Do you protect personal information against unauthorized access (both physical and logical)?
Explanation
Example Responses
Example Response 1
Yes, we protect personal information against unauthorized access through comprehensive physical and logical controls For physical protection, our data centers require multi-factor authentication for entry, with 24/7 security personnel, CCTV monitoring, and mantrap entries All visitors must be pre-approved, escorted, and logged For logical protection, we implement role-based access control (RBAC) with least privilege principles, requiring multi-factor authentication for all systems containing personal information All personal data is encrypted both in transit and at rest using industry-standard encryption (AES-256) We conduct quarterly access reviews to verify appropriate permissions, and our security team uses a SIEM solution to monitor for unauthorized access attempts in real-time All access to personal information is logged and audited monthly.
Example Response 2
Yes, our organization maintains strict controls to protect personal information Physical protection includes badge access systems at all entry points, with different security zones requiring increasing levels of authorization Server rooms containing personal data are restricted to IT personnel only and require biometric verification For logical protection, we implement network segmentation to isolate systems with personal information, require strong passwords with 90-day rotation policies, and enforce multi-factor authentication for remote access All personal data is classified according to sensitivity levels with corresponding access restrictions We use data loss prevention (DLP) tools to prevent unauthorized exfiltration of personal information, and all access attempts are logged We conduct annual penetration testing specifically targeting our personal information protection controls.
Example Response 3
No, we currently have partial protections for personal information but acknowledge gaps in our security posture While we have implemented basic logical controls such as password protection and standard network firewalls, we lack comprehensive physical security measures beyond standard office locks We do not currently encrypt all personal information at rest, and our access review process is manual and performed irregularly We're working to address these gaps through a security improvement plan that includes implementing encryption across all systems storing personal information, establishing formal access review procedures, and enhancing our physical security with badge access systems and visitor management We expect these improvements to be completed within the next 6 months.
Context
- Tab
- Privacy
- Category
- Data Privacy

