Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
Do you have a Data Protection Policy in place?
Yes.
-
Do you have a Bring Your Own Device Policy (BYOD) which is implemented?
Yes. Note: none of the devices that fall under the bring your own device policy have access to the network on which the DESelect service runs.
-
Do you monitor logs?
We use DataDog as a tool for the purpose of gathering and monitoring logs. Automatic emails are sent out to system administrators in case certain thresholds are hit that could impact performance or...
-
Do you have an ISO 27001 certification?
Yes, DESelect is ISO 27001 certified.
-
What are the audit and reporting capabilities of the solution related to user management?
In DESelect, administrators can see a real-time overview of which users are active and with which roles. DESelect can also provide an export of changes to users (role, (in)active) over time. In Mar...
-
Do you use at-rest database encryption for data?
Data is encrypted at rest at 2 levels: Production Database Encryption Disk encryption Service instances and the underlying VMs use full volume encryption using LUKS with a randomly generated epheme...
-
Do you keep a registry of all operations performed on personal data related to the following processes: collection, storage, use, sharing and destruction?
Yes, we do have a data processing registry.
-
Do you test the changes in a test environment before putting them in production?
Yes, all developments go through extensive testing on a staging environment. Test exist of both manual test and thousands of automated tests.
-
How does DESelect keep client specific data and infrastructure apart from other clients? Is DESelect single-tenant/multi-tenant?
DESelect is a multi-tenant SaaS application. Content boundaries are managed by DESelect’s business logic tier within the hosted cloud. As a result, data is carefully managed so as not to be exposed...
-
Is sensitive data encrypted (eg. user access tokens)?
Yes, sensitive data, like user access tokens are categorized as sensitive customer information according to our Information Classification Policy, and is encrypted both at-rest (using AES 192 bit) ...