Search
You can find the results of your search below.
Fulltext results:
- Vendor Questionnaires
- == 1.1 External Vulnerability Reports === Do you have a process in place to accept and process external... process.// === 1.7 Incident Handling === Do you have processes in place to ensure the smooth handling ... the process.// === 1.8 Data Handling === Do you have a process in place to handle data stored on remov... e process.// === 2.4 Password Policy === Do you have a strong password policy in place to protect user
- Privacy Policy @pub:trust_center:policies
- to the following: //The right to access// – You have the right to request Unicis for copies of your pe... is service. //The right to rectification// – You have the right to request that Unicis correct any information you believe is inaccurate. You also have the right to request Unicis to complete the infor... ve is incomplete. //The right to erasure// – You have the right to request that Unicis erase your perso
- IT Security Policy @pub:trust_center:policies
- write tests to ensure the application does not behave in an unexpected way. We also run semiautomatic ... y Integrations ==== As listed in our website, we have integrations for Atlassian products. We follow [