{"id":39734,"date":"2021-02-11T20:35:46","date_gmt":"2021-02-11T20:35:46","guid":{"rendered":"https:\/\/www.globallogic.com\/latam\/?post_type=insightsection&#038;p=39734"},"modified":"2025-01-30T12:00:44","modified_gmt":"2025-01-30T12:00:44","slug":"como-cuidar-los-datos-personales-de-los-clientes","status":"publish","type":"insightsection","link":"https:\/\/www.globallogic.com\/latam\/insights\/blogs\/como-cuidar-los-datos-personales-de-los-clientes\/","title":{"rendered":"\u00bfC\u00f3mo cuidar los datos personales de los clientes?"},"content":{"rendered":"<div class=\"classic_editor_content\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Today, the current state of digital business is based on the data obtained from a company&#8217;s clients or users. In line with this, <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">GlobalLogic<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , a leading company in custom software development, maintains that <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">it is increasingly necessary to protect them to avoid unwanted situations and even legal and economic implications<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , which can complicate the security of the information provided by customers.<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Data is the oil of the 21st century<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , so it is vitally important to know the actions and techniques to take care of business sources of income and avoid any problems that may arise. How?<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 Implement a data security standard that functions as an internal company policy as a protocol. In the United States and Europe, laws for data protection have already been approved, establishing standards for their implementation. Although Argentina has Law 25.326 on the Protection of Personal Data, there is still no model to follow for safeguarding information.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 Implement role-based security: it is strictly necessary to be able to know who has permissions over the data and which ones they can access.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 Audit actions performed on data: perform frequent verification of who, when, how, where and for what purpose the data was used. This is an important practice to avoid any incorrect use of the information collected.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 Customers must be informed of the information that is collected and stored, what it will be used for, and why that data is needed.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 Customer information should not be transferred to other companies or organizations without justified cause.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">On the other hand, it is extremely important to be cautious when uploading personal data on websites, streaming services, social networks, applications, among others. <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">GlobalLogic also warns the user about how to safely disclose their data<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , without putting their privacy at risk. Some tips are:<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Install legal software<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> : legally licensed software provides greater security when encountering a virus or other type of threat. Although these are usually paid, it is worth investing in original software. It is best to consult a systems specialist, who will suggest the program that best suits the needs of each user.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Have an updated and quality antivirus program<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> : a good antivirus must have the ability to detect any threat quickly and a technical service available 24 hours a day for the user. It is always advisable to purchase them with the advice of systems professionals, so as not to run the risk of acquiring an infected or ineffective program.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u2981 <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Create complex passwords<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> : it is essential that they do not contain personal data or words that relate to the user. This prevents them from being easy to hack.<\/span><\/span><\/p>\n<p><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u201cData security is a matter for both companies and users. It is important that everyone is aware of the precautions that must be taken to protect their privacy and personal information. It is key to follow the steps mentioned above to prevent any web system from storing private information,\u201d<\/span><\/span><\/em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> explained Germ\u00e1n Sobral, CTO of GlobalLogic Latam.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Computer security and data use is an issue that concerns everyone, simply by virtue of being connected to the Internet. <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">GlobalLogic<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> cares about the well-being of its clients and users by developing secure software so that nothing can harm their integrity and privacy, and encourages all consumers to be vigilant when using the Internet.<\/span><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>GlobalLogic comparte recomendaciones para resguardar la informaci\u00f3n<\/p>\n","protected":false},"author":12,"featured_media":36433,"parent":0,"menu_order":49,"template":"","insight":[41],"insight-subcats":[791],"insight-industry":[779],"insight-services":[],"insight-partners":[],"class_list":["post-39734","insightsection","type-insightsection","status-publish","has-post-thumbnail","hentry","insight-blogs","insight-subcats-cybersecurity","insight-industry-cross-industry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insightsection\/39734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insightsection"}],"about":[{"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/types\/insightsection"}],"author":[{"embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":2,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insightsection\/39734\/revisions"}],"predecessor-version":[{"id":101041,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insightsection\/39734\/revisions\/101041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/media\/36433"}],"wp:attachment":[{"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/media?parent=39734"}],"wp:term":[{"taxonomy":"insight","embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insight?post=39734"},{"taxonomy":"insight-subcats","embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insight-subcats?post=39734"},{"taxonomy":"insight-industry","embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insight-industry?post=39734"},{"taxonomy":"insight-services","embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insight-services?post=39734"},{"taxonomy":"insight-partners","embeddable":true,"href":"https:\/\/www.globallogic.com\/latam\/wp-json\/wp\/v2\/insight-partners?post=39734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}