In order to protect the personal data you handle on behalf of your customers, you need to know exactly what data is processed, who has access to it and where it is located. You also need to know what security and compliance measures are in place.
Using our relocation platform, you will be able to answer all those questions. And sleep well, again.
Your trust in the security of our systems, application and your data is of utmost concern to us. We dedicate significant time and resources to building the right technology solutions and safeguarding against known security vulnerabilities of cloud-based software.
This covers the physical and environmental security of servers and data centers, as well as technical security of the network, resources and systems. We work with trusted service partners to provide enterprise-level security to host and maintain our servers, data storage and related technology services.
Our partners’ hosting environment and data centers include these accreditations:
Securing the application layer is a serious commitment and can be achieved, among others, through:
In addition to utilizing a secure hosting environment, the data itself should be protected through encryption. Personal data processed and stored on our platform is encrypted with TLS/SSL protocols when in transit and block-level storage encryption when at rest.
We have always held strong believes that personal data should be kept private and used only for the specific purposes for which it was collected. That has been part of our software development philosophy from the beginning. As such, we happily embraced the ‘Privacy by Design’ principles advocated by the GDPR.
While we adhere to various international data privacy regulations, with the GDPR having emerged as the global standard, we have adopted the same global approach on our platform. You will benefit from several tools and features available on the platform to help you towards your own GDPR compliance.
Beyond ensuring that our core hosting partners are ISO 27001 certified, we have adopted many ISO 27001 principles as part of our own software development lifecycle and day-to-day operations.
In addition to our security and compliance measures mentioned above, these include the following policies and practices: