Thursday, July 15, 2021

Data Security 12

Information Technology Systems Procurement, Development, and Maintenance

The needs for the procurement, development, or improvement of existing systems should be determined by the data controller and security requirements should be considered.

👇👇👇

Checks should be made that the inputs of the application systems are correct and appropriate, and control mechanisms should be placed in the applications to check whether the correctly entered information is corrupted as a result of an error that occurred during the process or intentionally. Applications should be designed in such a way as to minimize the possibility that errors during processing will compromise data integrity.

If the devices that are sent to third parties such as manufacturers, vendors, and service providers because they are malfunctioning or maintenance period has come, contain personal data before these devices are sent for maintenance and repair, to ensure the security of personal data, the data storage medium in the devices should be removed and stored, and only defective parts should be sent. If external personnel has arrived for maintenance and repair purposes, necessary measures must be taken to prevent them from copying and removing personal data from the institution.

3 comments:

  1. Hey There. I found your blog using msn. This is an extremely well written article. I’ll be sure to bookmark it and return to read more of your useful info. Thanks for the post. I’ll definitely comeback. solid state drives ssds

    ReplyDelete
    Replies
    1. Thank you very much @kharizaffar. I'm very happy to hear that. You can follow the other works from the Youtube channel too.

      Delete

Your comment will taken into consideration.