Eye-Able IT-Security/Data Security
Information about the safe use of Eye-Able, the protection of sensitive data, and guidelines and measures for IT security and data protection
IT Security
- How is data backup handled at Eye-Able®?
- Which guidelins, procedures and checks has Eye-Able implemented?
- How does Eye-Able® ensure business continuity and operational resilience?
- How does Eye-Able® ensure the physical security of IT systems, data, and infrastructure?
- How does Eye-Able® ensure that information governance, risk management, and security programs are structured and compliant?
- How does Eye-Able® ensure that changes to systems, applications, infrastructure, and configurations are controlled and risk-based?
- How does Eye-Able® ensure that encryption mechanisms and cryptographic keys are securely managed?
- How does Eye-Able® ensure that employees, external service providers, and other authorized individuals handle information and IT resources responsibly?
- How does Eye-Able® ensure that access to IT systems, data, and applications is securely managed?
- Can I Integrate Every Type of Eye-Able® Software Locally on My Server?
- How Do You Govern Security Risks?
- Are Monitoring Capabilities Built Into the Architecture?
- Are Audit and Assurance Policies Reviewed Regularly?
- Does Eye-Able Use SSL or TLS Encryption?
- Is Business Continuity and Operational Resilience Documentation Reviewed Periodically?
- Are Application Security Policies and Procedures Reviewed Regularly?
- Do You Have Business Continuity and Disaster Recovery Plans?
- How Often Is Eye-Able Tested for Security Vulnerabilities?
- How Can I Ensure That Eye-Able Does Not Create Security Vulnerabilities?
- Do you process data subject requests free of charge unless requests are manifestly unfounded or excessive?
Data Protection
- Are direct requests sent to third-party servers when using Eye-Able® Translate or Plain Language?
- How do I conclude an Data Processing Agreement (DPA)?
- Does Eye-Able support SSO integration?
- Are there any privacy concerns about using link words instead of full links?
- Where is the data stored (Germany, EU, secure third countries)?
- Must the use of Eye-Able® software be mentioned in the privacy policy?
- Does Eye-Able Assist Track User Data?
- What measures has Eye-Able® implemented to ensure safe use?
- Which cryptographic keys does Eye-Able use?
- Can the User Numbers of Eye-Able Website Tools Be Tracked? (Assist, Simple Language, Translate)
- Who is responsible for complying with data protection regulations – Eye-Able or me as the website owner?
- Does Eye-Able Have a Data Protection Officer?
- What Is the Competent Supervisory Authority for Eye-Able?
- What Are the Meanings of “Personal Data”, “Processing”, “Controller”, etc.?
- Does Eye-Able have a Privacy Policy?
- Does Eye-Able share any data with its subsidiaries?
- What are the subsidiaries of Eye-Able?
- Can I revoke my consent to your Newsletter?
- Does Eye-Able conduct a Data Protection Impact Assessment (DPIA)?
- Are processes, procedures, and technical measures defined, implemented, and evaluated at Eye-Able?
- Are requirements for non-disclosure/confidentiality agreements identified, documented, and reviewed at planned intervals by Eye-Able?
- What legal obligations do I have as a website owner regarding accessibility?
- How can I configure Eye-Able to minimize data use?
Technical and Organizational Measures (TOMs)
- What technical and organisational measures (TOM) does Eye-Able® take to protect data?
- What technical and organizational security features are integrated into Eye-Able®?
- Is the security of my data ensured through technical and organizational measures?
- How Is the Stability and Security of Your Data Ensured?
- Do you transfer data to third parties? – What is the storage period?
- Are all employees of Eye-Able granted access to sensitive organizational and personal data with appropriate security awareness training?
- Are all employees of Eye-Able provided with regular updates in procedures, processes, and policies relating to their professional function?
- Do you regularly review and reconcile access rights?
- Do you conduct regular security awareness training for employees?
- Do you enforce least-privilege access to personal data?
- Are systems, products, and business practices of Eye-Able based on security principles by design and per industry best practices?
Data Subject
- Where will my data be processed?
- Is there a template for the data protection information for users?
- What data is processed by Eye-Able Assist, Audit and Report?
- How is personal data processed?
- How does Eye-Able® ensure that personal and sensitive data are legally protected and processed?
- Do I have the right to correct and delete my data?
- Is collected data used or processed elsewhere?
- What happens if users do not accept cookies?
- Are usage data anonymized or pseudonymized?
- Do you support data portability requests in a structured, commonly used, machine-readable format? Overview Yes, Eye-Able supports data portability requests in a structured, commonly used, and machine-readable format.
- Do you verify the identity of requesters before fulfilling data subject requests?
- Do you erase personal data from backups within a defined period?
- Can users request erasure of their personal data?