πŸ”’ Technical and Organisational Measures

Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, appropriate technical and organizational measures must be implemented to ensure a level of security appropriate to the risk.

I. Confidentiality

1. Access control of processing areas / Admittance control

EventInsight has implemented suitable measures to prevent unauthorized persons from gaining physical access to the data processing equipment where the personal data is processed. This has been accomplished through the following:

β€’ Protection and restriction of access paths;

β€’ Established access authorizations for staff and third parties, including the respective documentation;

β€’ Regulations on card-keys;

β€’ Restriction on card-keys;

β€’ Logging, monitoring, and tracking of all access to the data centre where personal data is hosted;

β€’ Securing the data centre where personal data is hosted by means of a security alarm system, among other appropriate security measures.

​

2. Access control to data processing systems / Entry Control

EventInsight has implemented suitable measures to prevent its data processing systems from being used/accessed by unauthorized persons. This has been accomplished through the following:

β€’ Issuance of individual logins to users; passwords must adhere to constraints in length, complexity, aging and history;

β€’ Identification of the terminal and/or the terminal user to the Supplier systems;

β€’ Automatic turn-off of the user ID when several erroneous passwords are entered, log file of events (monitoring of break-in-attempts);

β€’ Dedication of individual terminals and/or terminal users, identification characteristics exclusive to specific functions;

β€’ Compliance with staff policies in respect of each staff access rights to personal data (if any), informing staff about their obligations and the consequences of any violations of such obligations, to ensure that staff only access personal data and resources required to perform their job duties and training of staff on applicable privacy duties and liabilities;

β€’ Logging, monitoring, and tracking of all access to data content.

3. Access control to use specific areas of data processing systems / Access Control

EventInsight has committed that the persons entitled to use its data processing system are only able to access the data within the scope and to the extent covered by their respective access permission (authorization) and that personal data cannot be read, copied, modified, or removed without authorization. This is accomplished through the following:

β€’ Assignation of minimum access rights to staff members of EventInsight dependent on their job requirements;

β€’ Compliance with staff policies in respect of each staff member's access rights to the personal data;

β€’ Allocation of individual terminals and/or terminal user, and identification characteristics exclusive to specific functions;

β€’ Monitoring capability in respect of individuals who delete, add or modify the personal data and at least yearly monitoring and updating of authorization profiles;

β€’ Release of data to only authorized persons;

β€’ Policies controlling the retention of backup copies;

β€’ Use of state of the art encryption technologies.

​

4. Separation of processing for different purposes

EventInsight has implemented suitable measures to make sure that data collected for different purposes can be processed separately. This is accomplished through the following:

β€’ Ensuring strict logical or physical separation between personal data and other personal information in respect of which EventInsight is a controller or a processor;

β€’ Processing personal data received from different clients separately;

β€’ Separation of access to data through application security for the appropriate users;

β€’ Separation of data used for different purposes through modules within the EventInsight database, i.e. by functionality and function;

β€’ Storing of data in different areas (at the database level), separated per module or function they support;

β€’ Designing of interfaces, batch processes and reports for only specific purposes and functions, so data collected for specific purposes is processed separately;

​

5. Job control

EventInsight has implemented suitable measures to ensure that the personal data is processed in accordance with the instructions of the controller. This is accomplished by:

β€’ Binding policies and procedures for EventInsight’s employees, subject to controller's review and approval.

EventInsight ensures that if security measures are adopted through external entities it obtains written description of the activities performed that guarantees compliance of the measures adopted with this document. EventInsight further implements suitable measures to monitor its system administrators and to ensure that they act in accordance with instructions received. This is accomplished by:

β€’ Individual appointment of system administrators;

β€’ Adoption of suitable measures to register system administrators' access logs and keep them secure, accurate and unmodified for at least six months;

β€’ Yearly audits of system administrators' activity to assess compliance with assigned tasks, the instructions received by importer and applicable laws; and

β€’ Keeping an updated list with system administrators' identification details (e.g. name, surname, function or organizational area) and tasks assigned.

β€’ Disaster recovery and business continuity plans;

β€’ Conducting regular checks of all the implemented and herein described security measures at least every six months;

β€’ Only re-using backup tapes if information previously contained is not intelligible and cannot be reconstructed by any technical means; other removable media is destroyed or made unusable if not used;

β€’ Recording any detected security incident, alongside the followed data recovery procedures, and the identification of the person who carried them out;

β€’ Firewalls, anti-virus solutions;

​

6. Pseudonymization

EventInsight processes personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person

​

7. Encryption

EventInsight uses state of the art encryption technologies.

​

II. Integrity

1. Input control

EventInsight shall implement suitable measures to make sure that it can check and establish whether and by whom personal data has been inputted into data processing systems or removed. This is accomplished through the following:

β€’ An authorization policy for the input of data into memory, as well as for the reading, alteration and deletion of stored data;

β€’ Logging of entries, amendments and deletion of personal data in data processing systems; operate document management systems;

β€’ Authentication of the authorized personnel; individual authentication credentials such as user IDs that, once assigned, cannot be re-assigned to another person (including subsequently);

β€’ Protective measures for the data input into memory, as well as for the reading, alteration and deletion of stored data;

β€’ Utilization of user codes (passwords) of at least eight characters or the system maximum permitted number and modification at first use and thereafter at least every 90 days in case of processing of sensitive data;

β€’ Following a policy according to which all staff of EventInsight who have access to personal data processed for controller shall reset their passwords at a minimum once in a 180 day period;

β€’ Ensuring that entries to data processing facilities (the rooms housing the computer hardware and related equipment) are capable of being locked;

​

2. Transmission Control

EventInsight implements suitable measures to prevent the personal data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished through the following:

β€’ Use of appropriate firewall and encryption technologies;

β€’ Logging and monitoring of all data transmissions as far as possible;

β€’ Monitoring of the completeness and correctness of the transfer of data (end-to-end check);

​

III. Availability

EventInsight shall implement suitable measures to make sure that Personal Data is protected from accidental destruction or loss. This is accomplished through the following:

β€’ Infrastructure redundancy to ensure data access is restored within seven days and backup performed at least weekly;

β€’ Conducting regular checks of all the implemented and herein described security measures at least every six months;

β€’ Only re-using backup tapes if information previously contained is not intelligible and cannot be reconstructed by any technical means; other removable media is destroyed or made unusable if not used;

β€’ Recording any detected security incident, alongside the followed data recovery procedures, and the identification of the person who carried them out;

β€’ Firewalls, anti-virus solutions

​

IV. Resilience

EventInsight has implemented the following points

β€’ Infrastructure redundancy;

β€’ Disaster recovery;

β€’ Back-up databases;

​

V. Process to restore the availability and access to personal data in the event of a physical or technical incident

β€’ Restoring availability and access to personal data in a timely manner in the event of a physical and technical incident;

β€’ Implementing a suitable incident response management;

VI. Process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the data processing

β€’ Implementing a suitable data protection management in its organization;

β€’ Conducting regular audits;

β€’ Preparation of an internal audit plan.

​