- to manage information (potentially including PII) according to contracts (consulting, audit, training, research…);
- to learn from past experience in our projects for upcoming projects (knowledge management), or to train new staff;
- to carry out contracts including invoicing and justification of work performed (e.g. with timesheets and progress reports);
- to manage IT activities with the aim of information security (including service availability), and to detect and handle threats, vulnerabilities, risks, and incidents;
- to manage employment contracts, to ensure workplace safety, and to manage application information;
- to demonstrate consistency of our accounting system to tax authorities and interested parties;
- to perform forensic analysis and propose effective reactions to security events, to detect frauds and vulnerabilities, to understand malware and malware producers, and to share this knowledge with other security experts fighting against cybercrime;
- trace the validity of our reports and advice for justifying professionalism.
To apply your rights for access, correction, reporting misuse, or withdrawing consent, please send an email to firstname.lastname@example.org.