Privacy Policy

  • Access Limitation: Access to data is only granted to individuals who need it to perform their tasks.
  • Encryption: Data is transferred and stored in encrypted format, especially the most sensitive information.
  • Firewalls: Installed to prevent unauthorized access.
  • Monitoring: Access to computer systems is monitored to detect and prevent misuse of data.
  • Data Minimization: Only the strictly necessary data is requested.
  • Retention Period Limitation: Data is not retained longer than necessary.
  • Integrity and Confidentiality: Strict measures are taken to prevent unauthorized access or misuse of data.
Scroll to Top