GDPR – Rights and principles

GDPR – Rights and principles III.

This article is the last continuation of the GDPR principles series. In the previous articles you could read about the purpose limitation principle and data minimisation or accurancy and data retention periods. Now let’s learn about data security and Accountability. Data security Controllers are responsible for ensuring that personal data are kept secure, against both external and internal threats. This Read more about GDPR – Rights and principles III.[…]

GDPR rights and principles II

GDPR – Rights and principles II.

Last article was devoted to the principles concerning controller’s duties. On contrary, today’s principles will express what data subjects may call for. Accuracy Personal data must be accurate and kept up to date, in other way it should be deleted or amended. So far nothing new in comparison with the Directive. The controllers must make Read more about GDPR – Rights and principles II.[…]

GDPR - Rights and principles I.

GDPR – Rights and principles I.

Today we will continue discovering GDPR principles by giving attention to two new principles introduced by GDPR. Both of them seem to be burdensome and restrictive for controllers, presenting their new duties and restraints. The purpose limitation principle The purpose limitation principle says the personal data collected for one purpose should not be used for Read more about GDPR – Rights and principles I.[…]

GDPR – The Evolution, not the revolution

GDPR – The Evolution, not the revolution

Many years have passed since the actual data protecting regime had been set. The technology is making huge steps and virtual environment is full of new threats. The personal data are of a great value in such environment. Therefore, the data protection deserves a proper attention. And GDPR should provide more safety. To understand any Read more about GDPR – The Evolution, not the revolution[…]

Evolveum GDPR shield

GDPR – Ready or not, here I come

G-D-P-R, these four letters might be causing you a headache, if you run a conscious business. GDPR brings some difficult obligations on scene and it is about time to start with preparations. If you care about the data protection, you surely dealt with it already or at least considered the processes improving privacy in your organization. Read more about GDPR – Ready or not, here I come[…]

Practical organization structure in Active Directory

When we are deploying Identity Management (IDM) solution in organization, we are facing a number of questions. One of them is how to map organization structure scheme (first picture below) to target system so we can facilitate and clarify the work of administrators to manage access and privileges tied to organization structure (OS). Let me Read more about Practical organization structure in Active Directory[…]

Is Resource Configuration Hell? Not in MidPoint 3.1!

Resources (target or source systems) are the heart of every identity management system or provisioning tool. Of course, one might argue that users (subjects) are most important and that statement is not wrong. However, without resources, there would simply be nowhere to connect to. Certainly, this debate is not the point of this article. Its Read more about Is Resource Configuration Hell? Not in MidPoint 3.1![…]

Why do I prefer IntelliJ IDEA?

Before using IntelliJ IDEA, I used to work with another IDE, Eclipse. After some issues with tomcat configuration, my colleagues suggested using IDEA as a development tool for our project, MidPoint. Of course, the process of transformation from one IDE to another is always a little painful, but after some help from my colleagues and Read more about Why do I prefer IntelliJ IDEA?[…]

Sun IdM to midPoint migration (case study)

We would like to announce that one of several ongoing migrations from Sun IdM to midPoint has successfully finished. It was done by our partner AMI Praha. They published interesting article describing their deployment, unfortunately only in Czech language, available at nasazeni-idm-midpoint-v-ami-praha. We would like to highlight that it is a typical deployment for a Read more about Sun IdM to midPoint migration (case study)[…]