Protecting the security of your information is a top priority for us. Here are the steps we take to enhance security:
- Two-Step Verification and/or SSO: We utilise 2-step verification and/or Single Sign-On (SSO) (depending on the tool) across our employed tools, adding an extra layer of protection to ensure the integrity of your information.
- Trusted Tools for Data Storage: We exclusively rely on highly trusted tools to store personal data, ensuring that your information is securely maintained within reliable platforms (see above).
- Limited Access to Personal Data: Access to any personal data we may store is strictly limited to a small number of authorized personnel. This restricted access minimizes the risk of unauthorized disclosure or misuse.
- Proper Backups: We understand the importance of data integrity and disaster recovery. To mitigate the risk of data loss, we regularly perform proper backups of our systems and databases. This enables us to restore data in the event of unforeseen incidents, ensuring the continuity and availability of your information.
By implementing these measures, including two-step verification, trusted tools for data storage, limited access to personal data, and proper backups, we aim to maintain the security and confidentiality of your information, protecting it from unauthorized access, loss, or misuse. Please remember that while we implement these security measures, it is essential for you to be cautious when transmitting your information.
We employ reasonable security measures to safeguard against the loss, misuse, or unauthorized alteration of your information within our control. While we strive to maintain a high level of security, it is important to acknowledge that no system is entirely immune to risks. Therefore, we cannot guarantee absolute security and, as a result, we cannot ensure or warrant the security of any information you transmit to us. By providing your information, you accept this inherent risk.