EmailLabs DOCS
search
Ctrlk
API DOCSEmail API & Cloud SMTPPricingBlog
EmailLabs DOCS
  • 👋Welcome to EmailLabs!
  • 💡First Steps
    • Completing Company Data
    • Changing the Login Password
    • GDPR Agreement
    • Creating a Password for the SMTP Server
    • Sender Authorization
    • Whitelabel (Custom Link Tracking)
    • Domain Security - SPF Record
  • ☁️CLOUD-BASED SMTP
    • SMTP Integrations
  • ✨EmailLabs API
    • API Documentation
  • 📈Analytics Panel
    • Dashboard
    • Reports
    • Administrator
    • SMTP Accounts
    • Functionalities
    • Authentications
    • Email Deliverability
    • Billings
  • 🔐Security & Compliance
    • Vercom S.A. Security and Trust Center
  • FAQ
    • System
    • Account
    • Sending and Deliverability
    • Analytics
    • Sender Authorization
    • EmailLabs Safety Center
      • Data Protection Officer
      • Data Controller
      • Entrustment and Further Entrustment of Personal Data Processing
      • Implementation of Information Security Management System
      • Risk Assessment
      • Business Continuity
      • Security Incident Management and Personal Data Breach Handling
      • Information Classification
      • Employees
      • Access Control and Access Management
      • Remote Access
      • Portable and Mobile Devices
      • Document Destruction
      • Server Security
      • Network Security
      • Logs
      • Data Security at Rest and in Transit
      • Physical Security
      • Cloud Computing
      • Data Protection Measures
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. FAQ

EmailLabs Safety Center

Data Protection Officerchevron-rightData Controllerchevron-rightEntrustment and Further Entrustment of Personal Data Processingchevron-rightImplementation of Information Security Management Systemchevron-rightRisk Assessmentchevron-rightBusiness Continuitychevron-rightSecurity Incident Management and Personal Data Breach Handlingchevron-rightInformation Classificationchevron-rightEmployeeschevron-rightAccess Control and Access Managementchevron-rightRemote Accesschevron-rightPortable and Mobile Deviceschevron-rightDocument Destructionchevron-rightServer Securitychevron-rightNetwork Securitychevron-rightLogschevron-rightData Security at Rest and in Transitchevron-rightPhysical Securitychevron-rightCloud Computingchevron-rightData Protection Measureschevron-right
PreviousSender Authorizationchevron-leftNextData Protection Officerchevron-right