35
Business management, business administration, in particular services within the framework of organisational and professional business consultancy and support with regard to the development, introduction, implementation and ongoing inspection of organisational, technical and legal requirements, provisions, regulations and approaches in the field of IT security and IT security technology, as well as organisational parameters for achieving comprehensive protection for internal and external data processing processes, and IT systems and business networks for guaranteeing and maintaining general business operations, in particular for credit institutions and insurance institutions and their customers, and of technical and organisational facilities necessary for conducting, achieving and maintaining protection for IT systems and data processing processes, and business structures for determining, controlling, reducing and avoiding existing technical and operational risks in business operations, and the appropriate determination, limitation and control of existing residual risks, including through special, technical, organisational or physical conditions and events or interventions of all kinds, through unauthorised access to IT systems and data processing processes, uncontrolled operations in IT systems and data processing processes, and uncontrolled data transfer inside and outside IT systems, network structures inside and outside business networks and data processing processes
36
Insurance, financial affairs, monetary affairs and real estate affairs, all conducted in accordance with requirements, regulations and approaches for achieving protection for data processing processes, in particular for credit and insurance institutions and their customers, and for operating technical facilities necessary for data processing processes to avoid technical and operational risks, in particular through physical factors and events, legal conditions and technical requirements, through unauthorised access to data processing processes, uncontrolled operations within data processing processes, and uncontrolled data transfer inside data processing processes
41
Arranging of seminars and training courses in the development, checking, examination and implementation of requirements, regulations and approaches for achieving protection for data processing processes, in particular for credit and insurance institutions and their customers, and for operating technical facilities necessary for data processing processes to avoid technical and operational risks, in particular through physical factors and events, legal conditions and technical requirements, through unauthorised access to data processing processes, uncontrolled operations within data processing processes, and uncontrolled data transfer inside data processing processes
42
Scientific and industrial analysis, research and consultancy in connection with requirements, regulations and approaches for achieving protection for data processing processes, in particular for credit and insurance institutions and their customers, and for operating technical facilities necessary for data processing processes to avoid technical and operational risks, in particular through physical factors and events, legal conditions and technical requirements, through unauthorised access to data processing processes, uncontrolled operations within data processing processes, and uncontrolled data transfer inside data processing processes, consultancy within the framework of the introduction, implementation and ongoing inspection of secure data processing processes and IT systems for guaranteeing and maintaining general business operations on the basis of IT security checks, systems and risk analysis, evaluations, audits, consultancy and assistance with regard to the development, structuring, introduction, implementation and ongoing inspection and adaptation of business organisation on the basis of technical IT security, legal and organisational provisions and principles
45
Legal services in connection with requirements, regulations and approaches for achieving protection for data processing processes, in particular for credit and insurance institutions and their customers, and for operating technical facilities necessary for data processing processes to avoid technical and operational risks, in particular through physical factors and events, legal conditions and technical requirements, through unauthorised access to data processing processes, uncontrolled operations within data processing processes, and uncontrolled data transfer inside data processing processes