Suprema does data protection

July 2018 Access Control & Identity Management, Security Services & Risk Management

The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for all individuals within the European Union as well as the export of personal data outside the EU. As an EU provider of biometric access control solutions, Suprema has anticipated the regulation by providing key technical features to comply with GDPR.

Recently showcased at IFSEC 2018 in London, Suprema provided a full demonstration of its GDPR-ready solution to help systems integrators and customers understand trusted best practices to keep people and organisations safe and secure.

When it comes to access control, GDPR requires that organisations implement appropriate technical and regulatory measures to provide security against certain risks. Suprema’s latest access control security solution now offers comprehensive GDPR-compliant features including:

• Secure biometric data protection through templates: Raw images of the fingerprints/faces are never stored in the device or server. All data is stored in templates, which are encrypted by 128 bit AES, 256bit AES, or DES/3DES depending on the designated storage location (i.e. device, server and/or smartcard).

• Protection against transactions, malware and data breaches: TCP communication of data within the system is secured using TLS 1.2 (including SSL/HTTPS). This ensures that no sensitive data is compromised during the communication between the devices and the central server.

• Physical protection of privacy data on edge devices: All Suprema devices are equipped with a secure tamper feature, which ensures the security of data stored in the devices. If the device is removed from the wall and tampered with, the secure data (biometric templates, user ID, logs) within the device will automatically be deleted.

• Personal data protection by ‘access on card’: With Access on Card (AoC) technology, Suprema provides system designers with the option to store personal data only on smartcards. All personal data and credentials are not stored on servers or devices, but only on his/her smartcard.

• Management of personal data lifecycle: In accordance with GDPR, Suprema makes it possible in BioStar 2 for event logs and data stored in the server to be automatically deleted after a certain period of time (set by the administrator). This is in line with the ‘right to be forgotten’ requirement in the GDPR.

• Authentication for data access: With the latest update of BioStar 2, Suprema’s open-architecture security platform, system administrators can fully customise an individual’s access rights, to personal data information, according to their organisational requirements.

• Providing proof of compliance: BioStar 2 delivers comprehensive audit logs.

For more information, contact Suprema, +27 11 784 3952, enquiry@suprema.co.za, www.suprema.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Improved security health check tool
Gallagher Access Control & Identity Management Products
Gallagher Security has streamlined its free Security Health Check tool, making it easier than ever to protect against potential system risks and improve business efficiencies.

Read more...
Sustainability School opens for enrolment
Education (Industry) News Security Services & Risk Management
Three-part programme, first developed for Schneider Electric employees, is now available for free for companies worldwide. Attendees learn how to future-proof their businesses and accelerate their decarbonisation journeys.

Read more...
Suprema showcases integrated security solutions
Suprema Access Control & Identity Management Products
Apart from being an access terminal that supports multiple credentials such as facial recognition, RFID, mobile and QR codes, the BioStation 3 also supports VoIP Intercom and real-time video monitoring features to make it a truly multi-functional reader.

Read more...
Success in business process best practices
Technews Publishing Kleyn Change Management Editor's Choice Integrated Solutions Security Services & Risk Management
This month we commandeer time with the woman who is spearheading our national conversation on Women in Security, Lesley-Anne Kleyn, to get to know the lady herself a little better.

Read more...
Local electronic locks
Access Control & Identity Management
YeboTech is an electronics manufacturing company, founded in 2005, which designs, markets and sells an electronic key and locking systems, aimed at replacing all conventional mechanical locks.

Read more...
Selecting the correct access control system
Enkulu Technologies Access Control & Identity Management
Frazer Matchett, Managing Director of Enkulu Technologies, suggests the right questions to ask when selecting an access control solution; not just the access system, but the integrated solution that fits your requirements.

Read more...
Integrated guarding services
XtraVision Integrated Solutions Access Control & Identity Management Industrial (Industry)
XtraVision offers a few tips on how to go about planning and setting up an integrated approach to sustainable and successful security services, from the initial risk assessment to the technology and people required.

Read more...
Paxton secures multi-tenant office in Cape Town
Paxton Integrated Solutions Access Control & Identity Management Products
Cecilia Square in Paarl, Cape Town is an office building from where several businesses operate. The multi-tenant site has recently undergone a full refurbishment, including a complete upgrade of its security system for access control.

Read more...
AI face recognition OEM module
Suprema News Access Control & Identity Management Products
Suprema AI, a company specialized in artificial intelligence–based integrated security solutions, recently launched its high-performance face recognition OEM module called ‘Q-Face Pro’ in response to the growing need for contactless security solutions.

Read more...
Security awareness training
Training & Education Security Services & Risk Management
It is critically important to have a security awareness solution that uses the limited time available to train effectively, and one that provides targeted education that is relevant to users.

Read more...