With additional restrictive measures

restrictive measures That is why, according to Mr. Vakhonin, when processing data, it is extremely important to effectively use content analysis to search for corporate data. If you fully utilize the capabilities of content filtering, you can detect only those data that are confidential corporate information, for example, contain signs, tags, keywords and expressions that are of interest to the information security service, and not affect the personal data of employees.

An important prerequisite for solving restrictive measures

The problem of the DLP system phone number list functioning within the legal framework, Ms. Krasova believes, is the observance of certain mandatory rules in the company. Thus, the DLP system should function together, including documenting procures for handling confidential information (ideally, it is necessary to form a commercial secret regime as the only legal mechanism for holding accountable for leakage/disclosure of critical information), requirements for the permissible use of the Internet, e-mail, instant messaging systems, the company’s internal corporate resources, etc.

Having initially determin that

The legal framework around DLP systems is built on the basis of the Constitution of the Russian Feration, the Labor Code and civil legislation, in particular Feral Law No. 149 “On Information, Information Technologies and the Protection of Information”, Mr. Klevtsov states that the principles of legitimizing DLP systems are bas on the fact that employees have nothing personal in the company.

When coming to work, an employee

Must perform his job essential growth hacking tools responsibilities, and all company resources: systems, services, any restrict information – are allocat to him for conducting work activities. Therefore, the employer has the afb directory right to establish requirements for corporate activities under labor legislation and control these activities,” he believes. He recommends developing internal corporate rules and regulations that spell out the rules for working and using confidential data and which employees must be familiariz with under signature.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top