Getting started with GDPR compliance
IBM® Control Center Monitor encrypts/hashes stored passwords, however does not encrypt log records, user names, names, email addresses, phone numbers. IBM Control Center Monitor allows you to view, update, delete user information when needed.
The following topics contain detailed information about how IBM Control Center Monitor complies with General Data Protection Regulation (GDPR):
- IBM Control Center Monitor offers security and privacy capabilities, including certificate based authentication to monitored Connect:Direct Servers, and technical security capabilities, to support you in meeting the GDPR compliance obligation. For more information, see Securing IBM Sterling Control Center Monitor.
- IBM Control Center Monitor stores user information in the CC_USERS table of the database. If you have manage permission, you can view, update, and delete user information, see Viewing, changing, or deleting user information.
- IBM Control Center Monitor stores audit log information in the AUDIT_LOG and CC_AUDIT_LOG_CHANGE_SET tables of the databases. The audit log information keeps track of what user makes what changes to the system. In the web console, you can navigate through . Any data older than the specified number of days is deleted daily at the specified maintenance time. For more information, see Database settings field definitions.
- If you have the manage permission, you can delete an user account when it is not active. For more information, see Deleting users.
- IBM Control Center Monitor encrypts/hashes stored passwords, however does not encrypt log records, user names, names, email addresses, phone numbers. For details, see Manage users.