Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
Are all identified security, contractual, and regulatory requirements for customer access contractually addressed and remediated prior to granting customers access to data, assets, and information systems?
Yes.
-
Do you conduct network penetration tests of your cloud service infrastructure at least annually?
Yes.
-
Do you conduct application penetration tests of your cloud infrastructure regularly?
Yes.
-
Are controls in place to prevent unauthorized access to your application, program, or object source code, and assure it is restricted to authorized personnel only?
Yes.
-
Do you publish a list of all APIs available in the service and indicate which are standard and which are customized?
We do not publicly list all APIs used, they are only for internal usage of the application. There are no customized endpoints.
-
Do your terms and conditions contain a framework and/or process for dispute resolution, for example in the event of loss or damage to digital content?
Yes.
-
Is personal data and confidential information that is stored in the cloud encrypted on database level?
Yes.
-
Is any 3rd party / open source software used within your solution?
DESelect is provided as a Software as a Service platform. As part of the service, DESelect relies on Open Source software at different layers. DESelect takes great care to only select quality third...
-
Which subcontractors do you work with?
We have 1 subcontractor, which is DigitalOcean. They host the servers that run the DESelect software in a data center in Amsterdam (The Netherlands, Europe). Backups are stored with Digital Ocean i...
-
Do third-party agreements include provision for the security and protection of information and assets?
Yes.