• Home
  • Content
  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In
≪ View Page

Search

You can find the results of your search below.

Exact match
  • Exact match
  • Starts with
  • Ends with
  • Contains
@pub:trust_center
  • Any namespace
  • pub:trust_center:policies (2)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

IT Security Policy @pub:trust_center:policies
8 Hits, Last modified: 10 months ago
rity page. ==== Data Encryption at Rest ==== We use hybrid cloud services, and configured to use AES-256 encryption for all data at rest. ==== Data Class... (SSO) for all internal and external tools that we use at Unicis. ==== Password Policy ==== The comple... ssword to anything below 64 characters * Do not use secret questions as a sole password reset require
Privacy Policy @pub:trust_center:policies
7 Hits, Last modified: 10 months ago
/ This privacy policy will explain how we do not use the personal data and that we do not collect any data from you when you use our website. Topics: ++++ What data do we colle... contact and support form. ++++ ++++ How will we use your data?| We do not use your data for anything. You own your data. You can unsubscribe from our news
Processes and Procedures
6 Hits, Last modified: 5 weeks ago
new employees any equipment. They are supposed to use their personal devices and adjust to what they ne... 3. Communication Guidelines ===== * **Tools:** Use company-approved tools for communication see full... ated communication tool. * **Task Management:** Use a project management tool (e.g., [[..:operations:... ings and Collaboration ===== * **Scheduling:** Use a shared calendar (e.g., [[..:operations:tech_sta
Vendor Questionnaires
4 Hits, Last modified: 11 months ago
to as a ''%%txt%%'' or ''%%md%%'' file format or use the function to export to ''PDF''.</WRAP> ++++ ... === Do you provide customers with the option to use single sign-on to access your product and/or serv... sword policy in place to protect users who opt to use password-based authentication? //If yes, please ... rocess.// === 2.5 Security Libraries === Do you use standardized libraries to improve the security of