| LGPD requirements |
Requirement description |
EventLog Analyzer reports |
| Article 6. VII |
Implement technical and administrative safeguards to shield personal data against unauthorized access and to prevent unlawful scenarios of destruction, loss, alteration, communication, or dissemination. |
- Network Device Logon Reports
- Unix User Account Management Reports
- Unix Logon Reports
- Network Device Account Management Reports
|
| Article 7. II |
Personal data processing may be conducted to fulfill a legal or regulatory duty by the controlling entity. |
- Network Device Logon Reports
- Unix Logon Reports
|
| Article 7. VIII |
Personal data processing is permissible solely for health protection purposes and must be conducted exclusively by healthcare professionals, health services, or health authorities within their procedures. |
- Network Device Logon Reports
- Network Device Attack Reports
- Network Device Configuration Reports
|
| Article 11 |
This article's regulations are applicable to the processing of any personal data that uncovers sensitive information and has the potential to harm the data subject, barring any specific legal provisions to the contrary. |
- Network Device Logon Reports
- Unix Logon Reports
|
| Article 14 |
The handling of personal data pertaining to children and adolescents should be executed with their best interests in mind, in accordance with the stipulations of this article and applicable laws. |
- MSSQL DDL Changes
- MSSQL Security Changes
- Unix FTP Server Reports
- Unix Removable Disk Auditing
- Windows Removable Disk Auditing
|
| Article 16 |
Personal data shall be disposed of following the conclusion of its processing, within the operational and technical limits of the activities. |
- Network Device Logon Reports
- Windows Logon Reports
- Windows Logoff Reports
- Windows Events
- Unix Account Management Reports
|
| Article 18 |
The holder of personal data has the right to obtain their processed data from the controller at any time and upon request. |
- MSSQL DDL Changes
- MSSQL DML Changes
- PostgreSQL DDL Changes
- PostgreSQL DML Changes
|
| Article 46. |
Agents responsible for processing must implement protective, technical, and administrative strategies to safeguard personal data against unauthorized access and any accidental or illegal incidents of destruction, loss, change, communication, or any form of improper or illicit processing. |
- Network Device Logon Reports
- Network Device Attack Reports
|
| Article 49. |
Systems employed in personal data processing should be designed to comply with security measures, best practice standards, governance norms, and the general principles outlined in this law as well as other regulatory guidelines. |
- Network Device Attack Reports
- Network Device Configuration Reports
|