The security in BINETIX PTM information software System can be reviewed from several different angles - as a technological realization, as an integration solution and as a set of user options for managing and controlling the actions and operations in the System. The present material is more practical and user oriented. For this purpose, the following issues are addressed: ✓How to identify System users and how they receive access rights to System resources and functions; ✓What options for management and control are available on the user operations; ✓How security, monitoring and control are applied when executing financial operations in PTM; ✓What tools for active Incident Management PTM has to offer. Brief historical reference: In 2015 BINETIX presented on the Bulgarian market the first fully automated and integrated platform for Management, Control and Security of information in compliance to the Bulgarian legislation and specifically to the requirements of the LMAML (Law on Measures Against Money Laundering) and the LMAFT (Law on Measures Against Financing of Terrorist). The Technology is incorporated in the latest versions of BINETIX PTM also in relation with the entry into force in 2016 of the European Parliament's General Data Protection Regulation (EU) 2016/679 (GDPR). Upon performing control in financial operations and performing reconciliations in BINETIX PTM, security checks on individuals are carried out in strict accordance to the lists of suspicious persons officially published by SANS (State Agency for National Security). The result of these checks generates incidents and is a feature of the client profile. |
Identification of the working place
Management and monitoring of user operations
Control of financial operations
Active incident management and reporting of suspicious persons and operations