GDPR COMPLIANCE IMPLEMENTATION: BEST PRACTICES

GDPR COMPLIANCE OBLIGATIONS

  1. The subject gave an explicit legal consent for collecting and processing personal data for no other purposes but the legitimate ones.
  2. The subject is privy to all processing activities with their personal data.
  3. Only necessary data required for specified and explicit purposes is collected.
  4. Data is accurate and updated.
  5. Data is properly destroyed or deleted when no longer needed.
  6. Data is protected against unauthorized or unlawful processing, loss, damage or destruction.

GDPR COMPLIANCE IMPLEMENTATION STEPS

ACCESS CONTROL OF DATA PROCESSING PREMISES

  • Entrance to the office building is allowed only with a personal smart card granting access to corresponding sections of the office, while keys from project rooms are obtained by employees upon fingerprint authentication. Access to the server room is restricted to authorized employees only.
  • Personalized smart card and the fingerprint record is removed when an employee leaves the company.
  • The office is locked during night hours and connected to a centralized police monitoring system. Security guards are present on the territory 24/7. Corridors, stairs, entrance, parking lots are equipped with a video surveillance system.
  • Visitors are not permitted without the prior approval of management or HR and unless accompanied by an employee. Guests have no access to the corporate network.

--

--

--

Custom software development company offering a wide range of IT Consulting, Web and Mobile development, Quality Management, BI and BigData services.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Agiliway

Agiliway

Custom software development company offering a wide range of IT Consulting, Web and Mobile development, Quality Management, BI and BigData services.

More from Medium

Converting VMware to KVM: Rapid7’s “Metasploitable 2”

Security groups for pods

Migrate Kubernetes PV to another cluster that is in the same or another AWS region using Velero and…

Simple Do It Yourself Backup with Google Cloud Storage