The General Data Protection and Regulation (GDPR) will come into full force on May 25, 2018. With less than a year to go, any organization that processes the data of EU citizens needs to understand this new legal framework, regardless of where they're located.
With data protection at its heart, the GDPR is designed to give the control of personal data back to the people. It has the potential to reshape how organizations worldwide handle data privacy, with promises of heavy penalties for those who fail to comply. Depending upon the infraction, organizations could receive a maximum fine of up to four percent of annual worldwide turnover or 20 million euros (whichever is higher).
FileAudit Plus helps you strengthen your organization's security posture, prevent data leaks, and avoid compliance-related penalities by continuously monitoring and reporting on all activities on your file server. Meet the GDPR's stringent requirements using the various reports generated by FileAudit Plus.
Below is a list of reports you can use to prove that your organization is compliant with the GDPR.
|GDPR standards||FileAudit Plus report or alert|
|Track all modifications to files in order to assess risks to the integrity of personal data and resolve violations, if any.||All file/folder changes report|
|Deleted/overwritten files report|
|Security permission changes report|
|Most modified file report|
|Create events report|
|Renamed/moved events report|
|File modified after N days report|
|Periodically review all attempts to access critical data, including both successful and failed attempts.||All failed attempts report|
|Read events report|
|Most accessed file report|
|Most accesses by processes/user report|
|File accessed after N days report|
|Review access rights and file permissions periodically to ensure that no excessive permissions are assigned beyond what is needed.||NTFS permissions report|
|Share permissions report|
|Utilize customizable alerts to enable timely detection of any user actions that violate your data protection policies.||File/folder moved or renamed alert|
|File/folder security changes alert|
|File/folder removed alert|
|Media files alert|
|Use preconfigured alerts to detect and respond quickly to potential data breaches.||Ransomware file alert|
* You can also generate customized reports based on file path, users, business hours, etc.
|The Access Audit report provides detailed information on the quintessential Four W's—who accessed what, when, and from where. This will help you keep track of all accesses and changes. The Access Analysis report provides a summary view of accesses and changes, which can help you detect access trends.||The File Analysis report helps isolate files that are old, unused, unmodified, large, hidden, or non-business; making data cleanup easier. The Disk Analysis report provides visual insight into disk space usage and trends, facilitating optimization of disk space; it also reveals properties of files and folders.|
|The Disk Analysis report provides graphical insight into disk space usage and history, facilitating optimization of invaluable disk space across file servers.||Examine share and security permissions of files and folders and prevent access exploitation.|
|Become proactive with real-time file and folder access and change auditing. Continuously monitor and get notified about critical activities.|