Multi-factor Authentication
Customisable Password Policies
Restricted Access
Logging
Encryption
Sanitisation and Verification
Ports
SSL
Headers
Firewall
Encryption
Management
Backend
RPO
< 24 hours (to be restored within business hours)
What information we collect?
Limitation
Data Protection by Design and by Default
Encrypt, pseudonymize, or anonymize personal data wherever possible.
Create an internal security policy for your team members, and build awareness about data protection.
Know when to conduct a data protection impact assessment, and have a process in place to carry it out.
Have a process in place to notify the authorities and your data subjects in the event of a data breach.
Designate someone responsible for ensuring GDPR compliance across your organization.
Does Synnch sign a data processing agreement between your organization and any third parties that process personal data on your behalf?
If your organization is outside the EU, appoint a representative within one of the EU member states.
Appoint a Data Protection Officer (if necessary)
It's easy for your customers to request and receive all the information you have about them.
It's easy for your customers to correct or update inaccurate or incomplete information.
It's easy for your customers to request to have their personal data deleted.
It's easy for your customers to ask you to stop processing their data.
It's easy for your customers to request and receive all the information you have about them.
It's easy for your customers to receive a copy of their personal data in a format that can be easily transferred to another company.
If you make decisions about people based on automated processes, you have a procedure to protect their rights.
Open and transparent management of personal information
Anonymity and pseudonymity
Collection of solicited personal information
Dealing with unsolicited personal information
Notification of the collection of personal information
Use or disclosure of personal information
Direct marketing
Cross-border disclosure of personal information
Adoption, use or disclosure of government related identifiers
Quality of personal information
Security of personal information
Access to personal information
Correction of personal information
Our role and responsibilities