• Home
  • Content
  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In
≪ View Page

Search

You can find the results of your search below.

Starts with
  • Exact match
  • Starts with
  • Ends with
  • Contains
@pub:trust_center
  • Any namespace
  • pub:trust_center:policies (2)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

IT Security Policy @pub:trust_center:policies
6 Hits, Last modified: 10 months ago
t 12 characters, and it must contain at least one uppercase and lowercase letter, digit, and special c... Data flow diagram ==== At Unicis we maintain an up-to-date diagram indicating how sensitive data and where it ends up being stored. ===== Infrastructure Security ====... Asset Management ==== We maintain and regularly update an internal Threat Model of our infrastructur
Processes and Procedures
4 Hits, Last modified: 5 weeks ago
ithin 24 hours during business days. * **Status Updates:** Update your status on communication tools to indicate availability (e.g., available, in a mee... he [[:start|Unicis handbook]], we provide regular updates regarding new tools, software updates, and best practices. ===== 10. Employee and Community Wel
Trusted Subprocessors and Infrastructure Overview
2 Hits, Last modified: 5 weeks ago
Used as an alternative to Google Analytics. * **Uptime Kuma** – Self-hosted monitoring tool. Used to monitor uptime and service health. * **Mautic** – Open-sou
Privacy Policy @pub:trust_center:policies
2 Hits, Last modified: 10 months ago
used alternative to Google Analytics. - [[https://uptime.kuma.pet/|Uptime Kuma]] A self-hosting monitoring tool. **Third party service providers:** - Hot
Vendor Questionnaires
1 Hits, Last modified: 11 months ago
have processes in place to identify and maintain up-to-date components within your product and/or ser