Java Web Application Server
Log Catch
Personal Information Access Record Management Solution
Log Catch is a solution designed to generate and analyze access logs, adhering to the five W’s and one H, for personal information access records in personal information processing systems (DBMS, WAS). This is to ensure compliance with the recommendations of the Personal Information Protection Act (Access Record Management and Storage) regarding technical and administrative protective measures.
Fully complies with the access record management recommendations
of the Personal Information Protection Act
Complies with the access record management and storage recommendations of the Personal Information Protection Act
Technology for Generating and Collecting Personal Information Access Records (5W1H)
Secure Storage of
Access Records
Monthly Inspection with Personal Information Misuse and Leakage Risk Analysis (Various Reports)
Management of Explanations for Accessing Personal Information Records (Inspection Measure)
Management of Explanations for Downloading Files (Required Inspection Measure)
Key Features of Log Catch
Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records
- Collects and generates access records without changing the client’s system
- Supports various web application servers, and collects and generates database access records
Risk Management through Analysis of Personal Information Misuse, Leakage, and Risky Behavior
- Provides real-time risk behavior surveillance monitoring for statistical periods
- Offers risky behavior detection using profiling techniques
Safe Storage of Access Records
- Prevents access record forgery through WORM function of our DBMS
- Supports disk redundancy
- Provides functions related to storage period and restoration
Management of Explanations for Accessing Personal Information Records
- Manages explanations for the misuse or leakage of personal information
- Manages explanations for downloading personal information files
Precautionary Management of Explanations for File Downloads
- Proactively manages explanations for file downloads
- Provides the function to detect personal information in various types of document files (supports MS Office, HWP, PDF, TXT, etc.)
- Supports controlling file download permissions (cannot download files without a permission)
Various Reports Based on Statistics
- Comprehensive analysis reports on personal information access records (statistical)
- Monthly inspection reports
- Access record ledger can be downloaded in Excel files for audits
Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records [Web/WAS]
Installs and runs Log Catch WAS Agent within web-based systems, covering WAS, IIS, Apache, and PHP 3-tier environments, to log 100% of all actions without losing any access records.
Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records
[Storage of Personal Information Access Records] Collection and storage of personal information access records for personal information processing systems
Detailed Lookup : Date, task system (personal information processing system), personal information handler (user), access IP, department, and query.
In other words, this function provides detailed answers to the questions of “who, what, when, where, why, and how” (5W1H).
Risk Management through Analysis of Personal Information Misuse, Leakage, and Risky Behavior [Dashboard]
Provides personal information manager with various statistics-based inspections and monitoring dashboard screens through risk analysis of personal information access records to respond to misuse, leakage, forgery, alteration, or damage of personal information.
Safe Storage of Access Records
The access records of the personal information handler should be kept securely so that the access records are not forged, altered, stolen, or lost.
(Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)
- WORM
Functions - Encryption
- Storage
Redundancy - Hash Value
Safe Storage of Access Records
The personal information processor is required to retain and manage records of personal information handlers' access to the personal information processing system for a minimum of one or two years.
(Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)
Management of Explanations on Personal Information Access Records [Misuse or Leakage of Personal Information]
[Access Records Inspection : Management of Explanations on Executed Actions] Manages explanations on risky behaviors of personal information access records
- Definition : Risky behavior (access behaviors, including misuse, leakage, forgery, and alteration of personal information)
- Sends an explanation email to the at-risk user about the access records
- The personal information handler who receives a request should check the record information (task, time of task, type of personal information, etc.) and provide an explanation of the task
- Records the email as evidence to be used during an audit
Management of Explanations on Personal Information Access Records [Explanation Management on File Downloads]
If it is found that the personal information handler hasdownloaded personal information,the reason must be confirmedas determined by the internal management plan. (Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)
Precautionary Management of Explanations for File Downloads
If it is found that the personal information handler has downloaded personal information, the reason must be confirmedas determined by the internal management plan. (Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)
Provision of Various Reports Based on Statistics
- Provides various reports (comprehensive analysis report on personal information and database, reports by users and departments, etc.)
- Supports a scheduling function (auto-run recurring cycles)
- Supports exporting detailed Excel data files for report statistics (for auditing purposes)
- Tailored support for customers
Provision of Various Reports Based on Statistics [Report on Access Records Ledger in Excel Files]
Report on Access Records Ledger in Excel Files for Audits
Supported Environments (Cloud)
Supported DBMS
.NET IIS
PHP Support (5.2 or above)
Supported DBMS