Loading...

Our commitments

Our missions

We are aware that the GDPR project can be difficult to implement in the professional field because all companies store digital data, sometimes online in clouds or dedicated applications. We work daily on transparency relating to the processing of your data.

Best practices

Since the General Data Protection Regulation (GDPR) was implemented on May 25, 2018, you are responsible for the personal data you process using our applications. As a processor, we have taken all measures to comply with the GDPR and ensure maximum protection of the data you ask us to process. Below are some tips to check whether your daily practices guarantee the security of your customers' personal data.

1. Adopt a strong password policy

We strongly recommend that you choose a strong password, at least 8 characters long and including a combination of lowercase letters, uppercase letters and special characters. It is also important to change your password regularly to reduce the risk of hacking. Also, avoid writing it down on paper, so that it is not easily accessible to others. Finally, do not save it on your Internet browser, as this method would make your password vulnerable, by making it readable in plain text in the browser settings.

2. Update your IT environment

It is also essential to automate or regularly update your software: operating system, Internet browser, anti-virus, etc. Old versions of this software contain sometimes significant security flaws that malicious people could try to exploit..

3. Manage access to your computers/tablets/phones

Using a password when opening your device is recommended to limit access to your data of course. We also advise you to set your devices so that they lock automatically after a period of inactivity that you choose.

4. Correctly configure your application space

To ensure the security of your data, it is important to regularly review who has access to it from your dashboard in the application area. Do not hesitate to delete unknown users or old accounts that no longer require access. While these measures may seem restrictive, they are essential to ensure responsible protection of your information. If you have any questions or concerns, the technical support team, trained in security issues, is available to provide you with the necessary assistance.