Abstract: System and method for data active protection in a computer system in the ambit of the access to a resource available in this computer system. That method applies to at least one resource the users of the system can access, and consists of a data protection profile that contains a set of data to protect, access conditions set in advance, protection actions defined to make safe the data listed in the data set. After an access request to a resource done by a user, the system collects the information that is used in the access request to the resource, realizes the protection profile related to the resource, verifies if the access information due to the access request satisfies one or more access conditions that are defined in the protection profile, and if one or more access conditions are satisfied by the access information, the system performs the protection actions with the aim of making the data listed in the data set not accessible.