Log Catch

Personal Information Access Record Management Solution

Log Catch is a solution designed to generate and analyze access logs, adhering to the five W’s and one H, for personal information access records in personal information processing systems (DBMS, WAS). This is to ensure compliance with the recommendations of the Personal Information Protection Act (Access Record Management and Storage) regarding technical and administrative protective measures.

Log Catch

Fully complies with the access record management recommendations
of the Personal Information Protection Act

Complies with the access record management and storage recommendations of the Personal Information Protection Act

Technology for Generating and Collecting Personal Information Access Records (5W1H)

Technology for Generating and Collecting Personal Information Access Records (5W1H)

Secure Storage of Access Records

Secure Storage of
Access Records

Monthly Inspection with Personal Information Misuse and Leakage Risk Analysis (Various Reports)

Monthly Inspection with Personal Information Misuse and Leakage Risk Analysis (Various Reports)

Management of Explanations for Accessing Personal Information Records (Inspection Measure)

Management of Explanations for Accessing Personal Information Records (Inspection Measure)

Management of Explanations for Downloading Files (Required Inspection Measure)

Management of Explanations for Downloading Files (Required Inspection Measure)

Fully Complies with the Access Record Management Recommendations of the Personal Information Protection Act

Key Features of Log Catch

Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records Icon

Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records

  • Collects and generates access records without changing the client’s system
  • Supports various web application servers, and collects and generates database access records
Risk Management through Analysis of Personal Information Misuse, Leakage, and Risky Behavior Icon

Risk Management through Analysis of Personal Information Misuse, Leakage, and Risky Behavior

  • Provides real-time risk behavior surveillance monitoring for statistical periods
  • Offers risky behavior detection using profiling techniques
Safe Storage of Access Records Icon

Safe Storage of Access Records

  • Prevents access record forgery through WORM function of our DBMS
  • Supports disk redundancy
  • Provides functions related to storage period and restoration
Management of Explanations for Accessing Personal Information Records

Management of Explanations for Accessing Personal Information Records

  • Manages explanations for the misuse or leakage of personal information
  • Manages explanations for downloading personal information files
Precautionary Management of Explanations for File Downloads Icon

Precautionary Management of Explanations for File Downloads

  • Proactively manages explanations for file downloads
  • Provides the function to detect personal information in various types of document files (supports MS Office, HWP, PDF, TXT, etc.)
  • Supports controlling file download permissions (cannot download files without a permission)
Various Reports Based on Statistics Icon

Various Reports Based on Statistics

  • Comprehensive analysis reports on personal information access records (statistical)
  • Monthly inspection reports
  • Access record ledger can be downloaded in Excel files for audits

Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records [Web/WAS]

Installs and runs Log Catch WAS Agent within web-based systems, covering WAS, IIS, Apache, and PHP 3-tier environments, to log 100% of all actions without losing any access records.

Technology for Generating and Collecting Standardized 5W1H Personal Information Access Records

[Storage of Personal Information Access Records] Collection and storage of personal information access records for personal information processing systems
Detailed Lookup : Date, task system (personal information processing system), personal information handler (user), access IP, department, and query.
In other words, this function provides detailed answers to the questions of “who, what, when, where, why, and how” (5W1H).

Risk Management through Analysis of Personal Information Misuse, Leakage, and Risky Behavior [Dashboard]

Provides personal information manager with various statistics-based inspections and monitoring dashboard screens through risk analysis of personal information access records to respond to misuse, leakage, forgery, alteration, or damage of personal information.

Safe Storage of Access Records

The access records of the personal information handler should be kept securely so that the access records are not forged, altered, stolen, or lost.
(Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)

  • WORM
    Functions
  • Encryption
  • Storage
    Redundancy
  • Hash Value

Safe Storage of Access Records

The personal information processor is required to retain and manage records of personal information handlers' access to the personal information processing system for a minimum of one or two years.
(Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)

Management of Explanations on Personal Information Access Records [Misuse or Leakage of Personal Information]

[Access Records Inspection : Management of Explanations on Executed Actions] Manages explanations on risky behaviors of personal information access records

  • Definition : Risky behavior (access behaviors, including misuse, leakage, forgery, and alteration of personal information)
  • Sends an explanation email to the at-risk user about the access records
  • The personal information handler who receives a request should check the record information (task, time of task, type of personal information, etc.) and provide an explanation of the task
  • Records the email as evidence to be used during an audit

Management of Explanations on Personal Information Access Records [Explanation Management on File Downloads]

If it is found that the personal information handler hasdownloaded personal information,the reason must be confirmedas determined by the internal management plan. (Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)

Precautionary Management of Explanations for File Downloads

If it is found that the personal information handler has downloaded personal information, the reason must be confirmedas determined by the internal management plan. (Article 29 of chapter 4 of the Personal Information Protection Act, Article 28 and subparagraph 3 of chapter 4 of the Information and Communication Network Act, and Article 8 of the Standards for Ensuring the Stability of Personal Information)

Provision of Various Reports Based on Statistics

  • Provides various reports (comprehensive analysis report on personal information and database, reports by users and departments, etc.)
  • Supports a scheduling function (auto-run recurring cycles)
  • Supports exporting detailed Excel data files for report statistics (for auditing purposes)
  • Tailored support for customers

Provision of Various Reports Based on Statistics [Report on Access Records Ledger in Excel Files]

Report on Access Records Ledger in Excel Files for Audits

Supported Environments (Cloud)

Amazon Web Service Microsoft Azure NCP GCP NHN Cloud Oracle Cloud Koscom Cloud KT Cloud Kakao Cloud Gabia Cloud Cloud Z
Supported Environments (Cloud)

Supported DBMS

Java Web Application Server

java 1.6 이상 Jboss WebLogic WebSphere Oracle AS Tomcat Resin Jetty Jeus

.NET IIS

.NET Framework 4.x or above

PHP Support (5.2 or above)

Supported DBMS

Oracle Microsoft SQL Server MySQL MariaDB DB2 Altibase Tibero PostgreSQL Teradata Cubrid Netezza MongoDB SunDB FirebirdDB CouchDB Influx Infomix SAP Hana DB Kairos Greenplum Vertica Symfoware Goldilocks Redshift Aurora SQreamDB Hive Impala Presto TDV Sybase ASE Sybase IQ Redis Cassandra DynamoDB PetaSQL
  • representative phone
    +82-1660-1675

  • Implementation and
    Technology Inquiries