We believe that business relationships are built on trust and have been striving to be worthy of that trust from the day we launched our company. We have implemented security by design since our founding, and even opted to have our security audited by an external company even before we thought of any security certification
We approached privacy in a similar way, designing automated process to remove unneeded personal information, long before we’d ever heard of the term GDPR (actually even before the draft was published).
As a security vendor built by security professionals, we know what customers expect and have built our infrastructure to meet the needs of any security conscious customer. In implementing our GDPR compliance program, we have appointed an internal Data Protection Officer (DPO) (in accordance with Art. 37 of the Regulation (EU) 2016/679 (“GDPR”): who can assist with any GDPR-related questions or concerns.
Maya Rozenshein, Adv.
5 Rav-Ashi St., Tel Aviv 6939539, Israel
Rickert Rechtsanwaltsgesellschaft mbH,
Kaiserplatz 7-9, 53113 Bonn, Germany
We know how important compliance is to our customers. Catering to some of the world’s most notable brands means that our customers may have their own internal compliance teams, and as their providers we are a critical part of these efforts.
With that in mind, we view compliance as a vehicle toward a better world and see legal and regulatory frameworks as a compass to guide us in that direction.
When we set out on our journey toward GDPR compliance, our team quickly identified many of the outlined processes that we had previously implemented, such as security by design and privacy by design.
As a data processor, we have nominated an internal Data Protection Officer who oversees our processing activities from the perspective of personal information protection.
That process highlighted how mature our company is in terms of advanced security measures; as a result, we began our ISO certification process, leading us toward attaining ISO 27001 – which certifies that we have an operational Information Security Management System.
As a company that takes security very seriously, we recognize that our internal actions have implications for our customers–and as such, they are important to you. While we’re naturally unable reveal everything here, as we would not want to inadvertently assist any malicious actors. So below, we’ll share some insights on how we maintain our security posture:
For more information, you can contact our security team at security[at]cybeready.com.