{"id":8084,"date":"2025-04-24T14:57:53","date_gmt":"2025-04-24T11:57:53","guid":{"rendered":"https:\/\/peero.app\/?page_id=8084"},"modified":"2025-04-24T15:03:11","modified_gmt":"2025-04-24T12:03:11","slug":"technical-and-organisational-security-measures","status":"publish","type":"page","link":"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/","title":{"rendered":"Technical and Organisational Security Measures"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8084\" class=\"elementor elementor-8084\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc611e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc611e0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b136e1e\" data-id=\"b136e1e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ddcb42 elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"3ddcb42\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-6481\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-6481\" aria-expanded=\"false\">English<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-6482\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-6482\" aria-expanded=\"false\">Latvie\u0161u<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-6481\" aria-expanded=\"false\">English<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6481\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-6481\" tabindex=\"0\" hidden=\"false\"><table width=\"100%\"><tbody><tr><td width=\"50%\"><h4><strong><em>Annex<\/em><\/strong><\/h4><\/td><\/tr><tr><td width=\"50%\"><h3><strong>TECHNICAL AND ORGANISATIONAL SECURITY MEASURES<\/strong><\/h3><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>I Purpose of processing, categories of data involved, categories of affected data subjects<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>1.\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Categories of data subjects<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Employees and other participants &#8211; individuals of the Corporate User\u2019s Peero community.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>2.\u00a0\u00a0\u00a0 <\/strong><strong>Type of personal data<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p><strong>(a)\u00a0 <\/strong><strong>Categories of personal data<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Name, surname, e-mail address, position held, department within the company, country of location \/ corporate adherence country of the data subject, proof of task completion (images or links), delivery information, associated metadata.<\/p><\/td><\/tr><tr><td width=\"50%\"><p>The Corporate User at its discretion may add to the particular Peero community individuals belonging to group of companies \/ organizations the Corporate User represents or is part of.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>(b)\u00a0 <\/strong><strong>Special categories of personal data<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Are not processed.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>3.\u00a0\u00a0\u00a0 <\/strong><strong>Nature of the processing<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Providing a feedback service (assessment and feedback) through the Peero App to the Corporate User as Controller and indirectly to data subjects &#8211; individuals added to the Peero community of the Corporate User.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>4.\u00a0\u00a0\u00a0 <\/strong><strong>Length of processing<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Until accomplishment of each individual task of the Corporate User, subject to the term of validity of the Agreement.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>II Technical and organizational measures<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>1.\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Physical Access Control<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Physical access is controlled according to rules of the manufacturer of the resource used &#8211; Microsoft Azure (<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/physical-security\">https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/physical-security<\/a>).<\/p><\/td><\/tr><tr><td width=\"50%\"><p>It shall include at least, but not limited to:<\/p><\/td><\/tr><tr><td width=\"50%\"><ul><li>Providing physical protection for the technological resources on which data are processed<\/li><li>Restriction of access to data<\/li><li>Access control key management<\/li><li>Choice of appropriate staff, service personnel<\/li><li>Provision of monitoring equipment<\/li><li>Providing virtually separate data processing equipment.<\/li><\/ul><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>2.\u00a0\u00a0\u00a0 <\/strong><strong>Logical Access Control<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Access to the Peero App resources in Microsoft Azure is granted according to the \u201cleast permissive\u201d principle and includes at least the following security aspects:<\/p><\/td><\/tr><tr><td width=\"50%\"><ul><li>Multi-factor authentication requirements<\/li><li>Defining password security level<\/li><li>Auto-lock your computer<\/li><li>Authentication journaling details<\/li><li>etc.<\/li><\/ul><\/td><\/tr><tr><td width=\"50%\"><p>The solutions applied by the Processor are described in detail in the internal corporate policies of the Processor.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>3.\u00a0\u00a0\u00a0 <\/strong><strong>Data Access Control<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>The Processor provides at least the following technical and organisational measures:<\/p><\/td><\/tr><tr><td width=\"50%\"><ul><li>Development of internal rules and procedures (how data access is granted, changed, cancelled)<\/li><li>The process of granting and revoking access rights<\/li><li>Different access rights (e.g., defined roles)<\/li><li>Audit records<\/li><li>Disciplinary responsibility for employees accessing data without permission<\/li><li>Access reports (if there are audit records).<\/li><\/ul><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>4.\u00a0\u00a0\u00a0 <\/strong><strong>Data loss prevention<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>The Processor provides at least the following technical and organisational measures:<\/p><\/td><\/tr><tr><td width=\"50%\"><ul><li>Isolated application infrastructure<\/li><li>Encryption when transmitting data (TLS minimum version 1.2, SSL)<\/li><li>Encryption for data storage facilities<\/li><li>Audit records<\/li><li>Backup copies<\/li><li>High availability of resources<\/li><li>Internet Application Firewall (WAF)<\/li><\/ul><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>5.\u00a0\u00a0\u00a0 <\/strong><strong>Segregation Control<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>All representatives involved in data processing by the Processor for the maintenance of the Peero application use two databases: &#8220;Common Data&#8221; and &#8220;Application Data&#8221;.<\/p><p><strong>Common Data<\/strong> &#8211; A database that includes information related to authorization (including user data such as emails, encrypted passwords, and authorizations performed in the application).<\/p><p><strong>Application Data<\/strong> &#8211; A database that includes information about actions performed in the application, settings, and users (including user data such as name, surname, email, country, department, and team).<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>6.\u00a0\u00a0\u00a0 <\/strong><strong>Integrity<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Audit records and generation of messages in systems to monitor activities therein &#8211; who has performed data entry, introduced changes, or deleted data.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>7.\u00a0\u00a0\u00a0 <\/strong><strong>Availability control<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>Availability control is provided according to Microsoft Azure rules, implementation and compliance whereof is primarily monitored by Microsoft Corporation (<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/infrastructure-availability\">https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/infrastructure-availability<\/a>).<\/p><\/td><\/tr><tr><td width=\"50%\"><p>The following technical and organisational measures are provided:<\/p><\/td><\/tr><tr><td width=\"50%\"><ul><li>Backup copies<\/li><li>High accessibility.<\/li><\/ul><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>8.\u00a0\u00a0 <\/strong><strong>Performed tests of the system<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>A penetration testing was performed for the Peero App, which also included top 10 OWASP vulnerability exploits. This testing was performed by a certified person who did not participate in the product development.<\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p><strong>III Approved Sub-Processors<\/strong><\/p><\/td><\/tr><tr><td width=\"50%\"><p>A list of Approved Sub-Processors is available on site<\/p><\/td><\/tr><tr><td width=\"50%\"><p><a href=\"https:\/\/peero.app\/en\/peero-app-data-subprocessors\/\">PEERO DATA SUBPROCESSORS<\/a><\/p><\/td><\/tr><tr><td width=\"50%\">\u00a0<\/td><\/tr><tr><td width=\"50%\"><p>Latest updates introduced in April 2025<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-6482\" aria-expanded=\"false\">Latvie\u0161u<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6482\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-6482\" tabindex=\"0\" hidden=\"hidden\"><table width=\"100%\"><tbody><tr><td width=\"49%\"><h4><strong><em>Pielikums<\/em><\/strong><\/h4><\/td><\/tr><tr><td width=\"49%\"><h3><strong>TEHNISKIE UN ORGANIZATORISKIE DRO\u0160\u012aBAS PAS\u0100KUMI<\/strong><\/h3><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>I Apstr\u0101des m\u0113r\u0137is, iesaist\u012bt\u0101s datu kategorijas, ietekm\u0113to datu subjektu kategorijas<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>1.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Datu subjektu kategorijas<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Darbinieki un citi Korporat\u012bv\u0101 lietot\u0101ja Peero kopienas dal\u012bbnieki &#8211; fizisk\u0101s personas.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>2.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Personas datu veidi<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p><strong>(a)\u00a0\u00a0\u00a0 <\/strong><strong>Personas datu kategorijas<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Datu subjekta v\u0101rds, uzv\u0101rds, e-pasta adrese, amats uz\u0146\u0113mum\u0101, uz\u0146\u0113muma departaments, atra\u0161an\u0101s vietas \/ korporat\u012bv\u0101s pieder\u012bbas valsts, uzdevumu izpildes pier\u0101d\u012bjumi (att\u0113li vai saites), pieg\u0101des dati, saist\u012btie metadati.<\/p><\/td><\/tr><tr><td width=\"49%\"><p>Korporat\u012bvais lietot\u0101js p\u0113c saviem ieskatiem var pievienot konkr\u0113tai Peero kopienai fizisk\u0101s personas, kuras pieder uz\u0146\u0113mumu\/organiz\u0101ciju grupai, kuras Korporat\u012bvais lietot\u0101js p\u0101rst\u0101v vai ir to da\u013ca.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>(b)\u00a0\u00a0 <\/strong><strong>\u012apa\u0161\u0101s personu datu kategorijas<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Netiek apstr\u0101d\u0101tas.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>3.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Apstr\u0101des veids<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Ar Peero lietotnes starpniec\u012bbu atgriezenisk\u0101s saites pakalpojuma (nov\u0113rt\u0113juma un atsauksmes) snieg\u0161ana Korporat\u012bvajam lietot\u0101jam k\u0101 P\u0101rzinim un pastarpin\u0101ti Korporat\u012bv\u0101 lietot\u0101ja Peero kopienai piesaist\u012btajiem datu subjektiem.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>4.\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Apstr\u0101des ilgums<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>L\u012bdz katra atsevi\u0161\u0137a Korporat\u012bv\u0101 lietot\u0101ja darba uzdevuma izpildei, iev\u0113rojot L\u012bguma sp\u0113k\u0101 esam\u012bbas termi\u0146u.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>II<\/strong> <strong>Tehniskie un organizatoriskie dro\u0161\u012bbas pas\u0101kumi<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>1.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Fizisk\u0101s pieejas kontrole<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Tiek nodro\u0161in\u0101ta fizisk\u0101s pieejas kontrole atbilsto\u0161i izmantot\u0101 resursa &#8211; Microsoft Azure ra\u017eot\u0101ja noteikumiem (<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/physical-security\">https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/physical-security<\/a>).<\/p><\/td><\/tr><tr><td width=\"49%\"><p>Tas ietver vismaz, bet ne tikai:<\/p><\/td><\/tr><tr><td width=\"49%\"><ul><li>Fizisk\u0101s aizsardz\u012bbas tehnolo\u0123iskajiem resursiem, uz kuriem tiek apstr\u0101d\u0101ti dati, nodro\u0161in\u0101\u0161anu<\/li><li>Pieejas ties\u012bbu datiem ierobe\u017eo\u0161anu<\/li><li>Pieejas kontroles atsl\u0113gu p\u0101rvald\u012bbu<\/li><li>Atbilsto\u0161u darbinieku, apkalpojo\u0161\u0101 person\u0101la izv\u0113li<\/li><li>Uzraudz\u012bbas iek\u0101rtu nodro\u0161in\u0101\u0161anu<\/li><li>Virtu\u0101li nodal\u012btu datu apstr\u0101des iek\u0101rtu nodro\u0161in\u0101\u0161anu.<\/li><\/ul><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>2.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Lo\u0123isk\u0101s pieejas kontrole<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Pieeja Peero lietotnes resursiem Microsoft Azure tiek pie\u0161\u0137irta p\u0113c &#8220;least permissive&#8221; principa, un ietver ne maz\u0101k k\u0101 \u0161\u0101dus dro\u0161\u012bbas aspektus:<\/p><\/td><\/tr><tr><td width=\"49%\"><ul><li>Multi-faktoru autentifik\u0101cijas pras\u012bbas<\/li><li>Paroles dro\u0161\u012bbas l\u012bme\u0146a defin\u0113jums<\/li><li>Datora autom\u0101tiska blo\u0137\u0113\u0161ana<\/li><li>Autentifik\u0101cijas \u017eurnal\u0113\u0161anas dati<\/li><li>u. tml.<\/li><\/ul><\/td><\/tr><tr><td width=\"49%\"><p>Apstr\u0101d\u0101t\u0101ja piem\u0113rotie risin\u0101jumi ir detaliz\u0113ti aprakst\u012bti Apstr\u0101d\u0101t\u0101ja iek\u0161\u0113j\u0101s korporat\u012bv\u0101s politik\u0101s.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>3.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Pieejas datiem kontrole<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Apstr\u0101d\u0101t\u0101js nodro\u0161ina ne maz\u0101k k\u0101 \u0161eit min\u0113tos tehniskos un organizatoriskos pas\u0101kumus:<\/p><\/td><\/tr><tr><td width=\"49%\"><ul><li>Iek\u0161\u0113jo noteikumu un proced\u016bru izstr\u0101di (k\u0101 tiek pie\u0161\u0137irta, main\u012bta, anul\u0113ta pieeja datiem)<\/li><li>Pieejas ties\u012bbu pie\u0161\u0137ir\u0161anas un anul\u0113\u0161anas procesu<\/li><li>Da\u017e\u0101das pieejas ties\u012bbas (piem\u0113ram, defin\u0113tas lomas)<\/li><li>Audit\u0101cijas pierakstus<\/li><li>Disciplin\u0101ratbild\u012bbu darbiniekiem, kuri piek\u013c\u016bst datiem bez at\u013caujas<\/li><li>Zi\u0146ojumus par piek\u013cuvi (ja ir audit\u0101cijas pieraksti).<\/li><\/ul><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>4.\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Datu zuduma nov\u0113r\u0161ana<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Apstr\u0101d\u0101t\u0101js nodro\u0161ina vismaz \u0161\u0101dus tehniskos un organizatoriskos pas\u0101kumus:<\/p><\/td><\/tr><tr><td width=\"49%\"><ul><li>Izol\u0113tu aplik\u0101cijas infrastrukt\u016bru<\/li><li>\u0160ifr\u0113\u0161anu p\u0101rs\u016btot datus (TLS minim\u0101l\u0101 versija 1.2, SSL)<\/li><li>\u0160ifr\u0113\u0161anu datu glab\u0101tuv\u0113m<\/li><li>Audit\u0101cijas pierakstus<\/li><li>Rezerves kopijas<\/li><li>Augstu resursu pieejam\u012bbu<\/li><li>Interneta Aplik\u0101ciju ugunsm\u016bri (WAF)<\/li><\/ul><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>5.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Nodal\u012b\u0161anas kontrole<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Visi Apstr\u0101d\u0101t\u0101ja datu apstr\u0101d\u0113 piesaist\u012btie p\u0101rst\u0101vji Peero lietotnes uztur\u0113\u0161anai izmanto divas datu b\u0101zes: &#8220;Kop\u0113jie dati&#8221; un &#8220;Lietotnes dati&#8221;.<\/p><p><strong>Kop\u0113jie dati <\/strong>&#8211;<strong>\u00a0<\/strong>Datu b\u0101ze, kas ietver inform\u0101ciju par autoriz\u0101ciju (t. sk. lietot\u0101ju dati &#8211; epasti, \u0161ifr\u0113tas paroles, veikt\u0101s autoriz\u0101cijas lietotn\u0113).<\/p><p><strong>Lietotnes dati <\/strong>&#8211; Datu b\u0101ze, kas ietver inform\u0101ciju par lietotn\u0113 veiktaj\u0101m darb\u012bb\u0101m, iestat\u012bjumiem, lietot\u0101jiem (t. sk. lietot\u0101ju dati &#8211; v\u0101rds, uzv\u0101rds, epasts, valsts, noda\u013ca, komanda).<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>6.\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Integrit\u0101te<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Audit\u0101cijas pieraksti un zi\u0146ojumu \u0123ener\u0113\u0161ana sist\u0113m\u0101s, lai uzraudz\u012btu darb\u012bbas sist\u0113m\u0101s &#8211; kur\u0161 ir veicis datu ievad\u012b\u0161anu, izmai\u0146as vai dz\u0113\u0161anu.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>7.\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Pieejam\u012bbas kontrole<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Pieejam\u012bbas kontrole tiek nodro\u0161in\u0101ta atbilsto\u0161i Microsoft Azure noteikumiem, ko prim\u0101ri p\u0101rrauga Microsoft Corporation (<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/infrastructure-availability\">https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/infrastructure-availability<\/a>).<\/p><\/td><\/tr><tr><td width=\"49%\"><p>Tiek nodro\u0161in\u0101ti sekojo\u0161i tehniskie un organizatoriskie pas\u0101kumu:<\/p><\/td><\/tr><tr><td width=\"49%\"><ul><li>Rezerves kopijas<\/li><li>Augsta pieejam\u012bba.<\/li><\/ul><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>8.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Veiktie sist\u0113mas testi<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Peero lietotnei ir veikta ielau\u0161an\u0101s test\u0113\u0161ana, kur\u0101 taj\u0101 skait\u0101 tika iek\u013cauta top 10 OWASP ievainojam\u012bbas p\u0101rbaudes. \u0160o test\u0113\u0161anu ir veikusi sertific\u0113ta persona, kura nepiedal\u012bj\u0101s produkta izstr\u0101d\u0113.<\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p><strong>III Apak\u0161apstr\u0101d\u0101t\u0101ji<\/strong><\/p><\/td><\/tr><tr><td width=\"49%\"><p>Apak\u0161apstr\u0101d\u0101t\u0101ju saraksts ir pieejams vietn\u0113<\/p><\/td><\/tr><tr><td width=\"49%\"><p><a href=\"https:\/\/peero.app\/en\/peero-app-data-subprocessors\/\">PEERO DATU APAK\u0160APSTR\u0100D\u0100T\u0100JI<\/a><\/p><\/td><\/tr><tr><td width=\"49%\">\u00a0<\/td><\/tr><tr><td width=\"49%\"><p>P\u0113d\u0113jo reizi p\u0101rskat\u012bts 2025. gada apr\u012bl\u012b<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>English Latvie\u0161u English Annex TECHNICAL AND ORGANISATIONAL SECURITY MEASURES \u00a0 I Purpose of processing, categories of data involved, categories of [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-8084","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Technical and Organisational Security Measures - Peero<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technical and Organisational Security Measures - Peero\" \/>\n<meta property=\"og:description\" content=\"English Latvie\u0161u English Annex TECHNICAL AND ORGANISATIONAL SECURITY MEASURES \u00a0 I Purpose of processing, categories of data involved, categories of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Peero\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/peeroapp\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T12:03:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/peero.app\/wp-content\/uploads\/2022\/05\/MicrosoftTeams-image-185.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AppPeero\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/\",\"url\":\"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/\",\"name\":\"Technical and Organisational Security Measures - Peero\",\"isPartOf\":{\"@id\":\"https:\/\/peero.app\/en\/#website\"},\"datePublished\":\"2025-04-24T11:57:53+00:00\",\"dateModified\":\"2025-04-24T12:03:11+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/peero.app\/en\/#website\",\"url\":\"https:\/\/peero.app\/en\/\",\"name\":\"Peero\",\"description\":\"HR solution\",\"publisher\":{\"@id\":\"https:\/\/peero.app\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/peero.app\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/peero.app\/en\/#organization\",\"name\":\"PEERO\",\"url\":\"https:\/\/peero.app\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/peero.app\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/peero.app\/wp-content\/uploads\/2022\/05\/MicrosoftTeams-image-185.png\",\"contentUrl\":\"https:\/\/peero.app\/wp-content\/uploads\/2022\/05\/MicrosoftTeams-image-185.png\",\"width\":1080,\"height\":1080,\"caption\":\"PEERO\"},\"image\":{\"@id\":\"https:\/\/peero.app\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/peeroapp\/\",\"https:\/\/x.com\/AppPeero\",\"https:\/\/www.linkedin.com\/company\/peero-app\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technical and Organisational Security Measures - Peero","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/","og_locale":"en_US","og_type":"article","og_title":"Technical and Organisational Security Measures - Peero","og_description":"English Latvie\u0161u English Annex TECHNICAL AND ORGANISATIONAL SECURITY MEASURES \u00a0 I Purpose of processing, categories of data involved, categories of [&hellip;]","og_url":"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/","og_site_name":"Peero","article_publisher":"https:\/\/www.facebook.com\/peeroapp\/","article_modified_time":"2025-04-24T12:03:11+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/peero.app\/wp-content\/uploads\/2022\/05\/MicrosoftTeams-image-185.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@AppPeero","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/","url":"https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/","name":"Technical and Organisational Security Measures - Peero","isPartOf":{"@id":"https:\/\/peero.app\/en\/#website"},"datePublished":"2025-04-24T11:57:53+00:00","dateModified":"2025-04-24T12:03:11+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/peero.app\/en\/technical-and-organisational-security-measures\/"]}]},{"@type":"WebSite","@id":"https:\/\/peero.app\/en\/#website","url":"https:\/\/peero.app\/en\/","name":"Peero","description":"HR solution","publisher":{"@id":"https:\/\/peero.app\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/peero.app\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/peero.app\/en\/#organization","name":"PEERO","url":"https:\/\/peero.app\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/peero.app\/en\/#\/schema\/logo\/image\/","url":"https:\/\/peero.app\/wp-content\/uploads\/2022\/05\/MicrosoftTeams-image-185.png","contentUrl":"https:\/\/peero.app\/wp-content\/uploads\/2022\/05\/MicrosoftTeams-image-185.png","width":1080,"height":1080,"caption":"PEERO"},"image":{"@id":"https:\/\/peero.app\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/peeroapp\/","https:\/\/x.com\/AppPeero","https:\/\/www.linkedin.com\/company\/peero-app"]}]}},"_links":{"self":[{"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/pages\/8084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/comments?post=8084"}],"version-history":[{"count":7,"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/pages\/8084\/revisions"}],"predecessor-version":[{"id":8091,"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/pages\/8084\/revisions\/8091"}],"wp:attachment":[{"href":"https:\/\/peero.app\/en\/wp-json\/wp\/v2\/media?parent=8084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}