Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
Is physical access to your premises restricted by the use of access control technologies- such as keypads, smart cards or key code access?
Yes, it is, both our offices and the data center that hosts the DESelect services.
-
Are there enhanced security measures such as additional locks in areas where content is stored (e.g. server room, machine room)?
Yes. There are advanced security measures in the data center hosting the DESelect servers. In the office, we also have a locker for confidential information.
-
How will you protect data from physical and environmental threats or from unauthorized access?
Physical threats: All information sits in the cloud in highly protected data centers. Unauthorised access: Access to our customers' data is limited to an absolute minimum of competent employees a...
-
Are policies and procedures established and mechanisms configured and implemented to protect the wireless network environment perimeter and to restrict unauthorized wireless traffic?
Yes.
-
Do you have a physical security policy in place ?
Yes, please refer to our Physical and Environmental Policy here: https://drive.google.com/file/d/116bcMUTJtqYvnlq065wIz4BDNiznqMBS/view?usp=sharing.
-
Do you encrypt devices holding personal data or confidential information (e.g. laptops, hard drives, USB,…)?
We do not as of yet enforce encryption on all devices (although we do this for portable hard drives, which contain files for Marketing purposes, such as recordings). Do note that we do not actually...
-
Do you use encryption protocols when transferring data? If yes, which ones?
Traffic to and from the DESelect servers is secured through TLS based connectivity. The DESelect service always requires SSL/TLS between the client (browser, mobile apps, ...) and the server. Also,...
-
Do you use at-rest database encryption for data?
Data is encrypted at rest at 2 levels: Production Database Encryption Disk encryption Service instances and the underlying VMs use full volume encryption using LUKS with a randomly generated epheme...
-
Do you have a mean to remotely wipe data on a lost or stolen phone, laptop or similar device?
Yes, we do.
-
Do you have an identity and access management policy in place?
Please find our Access Control Policy here: https://drive.google.com/file/d/1I6yafdcO93I-rV55D9JpdYsqjVgD9nyv/view?usp=sharing.