
BLOCKS THE SOURCE OF INTERNAL FILE LEAKAGE
OS ACCESS CONTROL
____
On top of access and permission management features for users, processes, and directories, DB SAFER also performs additional security activities such as auditing task history. It also complies with key Korean personal information regulations.
Complies with key Korean regulations
Act on External Audit
of Stock Companies, etc.
of Stock Companies, etc.
Personal Information Protection
Commission 's Personal Information
Safeguard and security Standard
Commission 's Personal Information
Safeguard and security Standard
Financial Services Commission's
regulations on Supervision
of Electronic Financial Transaction
regulations on Supervision
of Electronic Financial Transaction
Korea Communications Commission's
Standards for Technical Management
and Protection of Personal Information
Standards for Technical Management
and Protection of Personal Information