• Home
  • Content
  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In
≪ View Page

Search

You can find the results of your search below.

Contains
  • Exact match
  • Starts with
  • Ends with
  • Contains
Any namespace
  • Any namespace
  • pub (14)
  • wiki (2)
  • user (1)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Communications @pub:company
6 Hits, Last modified: 5 months ago
to make changes to the components, you will need access to the [[https://gitlab.com/unicis/website|privat... are not able to do that, whether they have write access to the event’s calendar or not. </WRAP> ==== Sha... It ensures that team members who can’t attend can access and review important discussions and decisions. A... curity Policy]] and the categories define who can access the information. * **Public**: Share with anyo
Vendor Questionnaires @pub:trust_center
6 Hits, Last modified: 11 months ago
ustomers with the option to use single sign-on to access your product and/or service? //If yes, please de... ++++ 4. Operational Controls | === 4.1 Physical Access === Do you have physical security controls in place to protect sensitive data stored or accessible from trusted locations? //If yes, please describe the process.// === 4.2 Logical Access === Do you have logical access controls in place
Source Code @pub:development
5 Hits, Last modified: 11 months ago
style └── test/e2e/auth └── types </codify> === Access === Access to this repository is restricted to authorized personnel. Ensure you have the necessary permi... style └── test/e2e/auth └── types </codify> === Access === The repository is public and can be accessed by anyone at: [[https://github.com/UnicisTech/unicis-pl
IT Security Policy @pub:trust_center:policies
4 Hits, Last modified: 10 months ago
to be categorized. The categories define who can access it and which level of monitoring they receive: ... unt lockout and brute-force protection on account access * Do not provide default passwords for users or... ting our infrastructure and maintaining a minimum access policy approach and need to know principle. ====... we maintain a list of third-party companies with access to customer data, and make it available to client
Software Development Lifecycle @pub:development
3 Hits, Last modified: 4 months ago
rt LR id1((Alpha)) ==> id2((Beta)) ==> id3((Early Access)) ==> id4((General Availability)) </mermaid> ===... updates and changes to beta testers. ===== Early Access ===== ==== Purpose ==== Early Access allows extended testing with real users and continuous development
Tech Stack Applications @pub:operations
3 Hits, Last modified: 8 weeks ago
nProject click on your user icon -> My Account -> Access tokens -> New API access token. Copy and save the access token and add it to the extension settings. </WRAP> {{tag>project_managem
Minimum Viable Secure Product (MVSP) Implementation Overview @pub:trust_center
3 Hits, Last modified: 2 months ago
nd tracked. | | Operational Controls | Physical access | Data centers via Hetzner/Scaleway (... | | Operational Controls | Logical access | RBAC + SSO + MFA enforced. Access reviews quarterly using **Unicis Cybersecurity Controls*
DevOps @pub:development
2 Hits, Last modified: 11 months ago
n a dedicated OVH Cloud instance. * **Dashboard Access**: Access the CapRover dashboard via the web interface. * **Initial Configuration**: Configure basic se
Processes and Procedures @pub:trust_center
2 Hits, Last modified: 5 weeks ago
thout any interference. * **Training:** Provide access to training materials and schedule introductory m... s to take mental health days when needed. Provide access to mental health resources and support. * **Wor
Welcome to Unicis Handbook
1 Hits, Last modified: 3 months ago
<wrap alert>private</wrap> depending on your user access and permissions.</note> </WRAP> </WRAP> {{page>m
What is Unicis? @pub
1 Hits, Last modified: 11 months ago
monstrated through our provision of complimentary access to our solutions: * [[https://www.unicis.tech/d
Introduction to Development @pub
1 Hits, Last modified: 11 months ago
security measures, such as encryption protocols, access controls, and regular security audits, helps miti
Right to Erasure Request Form @pub
1 Hits, Last modified: 10 months ago
ave read and understood the terms of this subject access form and certify that the information given in th
Welcome to Unicis Handbook @pub
1 Hits, Last modified: 2 months ago
ning for employees and contractors. <wrap alert>Access only to employees and contractors.</wrap> <butto
@NAME@ (@USER@) - Private Space @user
1 Hits, Last modified: 11 months ago
ed for your own usage** (only superusers can also access to it)... * To create a page inside this privat
DokuWiki @wiki
1 Hits, Last modified: 5 weeks ago
Formatting Syntax @wiki
1 Hits, Last modified: 5 weeks ago
Privacy Policy @pub:trust_center:policies
1 Hits, Last modified: 10 months ago