Data security

JALIX helps you fight against everyday attacks

In the age of digital technology, the challenges of IT security have never been greater. Cyber-attacks are becoming more and more numerous and complex, and unfortunately also more effective, even with the implementation of professional security measures.

Our expertise allows us to deploy ever more secure solutions, and to further strengthen our turnkey services, JALIX has joined forces with Formind, the French leader and pure-player in cybersecurity consulting and integration.

Thanks to this partnership, Jalix and Formind take into account all the components of a company and its information system and with this 360° vision, we ensure that we accompany our clients from the upstream phases of strategic thinking to the downstream phases of auditing and control through the operational implementation of solutions.

01

Data security and processing

The security of data and processing is a global issue. It is important to ensure that the technical solutions used allow for the secure storage of data, the ability to store and retrieve the consents used, and to control access to data. It is also necessary to review all the processes involved to ensure that at each stage, the confidentiality of personal data is respected. This is not just an IT or digital approach.

02

Prioritisation of actions to be taken to achieve compliance

2/3 of companies will not be ready by May 2018, but you must not delay in taking on the dimensions of this regulation, otherwise you will no longer be able to use your data while your competitors will be able to do so! You must define an action plan as soon as possible, and do not hesitate to seek support.

03

Implementation of "Privacy by design" and management of the right to be forgotten

Data security will have to be integrated into the very design of the implementation of new solutions, new processes that involve the collection of personal data. From now on, the impact analysis will have to be carried out at the design stage and then, at any time, the contact will be able to demand the right to be forgotten. This management will also have to be integrated into the design phase.

04

Risk management (cyber attacks, theft, etc.)

Beyond the constraints of data collection and management, the notion of security is now paramount. It should be noted that threats have never been so high, whether it be theft (physical or computer), viruses (with new mechanisms such as ransomware), fraud or cyber attacks.

05

Mapping of personal data processing

In order to be able to fully ensure the security and confidentiality of personal data, it is necessary to know precisely the processes that use this type of data. However, many business processes evolve / drift over time and significant gaps can be identified between "what they should be" and "what they actually are". Mapping is essential.

How to protect your personal data?

To comply with the European Data Protection Regulation (RGPD) which has been in place since 2018, the CNIL (Commission Nationale de l'Informatique et des Libertés) recommends adopting 4 good attitudes:

  • Create a register of its data processing operations
  • Keep only essential data
  • Allow users the right to consult, rectify or delete their data
  • Securing your data.

JALIX accompanies you on the RGPD audit

Compliance with the RGPD entails internal changes that must be identified and dealt with. The review of processes and their security can be an opportunity to not only deal with the technical aspect of compliance but to have a more global approach aiming at putting data management and valorisation at the heart of your strategy.

"Personal data must be processed in such a way as to ensure the appropriate security of personal data, including protecting them against unauthorised or unlawful processing and against accidental loss." - GDPR, Article 5