Version 1.1
Version 1.1
To ensure secure communication, all data transmission between the user's devices and our platform is protected with HTTPS (Hypertext Transfer Protocol Secure). This means that all data is encrypted, preventing unauthorized access and interception of sensitive information.
We keep extensive logs of all user queries and interactions with our platform. These logs are retained for 14 days, which helps us track and analyze user activity, troubleshoot issues, and investigate security incidents.
Our security team constantly monitors traffic on our platform. When detecting abnormal or suspicious activity, our automated systems trigger alerts and our experts respond immediately.
All databases and storage systems operate in a private network and are only accessible to the necessary servers, ensuring protection against unauthorized access.
We ensure data integrity by taking daily backups, which are encrypted and stored in multiple geographically separated data centers to guarantee data availability during unforeseen events.
All communication between our storage servers, including backups, is secured with SSL (Secure Sockets Layer) encryption, preventing eavesdropping during transfer.
We employ advanced security measures to prevent brute-force and DDoS attacks by analyzing traffic, limiting access speeds, and implementing effective access controls.
Our telecommunications provider uses comprehensive network security measures such as firewall configurations, intrusion detection and prevention systems (IDS/IPS).
All data sent between services and user devices is protected with encryption protocols such as TLS (Transport Layer Security).
To prevent unauthorized access, our provider uses strict access controls, including user authentication, rights management, and constant monitoring.
The provider has redundant systems and data centers to ensure high uptime, even in the event of hardware failures or other unforeseen events.
Our telecommunications provider has a well-defined process for quickly identifying and remediating security incidents.
The provider ensures compliance with relevant security and data protection regulations to guarantee the lawful processing of user data.
Regular penetration tests are conducted to discover and close security holes before they can be exploited by malicious actors.
Our hardware automatically restarts if the connection is lost or if data is not received within the correct time frame, ensuring maximum uptime.
If there is no connection to the preferred provider, the hardware automatically searches for a new connection to ensure faster reconnection.
Data from our hardware is protected by a VPN tunnel via OpenVPN, ensuring that data cannot be intercepted, copied or redirected.
All data is validated with checksums to ensure it arrives correctly and without errors.
Our hardware immediately sends an alert to the server in the event of a power failure, so the system is always up to date on the device's status.
The hardware sends multiple short pulses per second to the input to ensure accurate status detection.
+45 93 10 24 34