Answer the question
In order to leave comments, you need to log in
How to determine the type of threat to personal data?
There was a need to normalize the relationship with personal data in a certain company. There is no problem with paper work. But the papers are highly dependent on the technical side of the issue. And the technique rests on the Decree of the Government of the Russian Federation No. 1119 dated 11/01/2012, where in order to determine the required level of security, it is first necessary to determine the type of threat.
Answer the question
In order to leave comments, you need to log in
If you use licensed software downloaded from official sites, and not repacks, you do not install software developed by the government of another country, in general you use widespread software whose developer constantly updates it, software developed by third-party companies is developed for you under an agreement with nda, you perform testing such software, you are not of interest to other states, then write that type 2 threats are not relevant to you.
If you use and update system software (OS, BIOS, microcode of microcontrollers), do not use no-name network equipment (you use proven Cisco equipment), etc., or vice versa, use only software in which a conditionally limited set of legal entities is sold, then write that type 1 threats are not relevant to you
It turns out that threats of the 3rd type are relevant to you.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question