What RGPD coverage do you have employed?

Signaturit complies with all its obligations under the RGPD. First of all, towards its clients, Signaturit acts as data processor, assuming the corresponding obligations, based on the provisions of article 28 of the RGPD. As data processor, Signaturit carries out a treatment on behalf of the data controller who will the specific treatment that Signaturit will be allowed carry out regarding the personal data. 

In order to duly perform its role as data processor, Signaturit has implemented several security measures aimed at ensuring the proper treatment of data. Some of the measures taken by Signaturit are the following:

  1. It has a system for the designation of users and passwords of its personnel, both for their own systems and for third-party systems, for which access is limited by attending to user profiles; by assigning personalized users and passwords that expire at least once a year.
  2. It has informed its personnel of the rights and duties that correspond to them regarding the processing of data of third parties.
  3. It has an updated list of profiles and permissions of its users, both to its own systems and those of third parties.
  4. It has a system for registering incidents, as well as the protocol to follow in case of an internal incident as well as the communication to the Data Controller, Users or the supervisory organism.
  5. Adopt appropriate measures for the transfer of media, own or of third parties, if any.
  6. It has identification systems for the supports it works with.
  7. It has a circuit of backup copies of its systems on a daily basis.
  8. It has a data recovery circuit, as part of its Business Continuity and Disaster Recovery Policy. 
  9. It has appointed a Data Protection Officer, which can be contacted in the following address: dpo@signaturit.com.  
  10. Has conducted or conducts audits every two years in the field of data protection.
  11. It has a system for registering entries and exits of media that may contain especial categories of data that complies with the parameters of the law.
  12. It has limited the unauthorized accesses to its computer systems, as it has established secure areas, with limited access only to trusted personnel, both physically and logically. 
  13. In its circuit and record of incidents, it is also allowed to record the data recovery process; according to the parameters of the regulations.
  14. It has an Information Security Management System certified under the ISO 27001 standard by AENOR INTERNACIONAL, S.A.U.

If you have further questions about how we comply with our obligations regarding the protection of personal data, please check our Privacy Policy.

Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.
Powered by Zendesk