Relentless advances in I.T. technologies have made them a fundamental activity for any company. However, their use without proper technical and legal planification, could lead to several risks:
We verify compliance with security measures by the users involved: record of incidents, access control, media management, identification and authentication, backup copies and recovery, access record, telecommunications, etc.
We draw up the executive measures in order to minimise or eliminate the risks: drafting of contractual clauses, security policies, action protocols, systems for obtaining electronic evidence, internal communications, proposals for the implementation of control and verification systems or applications, training, awareness-raising, etc.
We carry out a technical-legal control of use made by workers of their own electronic devices in the workplace (BYOD).
We detect technical and legal deficiencies and anomalies and prepare a Risk Map with the indication of the different recommendations proposed for their correction.
We analyse the use that workers make of computer tools and equipment made available to them. We check the installed software and the use made of the same, monitoring of equipment activity.
We analyse the use of social networks by workers and the consequences within the framework of their work activity. We would inventory the social networks and open profiles by the employees monitoring the contents included.