Search
You can find the results of your search below.
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- ntations and data secure. This document describes our internal security policies, and minimum security ... . ==== Data Classification ==== We like to keep our data organized, and for that we created different... eceive: * **Public**: Information available in our main website and marketing information * **Inte... we inspect closely any code before it is release. Our developers inspect the logic and information flow
- Privacy Policy @pub:trust_center:policies
- we do not collect any data from you when you use our website. Topics: ++++ What data do we collect?|... hing. You own your data. You can unsubscribe from our newsletter whenever you want. ++++ ++++ How do w... ify Privacy policy]] ++++ ++++ Marketing| We use our own hosted [[https://matomo.org/|Matomo]] as an a... and visitor behavior information. When you visit our websites, we may collect information from you aut
- Trusted Subprocessors and Infrastructure Overview
- and Infrastructure Overview ===== View a list of our trusted subprocessors who help us deliver our services while maintaining high standards of security, data protection, and compliance. Most of our infrastructure is managed and maintained on self-... re fully managed by the Unicis team and hosted in our private infrastructure within the EU: * **Next