Implementation of Information Security Management System

chevron-rightHas the Information Security Policy and regulations regarding the processing and protection of personal data been implemented?hashtag

Yes.

Implemented and confirmed with ISO 27001 and ISO 27018 certification. ISMS-01 Information Security Process Book DP-01 Personal Data Security Policy

chevron-rightHas the instruction for managing IT systems used for processing personal data or other internal regulations regarding IT infrastructure management been implemented?hashtag

Yes.

Implemented and documented procedure DO-02: Instruction for managing IT systems.

chevron-rightHas the implemented Information Security Policy and regulations regarding personal data protection been accepted by the management team?hashtag

Yes.

chevron-rightDo we ensure the capability to continuously maintain the confidentiality, integrity, availability, and resilience of processing systems and services?hashtag

Yes.

chevron-rightAre the Information Security Policy and regulations regarding personal data protection published and accessible to staff (employees/contractors)?hashtag

Yes.

chevron-rightDoes the data processor implement the principle of data protection by design?hashtag

Yes.

We operate in accordance with the principles of Privacy by Design and Privacy by Default.

chevron-rightDoes the data processor implement the principle of data protection by default?hashtag

Yes.

We operate in accordance with the principles of Privacy by Design and Privacy by Default.

Last updated