- Employees are continuously trained in information security and privacy through on the job training courses, awareness sessions and random checks in daily activities.
- Password policy
- Information security procedures and processes.
- Two-step authentication to access the communication platform.
- Password must meet criteria and must be changed frequently.
- Logging of mutations and activities of users.
- Personnel screening (diplomas, experience, certificate of good conduct)
- Signing of employment contract including non-disclosure and privacy statement
- Own Data Protection Officer
- Own Chief Information Security Officer
If you would like to know more about this subject or are you curious about what specific measures we have taken, please contact our Chief Information Security Officer at email@example.com