Search
You can find the results of your search below.
Fulltext results:
- Privacy Policy @pub:trust_center:policies
- | We keep our privacy policy under regular review by applying privacy by default and by design approach. ++++ ++++ How to contact us| [[https://unicis.tech/contact|Contact f
- Minimum Viable Secure Product (MVSP) Implementation Overview
- | CSP, X-Frame, HSTS, etc. enforced by server and app; tested on CI/CD deploys. ... ecurity Controls**. Inactive accounts deactivated by n8n. | | Operational Controls | Sub-processors
- IT Security Policy @pub:trust_center:policies
- tech/dpa|Data Processing Agreement]] example, and by [[https://unicis.tech/contact|contacting us]]. {... days for medium risk vulnerabilities (as defined by their CVSS score). ===== Application Implementat
- Processes and Procedures
- fe Balance:** Promote a healthy work-life balance by respecting working hours and discouraging after-h
- Trusted Subprocessors and Infrastructure Overview
- f-Hosted Tools ==== These tools are fully managed by the Unicis team and hosted in our private infrast
- Vendor Questionnaires
- nformation on the type and amount of data handled by your product and/or service available for threat