• Home
  • Content
  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In
≪ View Page

Search

You can find the results of your search below.

Exact match
  • Exact match
  • Starts with
  • Ends with
  • Contains
@pub:trust_center
  • Any namespace
  • pub:trust_center:policies (1)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

IT Security Policy @pub:trust_center:policies
7 Hits, Last modified: 10 months ago
R ===== We are committed to follow and implement all the guidelines and recommendations from GDPR with regards to all the data and information we handle, process, and ... Unicis. {{tag>GDPR}} ===== Data Security ===== All of Unicis infrastructure runs in OVHCloud, hosted... ces, and configured to use AES-256 encryption for all data at rest. ==== Data Classification ==== We
Minimum Viable Secure Product (MVSP) Implementation Overview
2 Hits, Last modified: 2 months ago
ess Controls | Incident handling | All incidents logged and resolved in IRIS. Escalation... i-Factor Authentication (MFA) | MFA required for all critical systems using TOTP or YubiKey. Enforced
Processes and Procedures
2 Hits, Last modified: 5 weeks ago
e and Reporting ===== * **Compliance:** Ensure all employees and community members comply with compa... * **Equipment Return:** Arrange for the return of all company-owned equipment. Provide a pre-paid shipp
Vendor Questionnaires
1 Hits, Last modified: 11 months ago
lace if the answer is //“yes”//.\\ Please submit all the answers to as a ''%%txt%%'' or ''%%md%%'' fil