Eye-Able IT- en databeveiliging
Informatie over het veilige gebruik van Eye-Able, de bescherming van gevoelige gegevens, en richtlijnen en maatregelen op het gebied van IT-beveiliging en gegevensbescherming
IT Security
- Wie werden Sicherheitsrisiken gesteuert?
- Are Monitoring Capabilities Built Into the Architecture?
- Are Audit and Assurance Policies Reviewed Regularly?
- Does Eye-Able Use SSL or TLS Encryption?
- Is Business Continuity and Operational Resilience Documentation Reviewed Periodically?
- Are Application Security Policies and Procedures Reviewed Regularly?
- Do You Have Business Continuity and Disaster Recovery Plans?
- How Often Is Eye-Able Tested for Security Vulnerabilities?
- How Can I Ensure That Eye-Able Does Not Create Security Vulnerabilities?
- Do you process data subject requests free of charge unless requests are manifestly unfounded or excessive?
Dataveiligheid
- Does Eye-Able Have a Data Protection Officer?
- What Is the Competent Supervisory Authority for Eye-Able?
- What Are the Meanings of “Personal Data”, “Processing”, “Controller”, etc.?
- Does Eye-Able have a Privacy Policy?
- Does Eye-Able share any data with its subsidiaries?
- What are the subsidiaries of Eye-Able?
- Can I revoke my consent to your Newsletter?
- Does Eye-Able conduct a Data Protection Impact Assessment (DPIA)?
- Are processes, procedures, and technical measures defined, implemented, and evaluated at Eye-Able?
- Are requirements for non-disclosure/confidentiality agreements identified, documented, and reviewed at planned intervals by Eye-Able?
- What legal obligations do I have as a website owner regarding accessibility?