regulation-2016-679-of-27-april-2016 Piergiorgio Venuti

Almost ready for the GDPR

regulation-2016-679-of-27-april-2016

The 2016-679 regulation of 27 April 2016 will apply in all Member States from 25 May 2018, within which the companies will have to comply with the new Privacy Act.

As activities related to privacy advice and specifically in relation to the minimum security measures that must be prepared following the Gap Analysis and Privacy Assessment, the Secure Online Desktop offers the following services.

 

Our services for the regulation-2016-679-of-27-april-2016

   ♦ GDPR CONSULTING

      It is the consulting activity for the adaptation to the new 2016-679 privacy regulation. Find out more.

 

   ♦ PRIVACY ASSESSMENT

      It is one of the first activities within the GDPR consulting projects aimed at “photographing” the current state of the company on the topic of Privacy. Find out more.

 

   ♦ VULNERABIITY ASSESSMENT & PENETRATION TEST

      The activities of the Vulnerability Assessment and Penetration Test are aimed at assessing the level of IT security of an IT infrastructure. Find out more.

 

   ♦ PRIVACY TRAINING

 

      The training of persons in charge of processing personal data, in addition to constituting a legal obligation, is one of the most effective security measures to protect the same data. In fact, training is essential for logical and physical security measures, as well as policies and procedures adopted by companies, to find concrete and conscious application in daily practice.

The courses are delivered in the classroom directly at the customer, and are designed and maintained by Privacy Officer and teachers who are experts in personal data security and organization.

All our courses are highly practical and are carried out through a constant interaction between teacher and participants, with the aim not only to make the fundamental principles of the law known, but also and above all to increase the participants’ awareness on safety measures from adopt and on the behavioral guidelines for the correct use of company tools. Find out more.

 

   ♦ LOG MANAGEMENT

      The collection, aggregation and secure storage of logs are some of the activities to be considered in the process of adaptation to the GDPR. Find out more.

 

   ♦ AUDIT MANAGEMENT

      Our Audit Management system verifies the access of “privileged” users to remote servers, prevents unauthorized behavior, records activities in searchable video sessions and generates compliance and support reports.

 

   ♦ STRONG AUTHENTICATION

 

   ♦ ENCRYPTION

 

   ♦ BACKUP ON CLOUD

      Data resilience, backup and threat protection are fundamental aspects of the new 2016-679 Regulation of 27 April 2016. Find out more.

 

The Secure Online Desktop primarily has put in place the appropriate measures to comply with the adaptation in order to protect the privacy of its users.

[btnsx id=”2931″]

USEFUL LINKS:

Privacy

Public Cloud

New European regulation (GDPR)

Cloud Provider Reggio Emilia

Introducing a set of new GDPR tools

IaaS | Cloud | Infrastructure as a Service

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • CVE-2024-48463 January 16, 2025
    Posted by Rodolfo Tavares via Fulldisclosure on Jan 15=====[ Tempest Security Intelligence - ADV-10/2024 ]========================== Bruno IDE Desktop prior to 1.29.0 Author: Rodolfo Tavares Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents ]================================================== Overview Detailed Description Timeline of Disclosure Thanks & Acknowledgements References =====[ Vulnerability Information...
  • CyberDanube Security Research 20250107-0 | Multiple Vulnerabilities in ABB AC500v3 January 16, 2025
    Posted by Thomas Weber | CyberDanube via Fulldisclosure on Jan 15CyberDanube Security Research 20250107-0 ------------------------------------------------------------------------------- title| Multiple Vulnerabilities in ABB AC500v3 product| ABB AC500v3 vulnerable version|
  • Certified Asterisk Security Release certified-20.7-cert4 January 16, 2025
    Posted by Asterisk Development Team via Fulldisclosure on Jan 15The Asterisk Development Team would like to announce security release Certified Asterisk 20.7-cert4. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/certified-20.7-cert4 and https://downloads.asterisk.org/pub/telephony/certified-asterisk Repository: https://github.com/asterisk/asterisk Tag: certified-20.7-cert4 ## Change Log for Release asterisk-certified-20.7-cert4 ###...
  • Certified Asterisk Security Release certified-18.9-cert13 January 16, 2025
    Posted by Asterisk Development Team via Fulldisclosure on Jan 15The Asterisk Development Team would like to announce security release Certified Asterisk 18.9-cert13. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/certified-18.9-cert13 and https://downloads.asterisk.org/pub/telephony/certified-asterisk Repository: https://github.com/asterisk/asterisk Tag: certified-18.9-cert13 ## Change Log for Release asterisk-certified-18.9-cert13 ###...
  • Asterisk Security Release 22.1.1 January 16, 2025
    Posted by Asterisk Development Team via Fulldisclosure on Jan 15The Asterisk Development Team would like to announce security release Asterisk 22.1.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/22.1.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 22.1.1 ## Change Log for Release asterisk-22.1.1 ### Links: - [Full ChangeLog](...
  • Asterisk Security Release 18.26.1 January 16, 2025
    Posted by Asterisk Development Team via Fulldisclosure on Jan 15The Asterisk Development Team would like to announce security release Asterisk 18.26.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/18.26.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 18.26.1 ## Change Log for Release asterisk-18.26.1 ### Links: - [Full ChangeLog](...
  • [asterisk-dev] Asterisk Security Release 21.6.1 January 16, 2025
    Posted by Asterisk Development Team on Jan 15The Asterisk Development Team would like to announce security release Asterisk 21.6.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/21.6.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 21.6.1 ## Change Log for Release asterisk-21.6.1 ### Links: - [Full ChangeLog](...
  • [asterisk-dev] Asterisk Security Release 20.11.1 January 16, 2025
    Posted by Asterisk Development Team on Jan 15The Asterisk Development Team would like to announce security release Asterisk 20.11.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/20.11.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 20.11.1 ## Change Log for Release asterisk-20.11.1 ### Links: - [Full ChangeLog](...
  • Multiple vulnerabilities in CTFd versions <= 3.7.4 December 31, 2024
    Posted by Blazej Adamczyk on Dec 30━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Multiple vulnerabilities in CTFd versions
  • IBMi Navigator / CVE-2024-51464 / HTTP Security Token Bypass December 31, 2024
    Posted by hyp3rlinx on Dec 30[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/IBMi_Navigator_HTTP_Security_Token_Bypass-CVE-2024-51464.txt [+] x.com/hyp3rlinx [+] ISR: ApparitionSec [Vendor]www.ibm.com [Product] Navigator for i is a Web console interface where you can perform the key tasks to administer your IBM i. IBM Navigator for i supports the vast majority of tasks that […]

Customers

Newsletter

{subscription_form_1}