Search
You can find the results of your search below.
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- rity page. ==== Data Encryption at Rest ==== We use hybrid cloud services, and configured to use AES-256 encryption for all data at rest. ==== Data Class... security vulnerabilities are introduced. But because humans aren’t perfect we also write tests to ensu... (SSO) for all internal and external tools that we use at Unicis. ==== Password Policy ==== The comple
- Trusted Subprocessors and Infrastructure Overview
- are for creating and using file hosting services. Used for internal collaboration and document sharing.... and open-source multiplatform video conferencing. Used for secure video communication. * **Matomo** – Privacy-focused web analytics platform. Used as an alternative to Google Analytics. * **Uptime Kuma** – Self-hosted
- Privacy Policy @pub:trust_center:policies
- / This privacy policy will explain how we do not use the personal data and that we do not collect any data from you when you use our website. Topics: ++++ What data do we colle... contact and support form. ++++ ++++ How will we use your data?| We do not use your data for anything. You own your data. You can unsubscribe from our news
- Vendor Questionnaires
- to as a ''%%txt%%'' or ''%%md%%'' file format or use the function to export to ''PDF''.</WRAP> ++++ ... === Do you provide customers with the option to use single sign-on to access your product and/or serv... tive data is encrypted in transit between the end-user and your product and/or service? //If yes, plea... have a strong password policy in place to protect users who opt to use password-based authentication?
- Processes and Procedures
- new employees any equipment. They are supposed to use their personal devices and adjust to what they ne... 3. Communication Guidelines ===== * **Tools:** Use company-approved tools for communication see full... ated communication tool. * **Task Management:** Use a project management tool (e.g., [[..:operations:... ings and Collaboration ===== * **Scheduling:** Use a shared calendar (e.g., [[..:operations:tech_sta
- Minimum Viable Secure Product (MVSP) Implementation Overview
- entation, and operations. Unicis is a privacy-focused, open-source platform designed for secure digita... nicis Awareness Module. Participation tracked per user. | | Busi... ws managed with SLAs (e.g. 72h for breaches). n8n used for automated notifications. | | Business Con... acter passwords; passphrases supported; Bitwarden used. No passwords stored locally. | | Application D