Tag Archive: hardware

Tripartite Foundation

The past 14 of October, the Tripartite Foundation for the Formation of the Use, published in its page Web the warning for companies, consultants and managers of the formation for the use of the system of advantages of state scope on the existence of organizations that of gratuitous way offer services of implantation, audit and legal consultant’s office in the matter of protection of personal character data, which actually they finance these services at the expense of the credit assigned for the formation. By his it divides the INEM it has realised the pertinent investigations having indicated more than 700 you soothe enterprise that would have benefitted from the resources that the Tripartite Foundation for the Continuous Formation offers. As far as the Tripartite foundation already it has initiated the investigation and verification of the facts and has started up the opportune control mechanisms, to state the practiced advantages and to avoid that in the future the beneficiary companies that are discounted by formation they see implied in one chain of errors, having to give back the discounted quantities; as far as the companies that are discounted by the hiring of services of implantation, audit and legal consultant’s office in the matter of LOPD the corresponding amounts and to rely on the pertinent activities of the Public Service of State Use and the Inspection of Work and Social Security will have to give back, according to it indicates the report that it publishes in his Web. Expert sources to the investigation indicate that the companies would be free to pay IVA by the formation courses, that are not taxed, but not them consulting services for the implementation of data to which the tax is due to apply. Besides the sanctions that can be born from this investigation, the Tripartite Foundation has put the case into the hands of the tributary Agency, since the companies could also have incurred fiscal fraud. The Tripartite Foundation requests the collaboration of the users to denounce some supply of this one type of services or others of similars characteristics. udea Security of the Information original Author and source of the article