Data security compliance depends on the use of personal information or sensitive data within your organisation. A simple checklist of data security protocols is available on the GRPR website which focuses on the handling of personal information for EU citizens, however data security extends to intellectual property and any sensitive information that only a selected audience should have access to.

This is a basic list of security protocols that most companies should have in place when considering their data security.

  • Software Encryption – prevent your software from being reverse engineered or tampered with.
  • Data Encryption – ensure files, where Personal Information is stored, are encrypted.
  • Secure PI data whilst in transmission or at rest.
  • Use only industrial-grade computer/device passwords.
  • Actively maintain your firewalls.
  • Protect and secure PI and IP – if there is an attempted breach, it can be repelled.
  • Use a system that can restrict data when lost or stolen?
  • Access to a system that allows exit process when a client or employee leaves?

Process.st has a handy little checkbox list outlining the GDPR process for personal information protection but also hosts a number of great network security checklists that may have some useable information that you can apply to your companies internal security processes and policies.

 

 

Get a personal consultation.

Robust digital security solutions.