Eye-Able® IT-Security/Data Security
Information about the safe use of Eye-Able®, the protection of sensitive data, and guidelines and measures for IT security and data protection
- Are direct requests sent to third-party servers when using Eye-Able® Translate or Plain Language?
- How do I conclude an Data Processing Agreement (DPA)?
- How is personal data processed?
- Does Eye-Able support SSO integration?
- Where is the data stored (Germany, EU, secure third countries)?
- How is data backup handled at Eye-Able®?
- Do I have the right to correct and delete my data?
- What technical and organizational security features are integrated into Eye-Able®?
- How Is the Stability and Security of Your Data Ensured?
- Can I Integrate Every Type of Eye-Able® Software Locally on My Server?
- Must the use of Eye-Able® software be mentioned in the privacy policy?
- Does Eye-Able® use Google Fonts?
- Welche technisch organisatorischen Maßnahmen (TOM) unternimmt Eye-Able® zum Datenschutz?
- Is collected data used or processed elsewhere?
- Where will my data be processed?
- Is there a template for the data protection information for users?
- Does Eye-Able Assist Track User Data?
- What data is processed by Eye-Able® Assist, Audit and Report?
- Are there any privacy concerns about using link words instead of full links?
- Is the security of my data ensured through technical and organizational measures?
- How does Eye-Able® ensure that personal and sensitive data are legally protected and processed?
- Which guideliens, procedures and checks has Eye-Able® implemented?
- What measures has Eye-Able® implemented to ensure safe use?
- How does Eye-Able® ensure business continuity and operational resilience?
- How does Eye-Able® ensure that changes to systems, applications, infrastructure, and configurations are controlled and risk-based?
- How does Eye-Able® ensure that information governance, risk management, and security programs are structured and compliant?
- How does Eye-Able® ensure the physical security of IT systems, data, and infrastructure?
- How does Eye-Able® ensure that encryption mechanisms and cryptographic keys are securely managed?
- How does Eye-Able® ensure that employees, external service providers, and other authorized individuals handle information and IT resources responsibly?
- How does Eye-Able® ensure that access to IT systems, data, and applications is securely managed?