Data Protection Policy
Progress of corrections of results identified by vulnerability analyses and penetration tests
We have a runbook for detecting and correcting vulnerabilities. We are able to protect against technical hardware vulnerabilities containing PII by performing vulnerability analyses and making appropriate fixes.
We perform vulnerability analysis and penetration testing every 180 days, and perform code analysis to detect vulnerabilities before the release of each version.
We control changes to storage hardware by testing, verifying and approving all changes and by restricting access to those who can perform such actions.