Search
You can find the results of your search below.
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- creating a secure platform, add-ons and plugins that you can trust. We at Unicis are using the [[https://mvsp.dev/|Minimum Viable Secure Product (MVSP)]... ata and information we handle, process, and store at Unicis. {{tag>GDPR}} ===== Data Security ===== ... their cloud security page. ==== Data Encryption at Rest ==== We use hybrid cloud services, and conf
- Vendor Questionnaires
- nswers to as a ''%%txt%%'' or ''%%md%%'' file format or use the function to export to ''PDF''.</WRAP> ... Do you store sensitive data in an encrypted format? //If yes, please describe the process.// ++++ ... by your product and/or service available for threat modeling or incident response purposes? //If yes... he flow of data through systems available for threat modeling or incident response purposes? //If yes
- Processes and Procedures
- sed to use their personal devices and adjust to what they need to work without any interference. * *... ny-approved tools for communication see full list at company [[tech_stack_applications/|Tech Stack App... s must check in with their team leader or manager at the start of their workday via the designated com... :communications#meeting_agendas|meeting agendas]] at least 24 hours in advance. Stick to the agenda to
- Unicis Policies
- olicies ====== Please find the enforced policies at Unicis that every employee should be aware of, acknowledge and understand. {{indexmenu>:pub:trust_ce