English   |   Català   |   Español   |   Français   |   Português

Log of client activities: CENTRE TECNOLOGIC DE TELECOMUNICACIONS DE CATALUNYA

Field Content
1 - Name of the activity
2 - Responsible for the treatment / DPO CENTRE TECNOLOGIC DE TELECOMUNICACIONS DE CATALUNYA /
3- Purpose of the processing
4- Legal grounds for the processing
5- Categories of data subjects
6- Origin of the data
Categories of personal data
7 - Identification data
8 - Processing system
9- Data transfers
International Transfers
10- Country
11 – Category of recipients
12- Company
13- Legal grounds
14- Data erasure timeframes
15- General description of the technical and organizational security measures
FUNCTIONS AND OBLIGATIONS Deliver to all users in accordance with their user profiles, their functions and obligations relating to the security measures to be complied with and the consequences of any breach.
IDENTIFICATION AND AUTHENTICATION Individual identification and authentication Procedure for assigning and distributing passwords Password complexity and changes.
ACCESS CONTROL Updated list of authorised users and access. Access control allowed in keeping with the functions assigned and systems to prevent non-authorised access. Granting of access permits only for authorised personnel. Physical access control to the premises where the information systems are located.
BACKUP COPIES Frequency of backups Procedures for generating backup copies and data recovery. Remote backup copies systems.
MEDIA MANAGEMENT Inventory management and identification of media. Media stored under lock and key Log of incoming and outgoing media. Media destruction measures.
INCIDENT LOG Log containing the type, time detected, person reporting, effects and corrective measures of the incident. Notification procedure and incident management Data recovery procedures
OTHER TECHNICAL MEASURES Use of antivirus and firewalls.
Screen savers.
Remote access control
Standards of use of email and the internet.
Use of peripherals (printers, photocopiers and multi-function devices).
NON-AUTOMATED PROCESSING Application of document filing criteria to facilitate consulting, locating and handling of Rights. Use of storage devices with locking systems (key, codes...). Custody of active documents to prevent non-authorised access.
DATA PROCESSORS List of data processors. Description of services rendered. Adoption of warranties by processors.

Field Content
1 - Name of the activity
2 - Responsible for the treatment / DPO CENTRE TECNOLOGIC DE TELECOMUNICACIONS DE CATALUNYA /
3- Purpose of the processing
4- Legal grounds for the processing
5- Categories of data subjects
6- Origin of the data
Categories of personal data
7 - Identification data
8 - Processing system
9- Data transfers
International Transfers
10- Country
11 – Category of recipients
12- Company
13- Legal grounds
14- Data erasure timeframes
15- General description of the technical and organizational security measures
FUNCTIONS AND OBLIGATIONS Deliver to all users in accordance with their user profiles, their functions and obligations relating to the security measures to be complied with and the consequences of any breach.
IDENTIFICATION AND AUTHENTICATION Individual identification and authentication Procedure for assigning and distributing passwords Password complexity and changes.
ACCESS CONTROL Updated list of authorised users and access. Access control allowed in keeping with the functions assigned and systems to prevent non-authorised access. Granting of access permits only for authorised personnel. Physical access control to the premises where the information systems are located.
BACKUP COPIES Frequency of backups Procedures for generating backup copies and data recovery. Remote backup copies systems.
MEDIA MANAGEMENT Inventory management and identification of media. Media stored under lock and key Log of incoming and outgoing media. Media destruction measures.
INCIDENT LOG Log containing the type, time detected, person reporting, effects and corrective measures of the incident. Notification procedure and incident management Data recovery procedures
OTHER TECHNICAL MEASURES Use of antivirus and firewalls.
Screen savers.
Remote access control
Standards of use of email and the internet.
Use of peripherals (printers, photocopiers and multi-function devices).
NON-AUTOMATED PROCESSING Application of document filing criteria to facilitate consulting, locating and handling of Rights. Use of storage devices with locking systems (key, codes...). Custody of active documents to prevent non-authorised access.
DATA PROCESSORS List of data processors. Description of services rendered. Adoption of warranties by processors.

Field Content
1 - Name of the activity
2 - Responsible for the treatment / DPO CENTRE TECNOLOGIC DE TELECOMUNICACIONS DE CATALUNYA /
3- Purpose of the processing
4- Legal grounds for the processing
5- Categories of data subjects
6- Origin of the data
Categories of personal data
7 - Identification data
8 - Processing system
9- Data transfers
International Transfers
10- Country
11 – Category of recipients
12- Company
13- Legal grounds
14- Data erasure timeframes
15- General description of the technical and organizational security measures
FUNCTIONS AND OBLIGATIONS Deliver to all users in accordance with their user profiles, their functions and obligations relating to the security measures to be complied with and the consequences of any breach.
IDENTIFICATION AND AUTHENTICATION Individual identification and authentication Procedure for assigning and distributing passwords Password complexity and changes.
ACCESS CONTROL Updated list of authorised users and access. Access control allowed in keeping with the functions assigned and systems to prevent non-authorised access. Granting of access permits only for authorised personnel. Physical access control to the premises where the information systems are located.
BACKUP COPIES Frequency of backups Procedures for generating backup copies and data recovery. Remote backup copies systems.
MEDIA MANAGEMENT Inventory management and identification of media. Media stored under lock and key Log of incoming and outgoing media. Media destruction measures.
INCIDENT LOG Log containing the type, time detected, person reporting, effects and corrective measures of the incident. Notification procedure and incident management Data recovery procedures
OTHER TECHNICAL MEASURES Use of antivirus and firewalls.
Screen savers.
Remote access control
Standards of use of email and the internet.
Use of peripherals (printers, photocopiers and multi-function devices).
NON-AUTOMATED PROCESSING Application of document filing criteria to facilitate consulting, locating and handling of Rights. Use of storage devices with locking systems (key, codes...). Custody of active documents to prevent non-authorised access.
DATA PROCESSORS List of data processors. Description of services rendered. Adoption of warranties by processors.