 	14 D. STAFF FUNCTIONS AND OBLIGATIONS 	15 General functions and obligations 	15 E. PROCEDURES FOR INCIDENT NOTIFICATION, MANAGEMENT AND RESPONSE 	16 F. REVIEW PROCEDURES 	16 Security Document review 	16 Audit 	16 G. CONSEQUENCES OF BREACHING THE SECURITY DOCUMENT 	17 ANNEX I. FILE DESCRIPTION 	18 ANNEX II: APPOINTMENTS 	19 www.yourlegalconsultants.com [email_address]
1. SECURITY DOCUMENT (4/4) ANNEX III. AUTHORISATIONS FOR DATA WITHDRAWAL OR RECOVERY 	20 ANNEX IV. STORAGE MEDIA INVENTORY 	21 ANNEX V. INCIDENT REGISTER 	22 ANNEX VI. PROCESSOR 	23 ANNEX VII. REGISTER OF MEDIA ENTRY AND WITHDRAWAL 	24  LIST OF VERIFICATIONS FOR PERFORMING THE SECURITY AUDIT 	25 1. Aims 	25 2. Determining audit scope 	25 3. Planning 	25 3. Data collection 	25 4. Evaluating Tests 	25 5. Conclusions and recommendations 	25 www.yourlegalconsultants.com [email_address]
Thank you for your interest [email_address] If you want to buy the document: www.yourlegalconsultants.com If you want to contract to the expert, please contact: www.yourlegalconsultants.com [email_address]

More Related Content

Similar to Security document index

102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cloud Standards Customer Council
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
RDMRose 2.2 Practical data management
RDMRose 2.2 Practical data managementRDMRose 2.2 Practical data management
RDMRose 2.2 Practical data management
RDMRose
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
PCI Compliance NOT for Dummies epb 30MAR2016
PCI Compliance NOT for Dummies epb 30MAR2016PCI Compliance NOT for Dummies epb 30MAR2016
PCI Compliance NOT for Dummies epb 30MAR2016
Erika Powell-Burson, MSIA, CISSP, CISA
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era
Paul Hastings
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
360factors
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
Eryk Budi Pratama
 
ISMS_of ISO 27001-2022-awareness training
ISMS_of  ISO 27001-2022-awareness trainingISMS_of  ISO 27001-2022-awareness training
ISMS_of ISO 27001-2022-awareness training
HananZayed4
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
South Tyrol Free Software Conference
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
humanus2
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
parves kamal
 
Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety
Enform
 
Personal_vs_Process_Safety_v3.pdf
Personal_vs_Process_Safety_v3.pdfPersonal_vs_Process_Safety_v3.pdf
Personal_vs_Process_Safety_v3.pdf
DekaWahyuIlsafta
 
HIRADC
HIRADCHIRADC
HIRADC
Lee Oi Wah
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptx
PatrickAyan
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptx
PatrickAyan
 

Similar to Security document index (20)

102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
RDMRose 2.2 Practical data management
RDMRose 2.2 Practical data managementRDMRose 2.2 Practical data management
RDMRose 2.2 Practical data management
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
PCI Compliance NOT for Dummies epb 30MAR2016
PCI Compliance NOT for Dummies epb 30MAR2016PCI Compliance NOT for Dummies epb 30MAR2016
PCI Compliance NOT for Dummies epb 30MAR2016
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
ISMS_of ISO 27001-2022-awareness training
ISMS_of  ISO 27001-2022-awareness trainingISMS_of  ISO 27001-2022-awareness training
ISMS_of ISO 27001-2022-awareness training
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety
 
Personal_vs_Process_Safety_v3.pdf
Personal_vs_Process_Safety_v3.pdfPersonal_vs_Process_Safety_v3.pdf
Personal_vs_Process_Safety_v3.pdf
 
HIRADC
HIRADCHIRADC
HIRADC
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptx
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptx
 

More from yourlegalconsultants

Social Networks
Social NetworksSocial Networks
Social Networks
yourlegalconsultants
 
Criminal respnsibility: recommendations
Criminal respnsibility: recommendationsCriminal respnsibility: recommendations
Criminal respnsibility: recommendations
yourlegalconsultants
 
Social Networks
Social NetworksSocial Networks
Social Networks
yourlegalconsultants
 
Digital evidence
Digital evidenceDigital evidence
Digital evidence
yourlegalconsultants
 
Company responsibility: Digital Evidence
Company responsibility: Digital EvidenceCompany responsibility: Digital Evidence
Company responsibility: Digital Evidence
yourlegalconsultants
 
Technology Transfer General Concepts. Part II
Technology Transfer General Concepts. Part IITechnology Transfer General Concepts. Part II
Technology Transfer General Concepts. Part II
yourlegalconsultants
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirements
yourlegalconsultants
 
Digital content creations
Digital content creationsDigital content creations
Digital content creations
yourlegalconsultants
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
yourlegalconsultants
 

More from yourlegalconsultants (9)

Social Networks
Social NetworksSocial Networks
Social Networks
 
Criminal respnsibility: recommendations
Criminal respnsibility: recommendationsCriminal respnsibility: recommendations
Criminal respnsibility: recommendations
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Digital evidence
Digital evidenceDigital evidence
Digital evidence
 
Company responsibility: Digital Evidence
Company responsibility: Digital EvidenceCompany responsibility: Digital Evidence
Company responsibility: Digital Evidence
 
Technology Transfer General Concepts. Part II
Technology Transfer General Concepts. Part IITechnology Transfer General Concepts. Part II
Technology Transfer General Concepts. Part II
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirements
 
Digital content creations
Digital content creationsDigital content creations
Digital content creations
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Security document index

  • 1. www.yourlegalconsultants.com [email_address] Data protection and security Security Document
  • 2. PERSONAL DATA PROTECTION Explanation of security document Available document in: www.yourlegalconsultants.com www.yourlegalconsultants.com [email_address]
  • 3. 1. SECURITY DOCUMENT (1/4) INDEX I NTRODUCTION 4 A.SCOPE OF APPLICATION OF THE DOCUMENT 5 High Level. Applied to files or data processing 5 Medium level. Applied to files or data processing 5 Basic level. Applied to files or data processing 5 B. MEASURES, NORMS, PROCEDURES, RULES AND STANDARDS TO GUARANTEE THE SECURITY LEVELS REQUIRED BY THIS DOCUMENT 7 Identification and authentication 7 www.yourlegalconsultants.com [email_address]
  • 4. 1. SECURITY DOCUMENT (2/4) Access Control 8 Register of storage media and documents 8 Filing criteria 10 Access to data through communication networks 12 Regime for work outside premises where the files are located 12 Moving documentation. 12 Temporary files 12 Copy or reproduction 12 Back-up copies 12 Security Manager 13 www.yourlegalconsultants.com [email_address]
  • 5. 1. SECURITY DOCUMENT (3/4) C. GENERAL PROCEDURE OF INFORMATION FOR STAFF 14 D. STAFF FUNCTIONS AND OBLIGATIONS 15 General functions and obligations 15 E. PROCEDURES FOR INCIDENT NOTIFICATION, MANAGEMENT AND RESPONSE 16 F. REVIEW PROCEDURES 16 Security Document review 16 Audit 16 G. CONSEQUENCES OF BREACHING THE SECURITY DOCUMENT 17 ANNEX I. FILE DESCRIPTION 18 ANNEX II: APPOINTMENTS 19 www.yourlegalconsultants.com [email_address]
  • 6. 1. SECURITY DOCUMENT (4/4) ANNEX III. AUTHORISATIONS FOR DATA WITHDRAWAL OR RECOVERY 20 ANNEX IV. STORAGE MEDIA INVENTORY 21 ANNEX V. INCIDENT REGISTER 22 ANNEX VI. PROCESSOR 23 ANNEX VII. REGISTER OF MEDIA ENTRY AND WITHDRAWAL 24 LIST OF VERIFICATIONS FOR PERFORMING THE SECURITY AUDIT 25 1. Aims 25 2. Determining audit scope 25 3. Planning 25 3. Data collection 25 4. Evaluating Tests 25 5. Conclusions and recommendations 25 www.yourlegalconsultants.com [email_address]
  • 7. Thank you for your interest [email_address] If you want to buy the document: www.yourlegalconsultants.com If you want to contract to the expert, please contact: www.yourlegalconsultants.com [email_address]