Search
You can find the results of your search below.
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- ====== IT Security Policy ====== //Effective date: 17.05.2024.// Security is very important to Unicis... flow diagram ==== At Unicis we maintain an up-to-date diagram indicating how sensitive data and where i... sset Management ==== We maintain and regularly update an internal Threat Model of our infrastructure, a
- Vendor Questionnaires
- processes in place to identify and maintain up-to-date components within your product and/or service? /... ing data with third-party sub-processors, and validate their security posture? //If yes, please describ
- Processes and Procedures
- s during business days. * **Status Updates:** Update your status on communication tools to indicate av
- Privacy Policy @pub:trust_center:policies
- ====== Privacy Policy ====== //Effective date: 01.03.2024.// This privacy policy will explain how we