Version 1.1
Version 1.1
To ensure secure communication, all data transfer between the user's devices and our platform is protected with HTTPS (Hypertext Transfer Protocol Secure). This means that all data is encrypted, preventing unauthorised access and interception of sensitive information.
We keep comprehensive logs of all user requests and interactions with our platform. These logs are kept for 14 days, which helps us track and analyse user activity, troubleshoot issues and investigate security incidents.
Our security team constantly monitors traffic on our platform. When abnormal or suspicious activity is detected, our automated systems trigger alerts and our experts respond immediately.
All databases and storage systems operate in a private network and are only accessible to the necessary servers. This ensures protection against unauthorised access.
We ensure data integrity by taking daily backups that are encrypted and stored in multiple geographically separated data centres to guarantee data availability during unforeseen incidents.
All communication between our storage servers, including backups, is secured with SSL (Secure Sockets Layer) encryption, preventing eavesdropping during transfer.
We use advanced security measures to prevent brute-force attacks and DDoS attacks by analysing traffic, limiting access speeds and implementing effective access controls.
Our telecoms provider uses comprehensive network security measures such as firewall configurations, intrusion detection and prevention systems (IDS/IPS).
All data sent between services and the user's devices is protected with encryption protocols such as TLS (Transport Layer Security).
To prevent unauthorised access, our provider uses strict access controls, including user authentication, rights management and constant monitoring.
The provider has redundant systems and data centres to ensure high uptime, even in the event of hardware failure or other unforeseen incidents.
Our telecoms provider has a well-defined process for rapid identification and remediation of security incidents.
The Provider ensures compliance with relevant security and data protection regulations to guarantee the lawful processing of user data.
Regular penetration tests are conducted to detect and close security gaps before they can be exploited by malicious actors.
Our hardware automatically reboots if the connection is lost or data is not received within the correct time frame, ensuring maximum uptime.
If there is no connection to the preferred provider, the hardware will automatically search for a new connection to ensure faster reconnection.
Data from our hardware is protected by a VPN tunnel via OpenVPN, ensuring that data cannot be intercepted, copied or redirected.
All data is validated with checksums to ensure it arrives correctly and without errors.
Our hardware immediately sends an alert to the server in the event of a power failure, so the system is always updated on the status of the device.
The hardware sends several short pulses per second to the input to ensure accurate status detection.