Search
You can find the results of your search below.
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- rity page. ==== Data Encryption at Rest ==== We use hybrid cloud services, and configured to use AES-256 encryption for all data at rest. ==== Data Class... (SSO) for all internal and external tools that we use at Unicis. ==== Password Policy ==== The comple... special character. If password authentication is used in addition to single sign-on, we enforce: *
- Privacy Policy @pub:trust_center:policies
- / This privacy policy will explain how we do not use the personal data and that we do not collect any data from you when you use our website. Topics: ++++ What data do we colle... contact and support form. ++++ ++++ How will we use your data?| We do not use your data for anything. You own your data. You can unsubscribe from our news
- Vendor Questionnaires
- to as a ''%%txt%%'' or ''%%md%%'' file format or use the function to export to ''PDF''.</WRAP> ++++ ... === Do you provide customers with the option to use single sign-on to access your product and/or serv... tive data is encrypted in transit between the end-user and your product and/or service? //If yes, plea... have a strong password policy in place to protect users who opt to use password-based authentication?
- Processes and Procedures
- new employees any equipment. They are supposed to use their personal devices and adjust to what they ne... 3. Communication Guidelines ===== * **Tools:** Use company-approved tools for communication see full... ated communication tool. * **Task Management:** Use a project management tool (e.g., [[..:operations:... ings and Collaboration ===== * **Scheduling:** Use a shared calendar (e.g., [[..:operations:tech_sta