<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
  <loc>https://security.deselect.com/hc/en-us</loc>
  <lastmod>2025-03-20T13:49:45Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609476241-Have-you-performed-a-data-processing-audit-identifying-all-the-elements-requiring-modification-within-your-current-data-processing-activities</loc>
  <lastmod>2021-09-03T12:07:00Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609492881-Do-you-keep-a-registry-of-all-operations-performed-on-personal-data-related-to-the-following-processes-collection-storage-use-sharing-and-destruction</loc>
  <lastmod>2022-04-21T10:06:49Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609611025-Do-you-have-an-impact-assessment-process-in-place-one-that-will-be-applied-and-documented-for-each-process-that-presents-a-risk</loc>
  <lastmod>2021-09-03T12:07:14Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609771665-Do-you-perform-third-party-security-audits-due-diligence-checks-on-the-companies-you-collaborate-with</loc>
  <lastmod>2021-09-03T12:06:39Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609855761-Do-you-have-a-Data-Protection-Policy-in-place</loc>
  <lastmod>2023-10-30T12:36:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609861649-Did-you-define-your-data-retention-rules</loc>
  <lastmod>2021-09-03T12:05:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609895185-Will-you-secure-personal-data-in-transfer-through-encryption-pseudonymisation-and-or-anonymisation-rules</loc>
  <lastmod>2021-09-03T12:05:03Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609934225-Will-you-secure-personal-data-at-rest-through-encryption-pseudonymisation-and-or-anonymisation-rules</loc>
  <lastmod>2021-09-03T12:04:56Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609959185-Will-your-organisation-process-and-or-store-all-customer-data-within-the-EU</loc>
  <lastmod>2021-09-03T12:04:40Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609970321-Are-you-using-cloud-services-to-process-customer-data-Are-these-GDPR-compliant</loc>
  <lastmod>2021-09-03T12:03:37Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609982225-Does-your-organisation-have-offices-servers-outside-the-EU</loc>
  <lastmod>2021-09-03T12:03:20Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406609990545-Can-data-subjects-easily-access-rectify-and-erase-their-data</loc>
  <lastmod>2021-09-03T12:02:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610136209-Are-you-compliant-with-FISMA-standards</loc>
  <lastmod>2021-09-03T12:10:00Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610146961-Have-you-completed-the-Cloud-Security-Alliance-CSA-self-assessment-or-CAIQ</loc>
  <lastmod>2021-09-03T12:10:27Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610161169-What-are-the-certifications-of-the-datacenter-hosting-the-DESelect-application</loc>
  <lastmod>2021-09-03T12:11:46Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610318353-Have-you-received-the-Cloud-Security-Alliance-STAR-certification</loc>
  <lastmod>2021-09-03T12:20:37Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610462481-Have-you-ever-had-a-data-breach</loc>
  <lastmod>2023-01-11T23:22:25Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610466449-Describe-how-long-your-organization-has-conducted-business-in-this-product-area</loc>
  <lastmod>2021-09-03T12:27:03Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610484497-Describe-your-organization-s-business-background-and-ownership-structure-including-all-parent-and-subsidiary-relationships</loc>
  <lastmod>2021-09-03T12:28:21Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610594705-Does-DESelect-process-protected-health-information-PHI-or-any-data-covered-by-the-Health-Insurance-Portability-and-Accountability-Act</loc>
  <lastmod>2021-09-03T12:34:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610619665-How-are-users-accessing-the-service-describe-user-authentication-methods</loc>
  <lastmod>2021-09-03T12:40:23Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406610674577-How-does-DESelect-authenticate-Marketing-Cloud-users</loc>
  <lastmod>2021-09-03T12:38:09Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406616981009-Do-you-know-how-personal-data-is-stored-processed-shared-and-used-within-your-organization</loc>
  <lastmod>2021-09-03T12:06:54Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617289233-Are-you-able-to-guarantee-that-the-amount-of-personal-data-collected-will-be-strictly-limited-to-that-which-is-necessary-for-the-optimal-use-of-any-new-product-service-or-application</loc>
  <lastmod>2021-09-03T12:06:49Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617337105-Have-you-appointed-a-Data-Protection-Officer</loc>
  <lastmod>2021-09-03T12:06:31Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617361937-Have-you-updated-all-of-your-policies-to-include-and-meet-GDPR-regulations</loc>
  <lastmod>2021-09-03T12:06:25Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617377681-Is-DESelect-GDPR-Compliant</loc>
  <lastmod>2021-09-03T12:05:35Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617418513-What-are-the-data-retention-policies-for-DESelect</loc>
  <lastmod>2021-09-03T12:05:10Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617507473-Are-all-your-employees-trained-on-GDPR-Data-Protection-compliance</loc>
  <lastmod>2021-09-03T12:04:49Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617533585-Do-you-have-a-subcontractor-outside-the-EU</loc>
  <lastmod>2021-09-03T12:04:30Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617713809-Do-you-allow-tenants-to-view-your-SOC2-ISO-27001-or-similar-third-party-audit-or-certification-reports</loc>
  <lastmod>2021-09-03T12:09:08Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617745041-Have-you-undergone-a-SSAE-18-audit</loc>
  <lastmod>2021-09-03T12:10:54Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617852561-Do-you-have-a-SOC-2-certification</loc>
  <lastmod>2021-09-03T12:18:23Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617868817-Do-you-have-a-PCI-certification</loc>
  <lastmod>2021-09-03T12:18:52Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406617882257-Do-you-have-an-ISO-27001-certification</loc>
  <lastmod>2022-07-29T08:25:51Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618010385-Do-you-have-a-program-in-place-that-includes-the-ability-to-monitor-changes-to-the-regulatory-requirements-in-relevant-jurisdictions</loc>
  <lastmod>2021-09-03T12:26:10Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618039313-Will-data-regulated-by-PCI-DSS-Payment-Card-Industry-Security-Standards-Council-reside-in-DESelect</loc>
  <lastmod>2021-09-03T12:28:43Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618139793-Name-of-application-service-It-hardware-being-provided</loc>
  <lastmod>2021-09-03T12:34:46Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618149009-Description-of-application-service-hardware</loc>
  <lastmod>2021-09-03T12:35:13Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618154129-DESelect-Installed-Package-Permissions</loc>
  <lastmod>2021-09-03T12:35:44Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618235921-What-data-does-DESelect-store-process</loc>
  <lastmod>2021-09-03T12:41:28Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618243857-Where-does-DESelect-store-and-process-customer-data-In-what-region-is-data-stored</loc>
  <lastmod>2021-09-03T12:41:56Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406618248593-What-technology-languages-platforms-stacks-components-are-utilised-in-the-scope-of-the-application</loc>
  <lastmod>2021-12-07T10:29:54Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406620735761-Do-you-perform-at-minimum-annual-reviews-to-your-privacy-and-security-policies</loc>
  <lastmod>2021-09-03T14:01:24Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406620764945-Do-you-have-a-written-Information-Security-Policy</loc>
  <lastmod>2021-09-03T14:03:15Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621138833-Does-your-company-conduct-background-checks-on-employees</loc>
  <lastmod>2021-09-03T14:24:59Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621150993-Do-you-have-a-documented-off-boarding-policy</loc>
  <lastmod>2021-09-03T14:26:02Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621196689-Do-you-maintain-a-complete-inventory-of-all-of-your-critical-assets-located-at-all-sites-or-geographical-locations-and-their-assigned-ownership</loc>
  <lastmod>2021-09-03T14:30:01Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621198225-Is-there-a-formal-documented-asset-management-program-in-place</loc>
  <lastmod>2021-09-03T14:30:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621411473-Do-you-require-a-periodical-authorization-and-validation-e-g-at-least-annually-of-the-entitlements-for-all-system-users-and-administrators-exclusive-of-users-maintained-by-your-tenants-based-on-the-rule-of-least-privilege</loc>
  <lastmod>2021-09-03T14:54:31Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621462801-Do-you-allow-remote-access</loc>
  <lastmod>2021-09-03T14:57:41Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621476625-Do-you-use-generic-accounts-to-access-the-servers-and-applications-for-administrator-purposes</loc>
  <lastmod>2021-09-03T14:58:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406621487505-Is-access-role-based-depending-on-the-employee-s-function</loc>
  <lastmod>2021-09-03T14:59:25Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406628225297-Do-you-notify-your-tenants-when-you-make-material-changes-to-your-information-security-and-or-privacy-policies</loc>
  <lastmod>2021-09-03T13:39:39Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406628244113-If-requested-can-you-make-any-other-documents-supporting-your-responses-in-this-questionnaire-available</loc>
  <lastmod>2021-09-03T13:40:10Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406628259473-If-requested-can-you-make-the-Information-Security-Policies-and-Procedures-that-are-applicable-for-the-service-project-available</loc>
  <lastmod>2021-09-03T13:40:36Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406628266385-If-requested-can-you-make-the-most-recent-Application-Code-Review-or-Penetration-Testing-Reports-carried-out-by-independent-third-party-available</loc>
  <lastmod>2021-09-03T13:41:11Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406628891665-Do-you-have-a-data-privacy-policy</loc>
  <lastmod>2021-09-03T14:02:09Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629651089-Are-you-covered-by-any-cybersecurity-insurance</loc>
  <lastmod>2021-09-03T14:15:21Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629692561-Do-you-have-appointed-person-s-responsible-for-Information-Security-with-defined-roles-and-responsibilities</loc>
  <lastmod>2021-09-03T14:15:54Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629749777-Is-there-a-formal-change-management-process-in-place</loc>
  <lastmod>2021-09-03T14:17:48Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629775377-Do-you-conduct-internal-audits-regularly-as-prescribed-by-industry-best-practices-and-guidance</loc>
  <lastmod>2021-09-03T14:18:14Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629805329-Do-you-have-a-Bring-Your-Own-Device-Policy-BYOD-which-is-implemented</loc>
  <lastmod>2023-10-30T12:35:44Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629906193-Upon-termination-of-contract-or-business-relationship-are-employees-and-business-partners-adequately-informed-of-their-obligations-for-returning-organizationally-owned-assets</loc>
  <lastmod>2021-09-03T14:24:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629924241-Do-you-have-a-security-awareness-program-in-place</loc>
  <lastmod>2021-09-03T14:25:32Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406629972369-Are-all-personnel-required-to-sign-an-Acceptable-Use-Policy-for-the-use-of-professional-information-and-systems</loc>
  <lastmod>2021-09-03T14:27:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630032913-Do-you-allow-the-use-of-personal-removable-data-storage-devices</loc>
  <lastmod>2021-09-03T14:30:58Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630039185-Do-you-have-a-set-of-procedures-for-information-labelling-and-handling-in-accordance-with-the-classification-scheme</loc>
  <lastmod>2021-09-03T14:31:20Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630046225-Do-you-have-a-system-for-information-classification</loc>
  <lastmod>2021-09-03T14:31:58Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630526481-How-is-data-from-different-customers-separated</loc>
  <lastmod>2021-09-03T14:53:12Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630555793-Which-options-for-MFA-multi-factor-authentication-do-you-support</loc>
  <lastmod>2021-09-03T14:53:41Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630566161-Is-physical-and-logical-user-access-to-audit-logs-restricted-to-authorized-personnel</loc>
  <lastmod>2021-09-03T14:54:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630591249-Are-controls-in-place-to-prevent-unauthorized-access-to-tenant-application-program-or-object-source-code-and-assure-it-is-restricted-to-authorized-personnel-only</loc>
  <lastmod>2021-09-03T14:54:53Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630607377-Do-you-have-controls-in-place-ensuring-timely-removal-of-systems-access-that-is-no-longer-required-for-business-purposes</loc>
  <lastmod>2022-03-18T23:53:23Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630655761-Do-you-have-a-written-policy-for-user-changes-joiners-movers-leavers-to-be-handled</loc>
  <lastmod>2021-09-03T14:56:14Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630669841-Are-you-disabling-access-rights-immediately-after-the-end-of-employment</loc>
  <lastmod>2021-09-03T14:56:39Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630682641-Do-you-have-a-written-password-management-policy</loc>
  <lastmod>2021-09-03T14:57:03Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406630743441-Do-you-allow-multiple-employees-to-use-the-same-login</loc>
  <lastmod>2021-09-03T14:58:41Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661935889-Are-factory-default-account-details-been-changed</loc>
  <lastmod>2021-09-04T11:05:40Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661937681-Do-you-have-an-identity-and-access-management-policy-in-place</loc>
  <lastmod>2021-09-04T11:06:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661942161-Do-you-use-at-rest-database-encryption-for-data</loc>
  <lastmod>2022-04-21T10:11:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661946385-Do-you-encrypt-devices-holding-personal-data-or-confidential-information-e-g-laptops-hard-drives-USB</loc>
  <lastmod>2021-09-04T11:10:45Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661952273-Do-you-have-a-physical-security-policy-in-place</loc>
  <lastmod>2021-09-04T11:12:32Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661964433-Are-there-enhanced-security-measures-such-as-additional-locks-in-areas-where-content-is-stored-e-g-server-room-machine-room</loc>
  <lastmod>2021-09-04T11:14:20Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661966737-Is-physical-access-to-your-premises-restricted-by-the-use-of-access-control-technologies-such-as-keypads-smart-cards-or-key-code-access</loc>
  <lastmod>2021-09-04T11:14:51Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661976849-Do-you-have-a-data-services-recovery-and-restoration-according-to-the-criticality-of-the-applications</loc>
  <lastmod>2021-09-04T11:19:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661978641-Are-backups-securely-stored</loc>
  <lastmod>2021-09-04T11:19:52Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661985937-Do-you-have-policies-and-controls-in-place-to-manage-IT-infrastructure</loc>
  <lastmod>2021-09-04T11:21:53Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661987217-Do-you-have-an-antivirus-software-on-each-server</loc>
  <lastmod>2021-09-04T11:22:15Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406661989137-Do-you-have-in-place-measures-to-prevent-viruses-and-malware-from-entering-the-facility-or-being-loaded-on-to-any-systems</loc>
  <lastmod>2021-09-04T11:22:44Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662002705-Do-you-apply-daily-patches-to-avoid-zero-days-attacks</loc>
  <lastmod>2021-09-04T11:27:28Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662020497-Are-business-continuity-plans-subject-to-testing-at-planned-intervals-or-upon-significant-organizational-or-environmental-changes-to-ensure-continuing-effectiveness</loc>
  <lastmod>2021-09-04T11:32:36Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662022289-Do-you-maintain-written-business-continuity-procedures-a-business-continuity-plan-BCP</loc>
  <lastmod>2021-09-04T11:33:02Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662027921-Have-you-tested-your-security-incident-response-plans-in-the-last-year</loc>
  <lastmod>2021-09-04T11:35:42Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662029713-Have-you-implemented-backup-or-recovery-mechanisms-to-ensure-compliance-with-regulatory-statutory-contractual-or-business-requirements</loc>
  <lastmod>2021-09-04T11:36:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662032401-What-is-your-policy-SLA-on-breach-notifications</loc>
  <lastmod>2021-09-04T11:37:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662037521-Will-you-share-the-results-of-a-cybersecurity-audit-if-you-conduct-any</loc>
  <lastmod>2021-09-04T11:38:35Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662048785-Do-third-party-agreements-include-provision-for-the-security-and-protection-of-information-and-assets</loc>
  <lastmod>2021-09-04T11:42:01Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662050961-Which-subcontractors-do-you-work-with</loc>
  <lastmod>2021-09-04T11:42:27Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662054545-Is-any-3rd-party-open-source-software-used-within-your-solution</loc>
  <lastmod>2021-09-04T11:43:05Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662059537-Is-personal-data-and-confidential-information-that-is-stored-in-the-cloud-encrypted-on-database-level</loc>
  <lastmod>2021-09-04T11:43:30Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662061713-Do-your-terms-and-conditions-contain-a-framework-and-or-process-for-dispute-resolution-for-example-in-the-event-of-loss-or-damage-to-digital-content</loc>
  <lastmod>2021-09-04T11:43:58Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662771857-Do-you-publish-a-list-of-all-APIs-available-in-the-service-and-indicate-which-are-standard-and-which-are-customized</loc>
  <lastmod>2021-09-04T15:23:51Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662775441-Are-controls-in-place-to-prevent-unauthorized-access-to-your-application-program-or-object-source-code-and-assure-it-is-restricted-to-authorized-personnel-only</loc>
  <lastmod>2021-09-04T15:24:38Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662780433-Do-you-use-an-automated-source-code-analysis-tool-to-detect-security-defects-in-code-prior-to-production</loc>
  <lastmod>2021-09-04T15:26:36Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662789137-Do-you-support-role-based-access-control-RBAC-for-end-users-administrators</loc>
  <lastmod>2021-09-04T15:28:20Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662792593-What-does-the-Salesforce-Security-Review-entail</loc>
  <lastmod>2021-09-04T15:28:49Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662795793-Describe-the-release-management-process-you-use</loc>
  <lastmod>2021-09-04T15:29:32Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406662800401-How-does-DESelect-keep-client-specific-data-and-infrastructure-apart-from-other-clients-Is-DESelect-single-tenant-multi-tenant</loc>
  <lastmod>2021-09-04T15:30:36Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670209169-Do-you-monitor-and-review-access-attempts</loc>
  <lastmod>2021-09-04T11:05:02Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670220177-Do-you-have-a-mean-to-remotely-wipe-data-on-a-lost-or-stolen-phone-laptop-or-similar-device</loc>
  <lastmod>2021-09-04T11:08:14Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670224017-Do-you-use-encryption-protocols-when-transferring-data-If-yes-which-ones</loc>
  <lastmod>2021-09-04T11:09:20Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670236049-Are-policies-and-procedures-established-and-mechanisms-configured-and-implemented-to-protect-the-wireless-network-environment-perimeter-and-to-restrict-unauthorized-wireless-traffic</loc>
  <lastmod>2021-09-04T11:13:03Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670242321-How-will-you-protect-data-from-physical-and-environmental-threats-or-from-unauthorized-access</loc>
  <lastmod>2021-09-04T11:13:39Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670249745-How-do-you-ensure-all-emails-are-scanned-for-viruses</loc>
  <lastmod>2021-09-04T11:17:54Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670251921-What-operating-system-s-is-are-leveraged-by-the-system-s-application-s</loc>
  <lastmod>2021-09-04T11:18:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670257297-Do-you-perform-backups-and-restore-exercises</loc>
  <lastmod>2021-09-04T11:20:14Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670258449-Do-you-monitor-logs</loc>
  <lastmod>2023-10-30T12:35:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670273809-Will-you-copy-customer-data-in-non-production-environments</loc>
  <lastmod>2021-09-04T11:27:06Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670308881-Do-you-implement-network-segmentation</loc>
  <lastmod>2021-09-04T11:31:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670318865-Do-you-have-the-capability-to-recover-data-for-a-specific-customer-in-the-case-of-a-failure-or-data-loss</loc>
  <lastmod>2021-09-04T11:35:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670326033-Please-describe-the-service-level-agreements-SLA-for-disaster-recovery-RTO-RPO-and-what-system-performance-you-guarantee-after-recovery</loc>
  <lastmod>2021-09-04T11:36:27Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670329233-Do-you-have-agreements-with-subprocessors-about-data-breach-notifications</loc>
  <lastmod>2021-12-07T10:29:40Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670331793-Will-you-agree-to-coordinate-with-us-on-any-external-communications-relating-to-a-cyber-incident-that-involves-our-data</loc>
  <lastmod>2021-09-04T11:37:52Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670332945-Will-you-agree-to-provide-all-reasonable-assistance-with-any-investigation-into-a-cybersecurity-incident-affecting-our-data</loc>
  <lastmod>2021-09-04T11:38:13Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670335505-Have-you-experienced-a-cybersecurity-event-in-the-past-two-years</loc>
  <lastmod>2021-09-04T11:38:56Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670336913-Do-you-maintain-written-disaster-recovery-procedures-a-Disaster-Recovery-Plan-CRP</loc>
  <lastmod>2021-09-04T11:39:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670339089-Do-you-have-a-written-incident-response-plan-in-place</loc>
  <lastmod>2021-09-04T11:39:40Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406670340881-Are-data-recovery-processes-in-place</loc>
  <lastmod>2021-09-04T11:40:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671099665-Do-you-conduct-application-penetration-tests-of-your-cloud-infrastructure-regularly</loc>
  <lastmod>2021-09-04T15:25:02Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671101585-Do-you-conduct-network-penetration-tests-of-your-cloud-service-infrastructure-at-least-annually</loc>
  <lastmod>2021-09-04T15:25:27Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671103761-Are-all-identified-security-contractual-and-regulatory-requirements-for-customer-access-contractually-addressed-and-remediated-prior-to-granting-customers-access-to-data-assets-and-information-systems</loc>
  <lastmod>2021-09-04T15:25:49Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671106065-Do-you-review-your-applications-for-security-vulnerabilities-and-address-any-issues-prior-to-deployment-to-production</loc>
  <lastmod>2021-09-04T15:26:09Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671113873-Are-upgrades-or-system-changes-installed-during-off-peak-hours-or-in-a-manner-that-does-not-impact-the-customer</loc>
  <lastmod>2021-09-04T15:27:54Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671124497-Is-sensitive-data-encrypted-eg-user-access-tokens</loc>
  <lastmod>2021-09-04T15:30:15Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/4406671127185-Do-you-test-the-changes-in-a-test-environment-before-putting-them-in-production</loc>
  <lastmod>2021-09-04T15:30:56Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/5599702209297-What-are-the-audit-and-reporting-capabilities-of-the-solution-related-to-user-management</loc>
  <lastmod>2022-04-21T10:12:53Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/8421263583505-Does-DESelect-have-anti-bribery-and-anti-corruption-policies-in-place</loc>
  <lastmod>2022-08-18T07:27:04Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/11903202013713-Security-questionnaires-DESelect-Search</loc>
  <lastmod>2023-01-04T09:33:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/articles/16098010103441-Engage-What-data-is-stored-and-or-processed</loc>
  <lastmod>2023-06-12T15:41:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406610097169-General</loc>
  <lastmod>2022-07-29T08:25:51Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406616914193-General</loc>
  <lastmod>2023-10-30T12:36:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406617951889-General</loc>
  <lastmod>2023-06-12T15:41:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406621128081-General</loc>
  <lastmod>2021-09-03T14:27:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406628213137-General</loc>
  <lastmod>2023-01-04T09:33:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406628849169-General</loc>
  <lastmod>2021-09-03T14:03:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406629005713-General</loc>
  <lastmod>2023-10-30T12:35:44Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406630009617-General</loc>
  <lastmod>2021-09-03T14:31:58Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406630058513-General</loc>
  <lastmod>2022-04-21T10:12:53Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406662014225-General</loc>
  <lastmod>2021-09-04T11:31:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406662017553-General</loc>
  <lastmod>2021-09-04T11:33:02Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406662767889-General</loc>
  <lastmod>2021-09-04T15:30:56Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406670218897-General</loc>
  <lastmod>2022-04-21T10:11:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406670230417-General</loc>
  <lastmod>2021-09-04T11:14:51Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406670248977-General</loc>
  <lastmod>2023-10-30T12:35:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406670315537-General</loc>
  <lastmod>2021-12-07T10:29:40Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/sections/4406670348945-General</loc>
  <lastmod>2021-09-04T11:43:58Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406551766801-GDPR-Screening</loc>
  <lastmod>2023-10-30T12:36:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406558314001-Certification</loc>
  <lastmod>2022-07-29T08:25:51Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406575248145-Service-Scope</loc>
  <lastmod>2023-06-12T15:41:07Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406609161489-Supporting-Documentation</loc>
  <lastmod>2023-01-04T09:33:17Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406609221265-A11-Physical-Environmental-Security</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406609226513-A12-Operations-Security</loc>
  <lastmod>2023-10-30T12:35:16Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406609239441-A14-Application-Security</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406609245201-A15-Supplier-Relationships</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616660625-A5-Information-Security-Policies</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616665361-A6-Organisation-of-Informational-Security</loc>
  <lastmod>2023-10-30T12:35:44Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616667409-A7-Human-Resources-Security</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616682385-A8-Asset-Management</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616692625-A9-Access-Control</loc>
  <lastmod>2022-04-21T10:12:53Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616700561-A10-Cryptography</loc>
  <lastmod>2022-04-21T10:11:19Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616707857-A13-Communications-Security</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616737937-A16-Information-Security-Incident-Management</loc>
  <lastmod>2021-12-07T10:29:40Z</lastmod>
</url>
<url>
  <loc>https://security.deselect.com/hc/en-us/categories/4406616743185-A17-Information-Security-Aspects-of-Business-Continuity</loc>
  <lastmod>2021-09-04T15:32:33Z</lastmod>
</url>
</urlset>
