GateKeeper allows compliance officers to keep their employees and company automatically in compliance with mandates of GDPR (/ DSGVO / RGPD / AVG). European Union companies looking to meet their GDPR needs should consider using GateKeeper to automate as many mandates as possible to reduce time and energy spent. Check out more on our GDPR page.
Article 32 Compliance Methods | |||
Requirement | Description | Article Number | GateKeeper |
Change Management | Monitors, logs, and reports changes. Shows compliance auditors that changes to the actions can be traced . | 32 | GateKeeper is a proximity-based identification and authentication solution using a physical dongle. A user must be physically present to access a workstation. Audit logs of physical access using GateKeeper are stored indefinitely on the GateKeeper Enterprise server. Additionally, GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes. |
Data Masking | Anonymizes data via encryption/hashing, generalization, perturbation, etc. Pseudonymizes data by replacing sensitive data with realistic fictional data that maintains operational and statistical accuracy. | 32 | GateKeeper uses AES-256 to store and transmit passwords, PIN logins are obscured, and all authentication information is obscured. |
User Rights Management | Identifies excessive, inappropriate, and unused privileges. | 32 | GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, an organization can assign granular access permissions to individuals/groups on a per workstation basis. This helps enforce the concept of least privilege on a system level. |
User Tracking | Maps end user to the system or data accessed. | 32 | GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely. |
For any additional questions or concerns regarding proximity settings, computer locking, or credential management, or GDPR / DSGVO / RGPD / AVG compliance, please contact GateKeeper Enterprise support using the Support Ticket form on https://gkaccess.com/support/ or email support@gkaccess.com.
-------------------------------------------------------------------------
RGPD compliance; AVG compliance; DSGVO compliance; European compliance framework; European cybersecurity compliance framework; Euro; Netherlands compliance; benelux compliance; germany compliance; france compliance; uk compliance; england compliance; ireland compliance; welsh compliance; scotland compliance; Austria compliance; Bulgaria compliance; Croatia compliance; Republic of Cyprus compliance; czech Republic compliance; Denmark compliance; Estonia compliance; Finland compliance; Greece compliance; Hungary compliance; Italy compliance; Latvia compliance; Lithuania compliance; Luxembourg compliance; Malta compliance; Netherlands compliance; Dutch compliance; Poland compliance; Portugal compliance; Romania compliance; Slovakia compliance; Slovenia compliance; Spain compliance; Sweden compliance; Liechtenstein compliance; Norway compliance; Switzerland compliance; European Economic Area (EEA); European Union member states; European Free Trade Association (EFTA); Chief Technology Officer (CTO) GPDR compliance; Data Protection Officer (DPO) compliance GDPR; GDPR CSO; GDPR CTO; GDPR compliance officer; GDPR privacy protection officer; GDPR IT manager; IT director GDPR; GDPR violation prevention technology; GDPR authentication compliance technology; gdpr solutions; gdpr tech solutions; European Economic Area (EEA); Algemene Verordening Gegevensbescherming (AVG); Datenschutz-Grundverordnung (DSGVO) in German. Règlement général sur la protection des données (RGPD) compliance; Österreichische Datenschutzbehörde; edpb; Autorité de la protection des données - Gegevensbeschermingsautoriteit (APD-GBA) compliance; Bulgaria Commission for Personal Data Protection; Croatian Personal Data Protection Agency; Cyprus Commissioner for Personal Data Protection; Czech Republic Office for Personal Data Protection; Denmark Datatilsynet; Estonia Estonian Data Protection Inspectorate (Andmekaitse Inspektsioon); European Data Protection Supervisor; Finland Office of the Data Protection Ombudsman;; France Commission Nationale de l'Informatique et des Libertés - CNIL; Germany Die Bundesbeauftragte für den Datenschutz und die Informationsfreiheit; Greece Hellenic Data Protection Authority; Hungary Hungarian National Authority for Data Protection and Freedom of Information; Ireland Data Protection Commission; Italy Garante per la protezione dei dati personali; Latvia Data State Inspectorate; Lithuania State Data Protection Inspectorate; Luxembourg Commission Nationale pour la Protection des Données; Malta Office of the Information and Data Protection Commissioner; Netherlands Autoriteit Persoonsgegevens; Poland Urząd Ochrony Danych Osobowych (Personal Data Protection Office); Portugal Comissão Nacional de Protecção de Dados - CNPD; Romania The National Supervisory Authority for Personal Data Processing; Slovakia Office for Personal Data Protection of the Slovak Republic; Slovenia Information Commissioner of the Republic of Slovenia; Spain Agencia Española de Protección de Datos (AEPD); Sweden Datainspektionen; United Kingdom The Information Commissioner’s Office; Iceland Persónuvernd; Lichtenstein Data Protection Office, Principality of Liechtenstein; Norway Datatilsynet; gdpr enforcement technology solutions; Registered in England and Wales; U.K. compliance; how to restrict restrict access to data; how to enforce permission only access control; how to implement compliance access control; how to be compliant using technology;
Comments
0 comments
Please sign in to leave a comment.