Search
You can find the results of your search below.
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- is and everyone here is doing their best to keep your presentations and data secure. This document describes our internal security policies, and minimum security ... . ==== Data Classification ==== We like to keep our data organized, and for that we created different... eceive: * **Public**: Information available in our main website and marketing information * **Inte
- Privacy Policy @pub:trust_center:policies
- we do not collect any data from you when you use our website. Topics: ++++ What data do we collect?|... any data from you. ++++ ++++ How do we collect your data?| We collect your data only if you share via newsletter, contact and support form. ++++ ++++ How will we use your data?| We do not use your data for anything. You
- Trusted Subprocessors and Infrastructure Overview
- and Infrastructure Overview ===== View a list of our trusted subprocessors who help us deliver our services while maintaining high standards of security, data protection, and compliance. Most of our infrastructure is managed and maintained on self-... re fully managed by the Unicis team and hosted in our private infrastructure within the EU: * **Next
- Processes and Procedures
- ng business days. * **Status Updates:** Update your status on communication tools to indicate availab... d well-being. Take a 5- to 10-minute break every hour. ===== 5. Meetings and Collaboration ===== *