Blob Anmation

Security & data protection - A trustworthy communication requires the highest security standards

Since the GDPR came into force and at the latest after the US-Privacy Shield Agreement was declared invalid, far-reaching security requirements have been imposed on the processing of personal data, particularly in cloud applications.
We respond to the latest developments by relying on our own technologies, server locations in your customer's homecountry and comprehensive user education.

Protection against unwanted access  

Digitisation and, in particular, modern communication solutions with virtual assistants are creating large amounts of data. What we previously handled in analogue form via phone is now collected and processed digitally. In order to fully exploit the potential of our solutions, an in-depth data security concept is key.

We achieve the highest safety standards by:

  • hosting on TÜV-certified ISO 27001 data centers with server located in Germany or your homecountry
  • using additional software security through SSL-encryption
  • establishing transparent approval and publication processes with clearly defined access levels
  • using Two-Factor authentication with Idle Session Timeout
  • conducting regular comprehensive penetration tests

In addition, we go beyond strict compliance with all necessary technical organizational measures as defined by the GDPR by sensitizing our employees and customers to IT security in regular training sessions.

We exclude hidden data transfer

Compliance requirements for processing personal data in third countries in order to reach GDPR conformity are strict and even with the greatest care, only possible to a very limited extent. It is difficult to provide sufficient guarantees regarding the exclusion of remote access from the head quarter's country.

To exclude potential access possibilities, our entire processing chain regarding hosting and training of our own AI models is exclusively transparent and traceable. 

Personal data of, for example, tenants, craftsmen, your own employees, prospective tenants and buyers, facility managers or other subcontractors and suppliers are also encrypted and anonymized.

llustration

We use the "Google Analytics" service for statistical analysis, optimization and customized design of our services.

Cookies and similar technologies are used for this purpose. Your consent to the use of this service is voluntary and can be revoked at any time with effect for the future.

Further information on the service and revocation can be found in our privacy policy.

Privacy Policy Imprint

We use the "Google Analytics" service for statistical analysis, optimization and customized design of our services.

Cookies and similar technologies are used for this purpose. Your consent to the use of this service is voluntary and can be revoked at any time with effect for the future.

Further information on the service and revocation can be found in our privacy policy.

Privacy Policy Imprint
Your cookie preferences have been saved.