Safety and procedures according to international standards
Hos GSMCLoud we take Data protection and GDPR seriously. Our platform is designed to ensure that all personal data is processed in accordance with EU GDPR ruleswhich includes Encrypted data transmission, secure storage methods and access control.
We collect only the necessary data and store it securely in ISO certified data centres with restricted access. Our customers have full control over their data and we guarantee transparency in processing. With our GSMCloud you get a Secure and compliant solutionthat protects your information.
With the implementation of NIS2 Directive cybersecurity and operational stability of critical infrastructure are becoming more demanding. GSMCloud Ensure organisations meet these requirements through advanced security measures, including Encrypted data transmission, redundant systems and continuous monitoring.
Our IIoT solutions is designed with robustness and compliance in mind, so organisations can confidently integrate cloud-based management and monitoring without compromising data security. With the GSMCloud you get a future-proof platformthat supports NIS2 requirements and strengthens your digital security.
To ensure full transparency and compliance with GDPR, GSMCloud ApS enters into a Data Processing Agreement (DPA) with all customers. The agreement describes how we process personal data on your behalf in connection with the operation of the GSMCloud platform.
What does the DPA cover?
Purpose, basis for processing and duration (GDPR Art. 28)
Data types and categories of data subjects
Technical and organisational safety measures (Annex C)
Subcontractors/sub-processors (Annex B)
Transfers outside the EU/EEA and mechanisms used
Here's how you do it
To ensure secure communication, all data transfer between the user's devices and our platform is protected with HTTPS (Hypertext Transfer Protocol Secure). This means that all data is encrypted, preventing unauthorised access and interception of sensitive information
We keep comprehensive logs of all user requests and interactions with our platform. These logs are kept for 14 days, which helps us track and analyse user activity, troubleshoot issues and investigate security incidents.
Our security team constantly monitors traffic on our platform. When abnormal or suspicious activity is detected, our automated systems trigger alerts and our experts respond immediately.
All databases and storage systems operate in a private network and are only accessible to the necessary servers. This ensures protection against unauthorised access.
We ensure data integrity by taking daily backups that are encrypted and stored in multiple geographically separated data centres to guarantee data availability during unforeseen incidents.
All communication between our storage servers, including backups, is secured with SSL (Secure Sockets Layer) encryption, preventing eavesdropping during transfer.
We use advanced security measures to prevent brute-force attacks and DDoS attacks by analysing traffic, limiting access speeds and implementing effective access controls.
We are happy that these companies use us
Our telecoms provider uses comprehensive network security measures such as firewall configurations, intrusion detection and prevention systems (IDS/IPS).
All data sent between services and the user's devices is protected with encryption protocols such as TLS (Transport Layer Security).
To prevent unauthorised access, our provider uses strict access controls including user authentication, rights management and constant monitoring
The provider has redundant systems and data centres to ensure high uptime, even in the event of hardware failure or other unforeseen incidents.
Our telecoms provider has a well-defined process for rapid identification and remediation of security incidents.
The Provider ensures compliance with relevant security and data protection regulations to guarantee the lawful processing of user data.
Regular penetration tests are conducted to detect and close security gaps before they can be exploited by malicious actors.
IIoT reduces waste by intelligently controlling machines and processes
Optimised maintenance reduces material consumption and waste
Smarter operation lowers energy consumption and reduces environmental impact
Our hardware automatically reboots if the connection is lost or data is not received within the correct time frame, ensuring maximum uptime.
If there is no connection to the preferred provider, the hardware will automatically search for a new connection to ensure faster reconnection.
Data from our hardware is protected by a VPN tunnel via OpenVPN, ensuring that data cannot be intercepted, copied or redirected.
All data is validated with checksums to ensure it arrives correctly and without errors.
Our hardware immediately sends an alert to the server in the event of a power failure, so the system is always updated on the status of the device.
The hardware sends several short pulses per second to the input to ensure accurate status detection.