EmailLabs DOCS
search
Ctrlk
API DOCSEmail API & Cloud SMTPPricingBlog
  • πŸ‘‹Welcome to EmailLabs!
  • πŸ”Security & Compliance
    • EmailLabs Safety Centerchevron-right
  • πŸ’‘First Steps
    • Completing Company Data
    • Changing the Login Password
    • GDPR Agreement
    • Creating a Password for the SMTP Server
    • Sender Authorization
    • Whitelabel (Custom Link Tracking)
    • Domain Security - SPF Record
  • ☁️CLOUD-BASED SMTP
    • SMTP Integrationschevron-right
  • ✨EmailLabs API
    • API Documentation
  • πŸ“ˆAnalytics Panel
    • Dashboardchevron-right
    • Reportschevron-right
    • Administratorchevron-right
    • SMTP Accountschevron-right
    • Functionalitieschevron-right
    • Authenticationschevron-right
    • Email Deliverabilitychevron-right
    • Billingschevron-right
  • FAQ
    • System
    • Account
    • Sending and Deliverability
    • Analytics
    • Sender Authorization
    • EmailLabs Safety Centerchevron-right
      • Data Protection Officer
      • Data Controller
      • Entrustment and Further Entrustment of Personal Data Processing
      • Implementation of Information Security Management System
      • Risk Assessment
      • Business Continuity
      • Security Incident Management and Personal Data Breach Handling
      • Information Classification
      • Employees
      • Access Control and Access Management
      • Remote Access
      • Portable and Mobile Devices
      • Document Destruction
      • Server Security
      • Network Security
      • Logs
      • Data Security at Rest and in Transit
      • Physical Security
      • Cloud Computing
      • Data Protection Measures
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. FAQ

EmailLabs Safety Center

Data Protection Officerchevron-rightData Controllerchevron-rightEntrustment and Further Entrustment of Personal Data Processingchevron-rightImplementation of Information Security Management Systemchevron-rightRisk Assessmentchevron-rightBusiness Continuitychevron-rightSecurity Incident Management and Personal Data Breach Handlingchevron-rightInformation Classificationchevron-rightEmployeeschevron-rightAccess Control and Access Managementchevron-rightRemote Accesschevron-rightPortable and Mobile Deviceschevron-rightDocument Destructionchevron-rightServer Securitychevron-rightNetwork Securitychevron-rightLogschevron-rightData Security at Rest and in Transitchevron-rightPhysical Securitychevron-rightCloud Computingchevron-rightData Protection Measureschevron-right
PreviousSender Authorizationchevron-leftNextData Protection Officerchevron-right