Skip to content
Logo Rsecure
  • Home
  • Services
    • E-Learning
    • CISO as a Service
    • Phishing Campaign
    • Compliance
    • Defense Plan
    • CIS CSAT
    • CSSF 20-750
    • Vulnerability Scan
  • About us
  • Contact
  • White paper
Logo Rsecure
  • Home
  • Services
    • E-Learning
    • CISO as a Service
    • Phishing Campaign
    • Compliance
    • Defense Plan
    • CIS CSAT
    • CSSF 20-750
    • Vulnerability Scan
  • About us
  • Contact
  • White paper

22-804

Step 1 of 5 - Information

20%
Name*

TEN-19 The use of telework should comply with the mandatory public policy provisions and the provisions of the Luxembourg Labour Code.

19. The use of Telework by Supervised Entities may not contravene any legal provisions that are part of the mandatory public policy provisions (règles d’ordre public) and shall, in particular, comply with the provisions of the Luxembourg Labour Code.

TEN-20 This circular does not allow to circumvent laws and regulations in place.

20. In addition, Supervised Entities shall take into account that the prudential requirements with respect to substance and central administration may differ from other legal provisions, especially laws and regulations relating to tax CIRCULAR CSSF 21/769 7/16 (domestic, foreign and international), companies, professional secrecy, data protection and social security. The CSSF expects Supervised Entities to give due consideration to these laws when implementing Telework, especially in the context of Telework by non-resident staff members. The present circular may not be interpreted in a way that Supervised Entities may circumvent laws and regulations in place.

TEN-21 You should comply with European and national regulations regarding freedom of establishment and freedom to provide services when deploying telework.

21. Each Supervised Entity shall also comply with European and national regulations regarding freedom of establishment and freedom to provide services when deploying Telework.

TEN-22 All contractual relations between Supervised Entities and their employees are out of scope of the present circular.

22. This circular does not create any precedence for rights or obligations on whether Telework may be implemented by entities under the supervision of the CSSF. All contractual relations between Supervised Entities and their employees are out of scope of the present circular.

TEN-23 Do you have a central administration consisting of a "decision-making center" and an "administrative center" with the proper staff ?

23. A robust central administration consists of a "decision-making centre" and an "administrative centre", which includes sufficient staff with the necessary skills, knowledge and expertise as well as the technical and administrative infrastructure, to exercise its function or activity.
MM slash DD slash YYYY

TEN-24 Are the central administration staff member able to return to your premises on short notice in case of need?

24. In order to comply with this central administration requirement, the staff members shall be able to return to the Supervised Entity’s premises on short notice in case of need.
MM slash DD slash YYYY

TEN-25 In the case of branches located outside of Luxembourg, are staff members able to return to the branches’ premises on short notice in case of need.

25. In the case of branches of Supervised Entities located outside of Luxembourg, it also has to be ensured that staff may return to the branches’ premises on short notice in case of need.
MM slash DD slash YYYY

TEN-26 Is the Extent to Which Telework may be used without violating central administration requirements clearly defined?

26. It is the responsibility of the Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, to define, in advance, the extent to which Telework may be used without violating central administration requirements in accordance with applicable laws and regulations.
MM slash DD slash YYYY

TEN-27.a Does the number of staff which may telework at the same time comply with central administration requirements?

27. As a baseline, the following specific criteria shall be respected when implementing, using or extending Telework: a. The number of staff of a Supervised Entity which may telework at the same time must comply with central administration requirements.
MM slash DD slash YYYY

TEN-27.b Is the amount of normal working time, individual staff members are allowed to telework limited?

27. As a baseline, the following specific criteria shall be respected when implementing, using or extending Telework:b. The amount of normal working time, individual staff members are allowed to telework, should be limited.
MM slash DD slash YYYY

TEN-27.c Are all key functions sufficiently represented and permanently guarantee the CIRCULAR CSSF 21/769 8/16 functioning of the activities and controls?

27. As a baseline, the following specific criteria shall be respected when implementing, using or extending Telework:c. In principle, at least 1 authorised manager shall be on site at the head office at all times. Furthermore, key functions shall be sufficiently represented every day in the premises and permanently guarantee the CIRCULAR CSSF 21/769 8/16 adequate functioning of the activities and controls as well as proper decision-taking. For this purpose, Supervised Entities shall take into account the size and organisation of the Supervised Entity and the nature, scale and complexity of its activities.
MM slash DD slash YYYY

TEN-27.d Can you demonstrate that the head office remains at all times the “decision-making center”?

27. As a baseline, the following specific criteria shall be respected when implementing, using or extending Telework: d. The Supervised Entity shall be able to demonstrate that the head office remains at all times the “decision-making centre” as part of the central administration of the Supervised Entity.
MM slash DD slash YYYY

TEN-27.e.i Is ongoing performance of critical activities guaranteed: in an adequate,timely & secure manner ?

27. As a baseline, the following specific criteria shall be respected when implementing, using or extending Telework:e. The CSSF reminds the Supervised Entities that, in particular, the ongoing performance of critical activities shall be guaranteed. This aspect shall therefore be adequately considered in the implementation of Telework and the related policy. i. As such, the Supervised Entities shall ensure that interruptions of Telework (e.g. connection disruption) do not have a substantial impact on the entities’ capacity to carry out their activities in an adequate, timely and secure manner.
MM slash DD slash YYYY

TEN-27.e.ii Is ongoing performance of critical activities guaranteed: covered by a sufficiently skilled & responsible staff member present on the site?

27. As a baseline, the following specific criteria shall be respected when implementing, using or extending Telework:e. The CSSF reminds the Supervised Entities that, in particular, the ongoing performance of critical activities shall be guaranteed. This aspect shall therefore be adequately considered in the implementation of Telework and the related policy. ii. Provisions shall be made by the Supervised Entities to ensure that critical activities can be covered by a sufficiently skilled and responsible staff member present on site at the entity’s premises to guarantee the adequate functioning of the activities and controls during business hours.
MM slash DD slash YYYY

TEN-28 Was a risk analysis performed to identify the risks in implementing telework ?

28. The Supervised Entity shall perform a risk analysis in order to identify the inherent risks in implementing Telework, in particular, the operational risks, including legal, Information and Communication Technology (ICT), compliance and reputational risks.

TEN-28.a Hopw would you describe the level of maturity of this risk analysis ?

28. The Supervised Entity shall perform a risk analysis in order to identify the inherent risks in implementing Telework, in particular, the operational risks, including legal, Information and Communication Technology (ICT), compliance and reputational risks.
MM slash DD slash YYYY

TEN-29.a For (28) is attention paid to the evaluation of aspects related to labor law, tax law, company law and social security requirements ?

29. Particular attention should be paid to: a. The evaluation of aspects related to labour law and tax law (including permanent establishment issues), as well as company law and social security requirements;

TEN-29.b For (28) is attention paid to the evaluation of aspects related to the risk associated with the telework of privileged users?

29. Particular attention should be paid to: b. The risk associated with the Telework of privileged users;

TEN-29.c For (28) is attention paid to the evaluation of aspects related to the respect of the professional secrecy & data protection requirements ?

29. Particular attention should be paid to: c. The respect of the professional secrecy and data protection requirements (e.g. when professional devices or documents may leave the secure professional environment).

TEN-30 Are risk identification & mitigation measures implemented and adequately formalized ?

30. Supervised Entities shall ensure the implementation of the necessary mitigating controls and measures to keep the residual risks within the CIRCULAR CSSF 21/769 9/16 acceptable limits according to the entities’ risk appetite. Risk identification and mitigation measures should be adequately formalised.
MM slash DD slash YYYY

TEN-31 How frequently is this risk analysis regularly reviewed ?

31. Supervised Entities should regularly review their risk analysis and the appropriateness of the implemented mitigating measures, considering lessons learned, potential changes in the organisation, or their environment, working processes or Telework technical architecture as well as emerging threats such as e.g. cybercrime or opportunistic attacks around the Telework context.

TEN-32 Do you have an homeworking policy described ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed.

TEN-32.bis What is the level of maturity of theis policy ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed.
MM slash DD slash YYYY

TEN-32.a Does the policy determine: Business units or departments that may use Telework & activities &/or functions that may be performed via Telework ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: a. Business units or departments that may use Telework and activities and/or functions that may be performed via Telework;

TEN-32.b Does the policy determine: Functions and/or activities of business units or departments that must always be performed on the site ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: b. Functions and/or activities of business units or departments that must always be performed on site in the premises of the Supervised Entity;

TEN-32.c Does the policy determine: minimum number of staff required to work at the same time at the premises in Luxembourg ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: c. Minimum number of staff required to work at the same time at the premises in Luxembourg at entity level and, where relevant, at business unit or department levels;

TEN-32.d Does the policy determine: Working hours within which telework is allowed ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: d. Working hours within which Telework is allowed;

TEN-32.e Does the policy determine: Control procedures to monitor the proper execution of work performed through telework ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: e. Control procedures that have to be implemented in order to be able to monitor the proper execution of work performed by the staff through Telework;

TEN-32.f Does the policy determine: minimum physical meetings that should be held at the head office ?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: f. Minimum physical meetings that should be held at the head office in Luxembourg;

TEN-32.g Does Telework policy determine: measures to ensure that risks are contained, including compliance with confidentiality & data protection regulations?

32. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall define a Telework policy setting the framework and the limits under which Telework may be allowed. This policy shall clearly determine: g. Measures to be taken in order to ensure that risks remain contained, including compliance with confidentiality and data protection regulations.

TEN-33 Does this policy (32) set the operational framework enabling the management to monitor the number of staff members who are teleworking ?

33. The policy shall set the operational framework enabling the Authorised Management to monitor the number of staff members who are effectively teleworking.

TEN-34 The management information system & control environment is not altered by teleworking ?

34. The existing management information system and control environment of a Supervised Entity cannot be altered while allowing tasks to be performed via Telework. Existing controls (e.g. 4-eye controls), dashboards and reporting need to be executed in the same way and with the same frequency as defined in the existing internal procedures of the Supervised Entity.

TEN-35 The Telework policy (32) is reviewed annually based on the updated risk analysis and its operational & management objectives ?

35. The Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation, shall review the Telework policy annually based on the updated risk analysis and its operational and management objectives.

TEN-36 Do you maintain the evidence enabling the monitoring of the compliance with the Telework policy which can be requested by the CSSF?

36. The CSSF monitors compliance with this circular. To that effect, the Supervised Entity shall maintain the evidence enabling the monitoring of the compliance with the Telework policy (e.g. record the name, function and department/unit of each staff member teleworking). This should also allow demonstrating the compliance with the present requirements to independent auditors and to the CSSF. The Supervised Entity should, upon request, make available to the CSSF either the full evidence mentioned in the preceding sentence, or relevant parts thereof allowing demonstration of compliance with the present requirements, in a processable electronic form (e.g. a commonly used database format). The Supervised Entity should, upon request, make available to the CSSF all information necessary to enable the CSSF to execute effective supervision of the Supervised Entity, including, where required, the Telework policy.

TEN-37 Does internal control functions include the review of the Telework policy, process flows & compliance with the legal & regulatory requirements?

37. The internal control functions, such as (when applicable) compliance, risk management, including information security (RSSI/CISO) and internal audit, shall include the review of the Telework policy, process flows and compliance with the legal and regulatory requirements in their respective multi-year work programme and the report of any issues or findings in that regard to the CSSF in their respective annual summary reports, were applicable.

TEN-38 Does the annual summary reports mention any significant operational incidents in relation to telework ?

38. Furthermore, each year the annual summary reports shall, if applicable, mention any significant operational incidents in relation to Telework that might have occurred during the year. They shall also contain a short statistic on the use of Telework during the year.
MM slash DD slash YYYY

TEN-39 Are the requirements implemented in regards to the principle of proportionality by considering the nature, scale & complexity of your activities?

39. In principle, all paragraphs under this section apply to all Supervised Entities. When implementing these requirements, Supervised Entities should have regard to the principle of proportionality by considering the nature, scale and complexity of their activities. Risks may require higher or permit lower ICT and security measures than those described in this section. Supervised Entities remain responsible for ensuring that ICT and security conditions CIRCULAR CSSF 21/769 11/16 under which they authorise their employees to telework are in proportion to the risks to which the Supervised Entities are or could be exposed.

TEN-40 Do you define a "telework security policy" to protect the confidentiality, integrity & availability of the entity’s data & ICT systems ?

40. The Supervised Entity’s security policy shall define the high-level principles and rules applicable in the context of Telework, to protect the confidentiality, integrity and availability of the entity’s data and information and communication technology (ICT) systems. These principles and rules can either be part of the general security policy document or be included in the Telework policy document and are, in both cases, referred to below as “Telework security policy”. The Telework security policy shall be aligned with the relevant results of the risk assessment process and approved by the Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation

TEN-40.bis What is the level of maturity of this policy ?

40. The Supervised Entity’s security policy shall define the high-level principles and rules applicable in the context of Telework, to protect the confidentiality, integrity and availability of the entity’s data and information and communication technology (ICT) systems. These principles and rules can either be part of the general security policy document or be included in the Telework policy document and are, in both cases, referred to below as “Telework security policy”. The Telework security policy shall be aligned with the relevant results of the risk assessment process and approved by the Board of Directors of the Supervised Entity or any body that represents the Supervised Entity, by virtue of the law and of the instruments of incorporation
MM slash DD slash YYYY

TEN-41 Are user procedures adapted, complemented & updated to complement the telework security policy ?

41. This Telework security policy shall be complemented at operational level by adapting or completing the existing user procedures as appropriate. Telework policies, procedures and related documents shall be updated as well as communicated to the staff members on a regular basis
MM slash DD slash YYYY

TEN-42 Are all staff members aware of the risk, best practice, their duties & responsibilities regarding the use of telework ?

42. The Supervised Entity shall ensure all staff members’ awareness on risks and best practices regarding the use of Telework (e.g. through periodic training sessions, newsletters or other communications) as well as on their duties and responsibilities in line with the relevant security policies and procedures to reduce human error, theft, fraud, misuse or loss.
MM slash DD slash YYYY

TEN-43 Does the awareness initiatives (42) cover the organizational & technical risks of Teleworking & the behavior to be adopted by Teleworker.

43. The above-mentioned awareness initiatives and/or procedures and documentation shall cover organisational and technical risks (e.g. social engineering, phishing attacks, etc.) in relation to Telework as well as the specific behaviour to be adopted by the Teleworkers

TEN-44 Are access rights management adapted and reviewed in line with the risk assessment and Telework security policy?

44. The Supervised Entity shall review and adapt its access rights management procedures and the accesses granted for Telework in line with its risk assessment and with its Telework security policy.

TEN-45 Do you create user roles/profiles & access rights (AR) dedicated to telework, maintaining the segregation of duties principle ? (Non-obligatory)

45. In particular, Supervised Entities should consider the need to create user roles/profiles and access rights dedicated to the Telework situation (i.e. limited compared to on-premises work), while maintaining the segregation of duties principle.
MM slash DD slash YYYY

TEN-46 Is AR of Teleworkers granted based on the "need-to-know" principle and recertified annually for non-privileged&biannually for privileged users?

46. Access rights of Teleworkers (including of service providers) should be granted based on the “need-to-know” principle and recertified at least annually for non-privileged users and at least biannually for privileged users.

TEN-47.a If data is stored on the devices used by the users to connect remotely to the ICT systems, it must be encrypted.

47. The Supervised Entity has to ensure that it keeps control over the security of the devices used by the users to connect remotely to the Supervised Entity’s ICT systems. In particular, the Supervised Entity should ensure that: a. When data can be stored on the device, the storage media is encrypted; the recourse to virtual desktop infrastructures, which allow avoiding storage on the device, is encouraged; b. The security mechanisms implemented by the Supervised Entity cannot be modified, removed or bypassed by the staff members.
MM slash DD slash YYYY

TEN-47.b Do you ensure that security mechanism implemented on the device used by users to connect remotely to your ICT can't be modified, removed or bypassed?

47. The Supervised Entity has to ensure that it keeps control over the security of the devices used by the users to connect remotely to the Supervised Entity’s ICT systems. In particular, the Supervised Entity should ensure that: a. When data can be stored on the device, the storage media is encrypted; the recourse to virtual desktop infrastructures, which allow avoiding storage on the device, is encouraged; b. The security mechanisms implemented by the Supervised Entity cannot be modified, removed or bypassed by the staff members.

TEN-48 To achieve (47) do you only use company-owned devices under your full control ?

48. Compliance with the above requirements can best be achieved by using company-owned devices, which are under the full control of the Supervised Entity

TEN-49 Private device is only used for low-risk activities and systems.

49. Private devices are not considered as secure as company-owned devices; this is why they should be considered only for low-risk activities and systems. In addition, staff members carrying out critical activities shall not use private devices to carry out such activities. In particular, ICT teams shall not be able to access and administer ICT systems using private devices.

TEN-50 The use of these private devices is assessed through a specific risk analysis?

50. The potential use of privately owned devices must be considered carefully and assessed through a specific risk analysis. Despite the fact that the Supervised Entity is not the owner of the device, it must be in a position to monitor the professional data and applications that will be used on it. Solutions where the Supervised Entity installs a controlled professional environment (container) inside the private environment of the tool should allow it to keep full control over this container. Solutions based on the use of a virtual desktop infrastructure (VDI) from a privately owned device may be considered as long as the Supervised Entity is able to mitigate the risks resulting from a potentially compromised privately owned device. In addition, independent tests have to be organised on a regular basis in order to prove that either solution using a privately owned device is sufficiently secure.
MM slash DD slash YYYY

TEN-50.bis Are you able to monitor the professional use of the device ?

50. The potential use of privately owned devices must be considered carefully and assessed through a specific risk analysis. Despite the fact that the Supervised Entity is not the owner of the device, it must be in a position to monitor the professional data and applications that will be used on it. Solutions where the Supervised Entity installs a controlled professional environment (container) inside the private environment of the tool should allow it to keep full control over this container. Solutions based on the use of a virtual desktop infrastructure (VDI) from a privately owned device may be considered as long as the Supervised Entity is able to mitigate the risks resulting from a potentially compromised privately owned device. In addition, independent tests have to be organised on a regular basis in order to prove that either solution using a privately owned device is sufficiently secure.

TEN-51 Can company-owned device or the professional container on the privately owned device be remotely managed by a centralized management solution ?

51. Finally, the Supervised Entity shall ensure that the company-owned device or, if applicable, the professional container on the privately owned device can be remotely managed by a centralised management solution.

TEN-52 Can you ensure that the various components of Telework infrastructure are,at all times,properly functioning, correctly secured & closely monitored?

52. The Supervised Entity shall maintain a high level of security and availability of the Telework infrastructure over time. In this context, the Supervised Entity has to ensure, at all times, that the various components are properly functioning, correctly secured and closely monitored.

TEN-53 Do you implement mechanism allowing you to detect abnormal connections and block/alert on them?

53. The Supervised Entity shall implement mechanisms allowing it to detect abnormal connections and block/alert on them.

TEN-54 For (53), do you define a set of criteria that have to be ensured before allowing a Teleworker to access the ICT?

54. In particular, for the purpose of point 53, the Supervised Entity has to define a set of security and non-security criteria and requirements that have to be ensured before allowing a Teleworker to access the internal systems and data based on the risks identified during the risk assessment performed. In this context, possible criteria and requirements are (non-exhaustive list): a. the correct authentication of the Teleworker; b. the correct identification and authentication of the device; c. the correct identification of the remote location of the Teleworker; d. the connection time is within the defined working hours; e. the security components and mechanisms implemented by the Supervised Entity have not been modified or bypassed by the Teleworker or an attacker, are up-to-date and running.
MM slash DD slash YYYY

TEN-55 Do you have a change management process in place to ensure that changes do not jeopardize the implemented telework infrastrure & security level?

55. Maintaining the Telework infrastructure over time implies that the Supervised Entity has a robust change management process in place, ensuring that changes do not jeopardise the implemented Telework infrastructure and security level.
MM slash DD slash YYYY

TEN-55.bis What is the level of maturity of this policy ?

55. Maintaining the Telework infrastructure over time implies that the Supervised Entity has a robust change management process in place, ensuring that changes do not jeopardise the implemented Telework infrastructure and security level.
MM slash DD slash YYYY

TEN-56 Are data in transit encrypted in accordance with data classification and with respect to current leading practices ?

56. The Supervised Entity has to ensure that data in transit is secured, i.e. encrypted, in accordance with its data classification and that the implemented encryption protocols (for instance IPSec, SSL), the encryption algorithm (for instance RSA, AES) as well as the chosen key size respect current leading practices.

TEN-57 Is a 2-Factor Authentication (2-FA) implemented when connecting remotely to your systems?

57. A 2-Factor Authentication (2-FA) has to be implemented when connecting remotely to the systems of the Supervised Entity.

TEN-58 Is this authentication mechanism adapted according to the type of operations performed remotely and the user profile?

58. The implemented authentication mechanism may be adapted according to the type of operations performed remotely and the user profile (principle of proportionality).

TEN-59 For critical activities, is one of the factors of the 2-FA procedure dynamic ?

59. For critical activities Supervised Entities are expected to implement a strong 2-FA procedure with one of the factors being dynamic (e.g. OTP).

TEN-60 The communication chain & security measures are reviewed by independent security control function before & regularly after the golive of the telework?

60. The proper functioning of the communication chain from the remote device to the corporate infrastructure (e.g. remote access gateway) as well as the effectiveness of the implemented security measures shall be reviewed by an independent security control function (i.e. Information Security Officer, Internal Audit or specialised external third party) before the go-live of the Telework and on a regular basis thereafter.

TEN-61 Does this review confirm the security measures are correctly designed, tested, implemented and configured?

61. In particular, this review must confirm that the implemented infrastructure, the positioning of the different security barriers and applied security and data leakage prevention mechanisms are correctly designed, tested, implemented and configured.

TEN-62 Are vulnerability scans/penetration tests organized on a regular basis?

62. In addition, vulnerability scans/penetration tests should be organised on a regular basis, commensurate to the level of identified risk in relation to Telework.
MM slash DD slash YYYY

TEN-63 Is monitoring in place for teleworking related security vulnerability ? In particular for risk related to the use of privately owned devices.

63. A solid monitoring process should be in place to allow the Supervised Entity to be quickly informed of the emergence of new security vulnerabilities and to apply the necessary corrections within a short period of time. Particular attention shall be paid to the risks related to the use of privately owned devices in case their use is allowed.

TEN-64 Are all connections and relevant technical information related to telework logged for reasons of security monitoring with a sound logging process?

64. A sound logging process shall be implemented allowing the Supervised Entity to ensure that all connections and relevant technical information related to Telework (including the connecting device used) are logged for reasons of security monitoring.

TEN-65 Are access logs secured and is the principle of proportionality ensured?

65. Access logs shall be secured to prevent unauthorised modification or deletion. The principle of proportionality shall be ensured, e.g. the granularity of logged information and the log retention period shall be proportional to the criticality of the operation carried out by the Teleworker, without prejudice to the retention requirements set out in EU and national law.

TEN-67.bis Does this collect of log respect the legislation in place?

65. Access logs shall be secured to prevent unauthorised modification or deletion. The principle of proportionality shall be ensured, e.g. the granularity of logged information and the log retention period shall be proportional to the criticality of the operation carried out by the Teleworker, without prejudice to the retention requirements set out in EU and national law.
Terms of use of the site
General terms and conditions of sale
© 2022 Rsecure
Picto Cybersecurity lxbg
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.

Read our privacy policy

 
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
  • EnglishEnglish
  • FrançaisFrançais