Managing user accounts, access rights, authentication logs, and system activity monitoring.

Data Details
Data Subjects
EmployeesIT AdministratorsContractors
Data Volume
200 - 500 user accounts
Data Categories
UsernameIP AddressLogin TimesSystem ActionsAccess Permissions
Processing Type
Collection
Automated Decision-Making
No
Legal Basis
Legal Basis
Legal Obligation
Consent Mechanism
Employee Acceptable Use Policy (AUP)
Purpose
Ensuring system security, preventing unauthorized access, and maintaining operational integrity.
Legal Basis Detail
NCA ECC Cybersecurity Framework requirements, internal security policy obligations.
Recipients & Transfers
Internal Recipients
IT SecurityHR (disciplinary)Compliance
External Recipients
Retention & Security
Retention Period
12 months for access logs, 5 years for security incidents
Retention Justification
Security Measures
✓ SIEM System✓ Multi-Factor Authentication✓ Privileged Access Management✓ Log Integrity Controls
PDPL Compliance Assessment
Update →
D1 Data Subject Rights & Consent
82%
Compliant

All requirements for Data Subject Rights & Consent are met. Documentation is complete and up to date.

D2 Processing Principles & Lawful Basis
85%
Compliant

All requirements for Processing Principles & Lawful Basis are met. Documentation is complete and up to date.

D3 Data Protection & Security
92%
Compliant

All requirements for Data Protection & Security are met. Documentation is complete and up to date.

D4 Organizational Requirements & Governance
88%
Compliant

All requirements for Organizational Requirements & Governance are met. Documentation is complete and up to date.

D5 Cross-Border Data Transfer
98%
Compliant

All requirements for Cross-Border Data Transfer are met. Documentation is complete and up to date.

D6 Compliance & Accountability
84%
Compliant

All requirements for Compliance & Accountability are met. Documentation is complete and up to date.

Edit Activity Add Risk