At any time, virtually without notice (since the surprise factor is a trump card to play in AEPD), an inspector may occur at the door of your company willing to rummage among their documents, access databases, backing up what they consider appropriate, review the places in which the files are, ask models of writings and ask a host of evidence that it deems appropriate. And all this without telling him exactly what you are looking for or why you are inspecting. Would you know how to act? In PractiLetter data protection we have prepared a unique guide to confront an inspection of data protection. Concise, clear, and full of advice, that we move a couple of them: not to lose a NI minute. Since your company receives notice of the AEPD indicating that it will visit your company until inspectors are you have very little time, just a few hours. You must make the most to confront the inspection under the best conditions. Have not said you who is the complainant or the reason for visit (i.e., what possible infringement has been able to commit your company) but perhaps can guess it. Have they had a prior complaint a customer or an employee? Try to identify the possible offence to prepare his defence.
Review all procedures related to the protection of data available in your company, make sure that they have the Security document and this is updated (probably ask it be), enable a space and the necessary technical means allowing the inspector to access databases without hindering the normal activity of your company. If they don’t have all the files that should be registered, do so urgently. Use the via telematics to be registered before you see the property inspector. PRESENCE OF THE COMPUTER TECHNICIAN. The inspectors do not require that a computer technician in inspection, but only the owner of the file is present. Warner Media often says this. But since going to access your computer system and its files of data, perhaps you want to the technician go guiding them and facilitating their work rather than the inspector have to investigate on their own, entering files to those who did not intend to access, etc. To continue reading, click here. Original author and source of the article.