Technical & organisational measures

Last revision on February 10, 2023

Control of physical access to the premises and equipment used for data processing

Equipment processing data for Random Team is managed and owned by Amazon Web Services.

Security controls notably include:

  • Anti-intrusion system (locked rooms, security alarm)

  • Backup power supply to guarantee security of physical devices

  • Authentication mechanism when entering premises (badge / key)

  • Procedure on the handling of authentication mechanism when entering premises

  • Additional measures restricting access to critical technical areas such as:

  • locked rooms,

  • video surveillance with recording,

  • access badge with specific authorisation justified by a legitimate professional need

  • Backup devices stored in secured location

  • Video surveillance

  • 24/7 guard service

  • Specific conditions for guest access (signing of a record, temporary badge, etc.)

  • Policy on escorting guests into buildings

Physical security at Random Team offices (equipment: staff computers) notably includes:

  • Anti-intrusion system (locked rooms, security alarm)

  • 24/7 guard service

  • Video surveillance

  • Authentication mechanism when entering premises (badge)

  • Laptops locked in cabinets at end of day

Control of access to IT system

  • Access logging for IT systems

  • User authentication through registered user accounts

  • Limitation of failed login attempts (blocking of user account)

  • Strong password policy for both users/administrators

  • Documented procedure to reset forgotten passwords

  • Access policy for IT systems with a regular reviewed procedure for granting authorisations

  • Access to IT systems allowed only after double-factor authentication

  • Secure remote access to IT systems (VPN / strong authentication)

  • Server systems can only be administered with via password-protected and encrypted connection

  • Secure wireless network

  • Automatic password-protected screen and computer locking when temporarily not in use

  • Regular update of antiviruses and firewalls

  • Critical updates for operating systems installed without delay

  • Applications updates installed in case of critical breach

Control of access and transmission of data

  • Pseudonymization

  • Data access restricted to persons with an operational need only

  • Logging of data access

  • Policy describing access authorisation

  • Data transmitted through the internet is encrypted

  • Remote access via VPN connection

Control of data integrity and availability

  • Logging of system administrators’ activity

  • Activity logging for users of data processing tools

  • Data backup on a regular basis with control over carrying out and verifying theses backups

  • Emergency and restore procedures with regular testing

  • Secure technical setups (UPS with inverters, smoke detectors, temperature control…for further details check here:

  • Business continuation plan with regular testing

  • Disaster recovery plan with regular testing

  • Proper, state of the art usage of system protection solutions

Separation control & IT development

  • Physical/logical separation of data in case of numerous clients

  • Sandboxing

  • IT development tests carried out on fictitious or anonymised data

  • Training developers in data privacy by default and by design

Organizational measures

  • Procedure for testing, analysing and assessing the efficiency of technical and organisational measures (penetration tests, scans for internal and external vulnerabilities, etc.)

  • Procedure for managing security incidents

  • Security policy

  • Raising user awareness in terms of security

  • Training employees whose tasks consist in processing data entrusted to the provider

  • Periodic assessment of sub-processors

Last updated