Trust Center

Data protection

Information Security

  • ISO 27001 Certificate
  • Information Security Policy
  • Information Security and Data Protection

Controls

  • Organizational measures
  • Technical measures

ISO 27001 Certificate

Information Security Policy

Information Security and Data Protection

CONTROL

STATUS

Information Security Policies

We maintain a full set of internal security policies, reviewed at least once a year. These policies guide how we manage access, data classification, encryption, and risk.

Roles & Responsibilities

Security is everyone’s responsibility. Roles are clearly defined and tracked in our internal ISO 27001 system. A DPO and CISO oversee compliance and work with external associations and authorities when needed.

Access Control

We apply strict access controls: least privilege, secure onboarding/offboarding, MFA, and regular reviews of user rights.

Awareness & Training

We apply strict access controls: least privilege, secure onboarding/offboarding, MFA, and regular reviews of user rights.

Remote Work

Staff work on secured CloudPC environments, fully isolated from personal devices. Remote work is only allowed from pre-approved locations.

Encryption

Data is encrypted in transit and at rest using industry-standard protocols (TLS, IPSec, AES).

Asset & Information Management

All data is classified, managed and governed by a paperless policy.

Incident Management

We have a clear process for reporting and handling incidents, reviewed regularly and tested when needed.

Business Continuity

We aim for 99.7% uptime and have a tested Business Continuity Plan, including data backups and recovery procedures.

Third-Party Security

Suppliers must meet strong security standards. We prefer ISO 27001-certified partners and apply strict due diligence.

Compliance

We comply with all applicable data protection laws in Swiss and EU data protection laws (FADP & GDPR) and are continuously improving through audits and external reviews.

Penetration testing performed

A Pentest is performed at least annually. A remediation plan is developed, and changes are implemented to remediate vulnerabilities.

By submitting this form, you agree that your personal data will be processed in accordance with our Privacy Policy
Durch das Absenden dieses Formulars erklären Sie sich damit einverstanden, dass Ihre personenbezogenen Daten gemäß unserer Datenschutzerklärung verarbeitet werden.
En soumettant ce formulaire, vous acceptez que vos données personnelles soient traitées conformément à notre Politique de confidentialité.