Data Protection Compliance
EU GDPR compliance
through automated access management
Directory for processing activities
Create data protection classes and mark the resources in the company based on especially sensitive personal data in accordance with Article 9 of the EU GDPR 2016/679.
Together with their data protection officer, the responsible departments can amend the description of addresses with information on processing activities, data collection, and the handling of deletion flags.
Combined with various reports, such as a list of controllers responsible for the addresses, you have easy access to an overview of all relevant information for complying with the EU GDPR – easily accessible in an interface.
Automated access management
Automating access management is the key to achieving time and cost savings in operation, preventing manual errors, and increasing data security – one of the core principles of the Access Manager. From interactive user requests via the Self-Service Portal (or via an assistance function) and the identification of the responsible decision-makers (or a representative), to audit-proof decision documentation and the implementation of technical changes – the Access Manager handles access management without any involvement of the help desk or IT administrators.
- Searches for directory
- Submits request
- Informs decision-maker
- Takes decision
- Technical implementation
All requests and decisions are automatically implemented and logged in an audit-proof record.
Recertification – regular reviews of permissions
Following the need-to-know principle, a user should only receive as many permissions as they require to fulfill their current tasks. In practice, however, more and more extensive permissions accumulate over time, although most may no longer be needed.
To prevent this uncontrolled growth in permissions, auditors recommend recertifying or reapproving permissions so that data controllers regularly check the existing permission situation.
This is where the Access Manager comes in with the integrated Reapproval system. This process benefits from intuitive use via a browser, enabling straightforward and transparent access management. Combined with the option to set time limits for permissions, it also creates a redundant system for preventing the unintended accumulation of permissions.
Who has access to your data and since when? Find out – with the Bayoosoft Access Manager.
Arrange your appointment for a no-obligation product presentation today and learn about the varied features of the Access Manager from our access management experts – free of change and without any risk, of course.