en
Society
28 May, 2025 / 08:49
/ 18 hours ago

Labor minister: Authorities implement highest cybersecurity standards on personal data

We treat with utmost seriousness and implement the highest cybersecurity standards concerning the protection of our citizens' personal data. Minister of Labor and Social Protection Alexei Buzu made the statement today. He commented on the information that appeared in the public space according to which the data of citizens who have applied for compensation might have been published or put up for sale on an online platform.

According to the official, during the implementation of the program, the authorities ensure that all protocols, stages, and the way data exchange takes place are carried out securely.

"First of all, we do not know if they were published. We have several protocols that we strictly adhere to. However, any suspicion, no matter how small or unfounded it may be, we treat with the utmost seriousness. We have implemented the compensation program for three consecutive years. During this period, we have demonstrated success, including from an operational and cybersecurity perspective. What we have done, including aspects concerning cybersecurity, is at the highest level," said Alexei Buzu.

The minister reiterated that if there are any suspicions currently, "technical specialists are investigating the situation and ensuring that these risks are managed and eliminated."

Referring to the citizens' personal data, the minister stated that when data is collected and processed, "operations are conducted according to the highest quality protocols regarding cybersecurity."

Additionally, representatives of the Ministry of Labor and Social Protection said that at a preliminary evaluation, a data leak from the platform is not confirmed. At the same time, investigations continue, including with the involvement of specialists from other state structures.

The platform compensatii.gov.md is developed in compliance with the highest cybersecurity standards. It is hosted and protected by the infrastructure of the Information Technology and Cybersecurity Service and is isolated, constantly monitored, and accessible only to authorized personnel. Thus, administrator access to the system is done exclusively based on a qualified electronic signature, a high-security authentication mechanism, impossible to transmit or clone. This ensures enhanced security, and only authorized persons can access the system.