Select:

Safety logistics

TECHNICAL SPECIFICATIONS SAFETY AND PROTECTION OF IDENTITY

Information is a critical component to the activity of each company and, consequently, must be adequately protected.

Information security protects information against a wide range of potential attacks in order to ensure business continuity and minimize the damage and service interruptions.

Information security is characterized by the following aspects:
- Confidentiality: ensures that information is accessible only to those who have permission to access;
- Integrity: guarantee the accuracy and completeness of information and processing methods;
- Availability: ensures that authorized users can access the information when you need them.

Information security is achieved through the activation of specific policies, organizational structures, procedure, functionality and software is complemented by a system of checks.

Our security requirements are derived from detailed attention to all aspects that involve close collaboration with GFP:
- importance of customer data (often are confidential and / or pre-release)
- commercial importance of the information for our customer
- importance of the data in terms of "competition" competitive area of ​​expertise

Data security is one of the most important services offered by GFP, first of the new logistics service, and primarily involves the relationship of collaboration and trust between GFP and the Customer.
E 'for this reason that GFP adopts solid technologies to ensure high levels of active and passive protection of the entire information system.

In this presentation, we do not enter in the specific technical information of our facility but we want to assure our customers that GFP turns on attention to these aspects.

a) Internal network security

The internal network of the data center is protected by two levels of security (firewall).
Both levels of security make available, users recognized, only the access doors that allow the proper use of the web platform and e-mail.
All other existing ports on the system are rendered useless both incoming and outgoing.
All systems are designed for automatic notifications and monitoring of the activities carried.

b) Security in the exchange of data

The choice of GFP to achieve its extranet applications via web interface, heavily involves the mode of data transmission.
Thanks to the SSL protocol (Secure Sockets Layer), used to make the exchange of data and information security between a Server and a Client, is ensured indecipherable to all data and information in transit from the customer to the data center and vice versa.
Today the SSL protocol is used to protect the communication of personal data in general, numbers of credit cards, financial information and banking, of sensitive data.

c) Virus protection

The data traffic across the network GFP is constantly monitored by suitable Antivirus / Antispyware. The update of the virus definition is constant to ensure maximum safety.

d) Backup dati

Various methods of saving data (backup) are taken daily and weekly, in an automatic, to ensure maximum data integrity and their safe storage.
All this in order to guarantee the customer a service reliability.

and) Some of the security policies adopted by GFP

The objectives are to ensure that they are:
- availability of the service
- continuity of service
- confidential information
- data integrity
- availability information

Some security policies adopted:
- Anyone, employees or external person, uses computing resources must be
expressly authorized;
- The authorization is to ensure that the information may intervene only people
enabled and the limits of the powers;
- All information is protected by login credentials;
- All operations performed on the systems are monitored by appropriate control systems;
- All critical data is stored and transmitted safely;
- All recyclable media that stores sensitive data are no longer required
destroyed so that it can not be recovered;

f) Confidentiality

GFP is committed to ensuring the confidentiality and not to disclose or otherwise make available to third parties, that they are not in a relationship of dependency and / or collaboration with GFP for the realization of its business, data and / or information of an economic nature and / or commercial, as well as of a technical nature (know how), communicated by the customer having the character of confidentiality, and were indicated as “Reserved”. This commitment does not include data and / or information in the public domain and / or already published and in any case already available to third parties. GFP may in any event disclose the data received from the asset business for statistical purposes, promotional and in general for all the institutional purposes of GFP same, with forms and procedures sufficient to ensure the full respect of the confidentiality of the above.

All data are requested only for the conduct of GFP and GFP to allow the performance of the obligations and activities related and connected. All data will be handled in accordance with the D. Decree. N. 196/2003 (Privacy Code) and subject to the minimum security measures dictated by the same.