Founded in 2025

|
|

Compliances

Compliance Logo

ISO 27001 v2022

Compliant

Compliance Logo

GDPR

Compliant

Controls

Continuously monitored

Data security

Termination of Employment

Multi-factor Authentication

Encrypting Data At Rest

Network security

Limit Network Connections

External System Connections

Transmission Confidentiality

App security

Conspicuous Link To Privacy Notice

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Acceptable Usage Policy

Policy

Business Continuity Plan

Policy

Access Control Procedure

Policy

Business Continuity & Disaster Recovery Policy

Policy

Compliance Policy

Policy

Asset Management Procedure

Policy