Sécurité informatique Eye-Able
Informations relatives à l'utilisation sécurisée d'Eye-Able, à la protection des données sensibles, ainsi qu'aux directives et mesures en matière de sécurité informatique et de protection des données
IT Security
- How Do You Govern Security Risks?
- Are Monitoring Capabilities Built Into the Architecture?
- Are Audit and Assurance Policies Reviewed Regularly?
- Does Eye-Able Use SSL or TLS Encryption?
- Is Business Continuity and Operational Resilience Documentation Reviewed Periodically?
- Are Application Security Policies and Procedures Reviewed Regularly?
- Do You Have Business Continuity and Disaster Recovery Plans?
- Wie oft wird Eye-Able auf Sicherheitslücken getestet?
- How Can I Ensure That Eye-Able Does Not Create Security Vulnerabilities?
- Do you process data subject requests free of charge unless requests are manifestly unfounded or excessive?
Sécurité des données
- Does Eye-Able Have a Data Protection Officer?
- What Is the Competent Supervisory Authority for Eye-Able?
- What Are the Meanings of “Personal Data”, “Processing”, “Controller”, etc.?
- Does Eye-Able have a Privacy Policy?
- Does Eye-Able share any data with its subsidiaries?
- What are the subsidiaries of Eye-Able?
- Can I revoke my consent to your Newsletter?
- Does Eye-Able conduct a Data Protection Impact Assessment (DPIA)?
- Are processes, procedures, and technical measures defined, implemented, and evaluated at Eye-Able?
- Are requirements for non-disclosure/confidentiality agreements identified, documented, and reviewed at planned intervals by Eye-Able?
- What legal obligations do I have as a website owner regarding accessibility?
- How can I configure Eye-Able to minimize data use?
- Who is responsible for complying with data protection regulations – Eye-Able or me as the website owner?
Technical and Organizational Measures (TOMs)
- Are all employees of Eye-Able granted access to sensitive organizational and personal data with appropriate security awareness training?
- Are all employees of Eye-Able provided with regular updates in procedures, processes, and policies relating to their professional function?
- Do you regularly review and reconcile access rights?
- Do you conduct regular security awareness training for employees?
- Do you enforce least-privilege access to personal data?
- Are systems, products, and business practices of Eye-Able based on security principles by design and per industry best practices?
Data Subject
- What happens if users do not accept cookies?
- Are usage data anonymized or pseudonymized?
- Do you support data portability requests in a structured, commonly used, machine-readable format?
- Do you verify the identity of requesters before fulfilling data subject requests?
- Do you erase personal data from backups within a defined period?
- Can users request erasure of their personal data?