Corporate backup to comply with the GDPR

The GDPR came into force on May 25, 2018, prompting companies to adapt to a series of guidelines. Among the different approaches and tools, theRemote Backup service helps firms and companies to respond, in particular, to Article 32 to protect themselves from a possible Data Breach (the consequences of which are governed by Article 33).

The GDPR at a glance (articles 32 and 33)

Art. 32 – Security of processing

The required measures:

  • data encryption
  • the guarantee of confidentiality, integrity, availability and resilience of the systems
  • the timely restoration of the availability and access of data in the event of a physical or technical accident
  • an adequate level of security to avoid the destruction, loss, modification, unauthorized disclosure and accidental or illegal access of personal data processed

Art. 33 – Notification of personal data breach

In the event of a violation of personal data, the data controller notifies the violation to the competent supervisory authority without undue delay and, where possible, within 72 hours of becoming aware of it. The data controller informs the data controller without undue delay after becoming aware of the violation.

The notification must:

  • describe the nature of the personal data breach
  • communicate the name and contact details of the data protection officer
  • describe the likely consequences of the personal data breach
  • describe the likely consequences of the personal data breach

What are the features of Remote Backup that best meet the guidelines of the GDPR?

  • It protects all infrastructure, including: physical systems, virtual hypervisors, virtual machines, cloud applications,desktops and laptops as well as mobile devices.
  • Restore selected files, folders, items and applications quickly and easily
  • Enhance infrastructure resilience with regular and customizable reports focused on exceptions
  • Increase resiliency by storing backups in up to 5 locations, including local disks, NAS, SAN, and tapes
  • It intercepts suspicious changes to data, backup files and the backup application itself
  • The data is encrypted by encryption and already during backup, ensuring high levels of protection
  • The data is also encrypted to the provider that manages and monitors the backup, ensuring total privacy
  • The Acronis Active Protection feature protects systems from ransomware by intercepting and defending files from encryption


Richiedi un preventivo personalizzato

Cosa stai aspettando?

Check-up gratuito analisi costi TLC

Analisi costi Office, in omaggio per la tua Azienda.