Usage environments for social and health data provided by Findata must pass an official assessment before implementation. The approval process under the Act on Secondary Use of Health and Social Data is a prerequisite for processing the information for research and statistical purposes.
A secure operating environment is required to have a valid security certificate in accordance with the current regulation of Findata at the time of assessment. This is a prerequisite for processing and storing data authorized by Findata in the operating environment.
We are a security assessment body approved by Traficom for Katakri 2020 and we carry out assessments of secure operating environments in accordance with the Secondary Act aimed at certification.
01
Customer Benefits
- We guide the preparation of the operating environment to ensure it meets the requirements at once and that the approval process proceeds without delays.”
- We combine the needs of cybersecurity and research organizations – we ensure that the operating environment meets Findata’s requirements without functional compromises.
- Clear reporting that supports the needs of different stakeholders – we provide a comprehensive and understandable assessment that facilitates decision-making for the IT team, the information security manager, and other management
02
Our Services
- Pre-assessments and gap analyses – we identify deficiencies in requirements and assist in correcting them before the official assessment
- Technical and administrative assessments – we ensure that the operating environment meets the data security requirements of Findata and the Secondary Use Act
- Assessments of environments aiming for official information security certification
Contact us
We help you find the best solutions to your security challenges. Drop us a line to discuss your organisation’s needs and objectives.