Data protection

Data protection is very important to us. Not only because we are affected ourselves and because we are fed up with the daily horror reports. Just like accessibility, we place data protection at the very beginning of every project. What data do we collect, how long do we have to keep it, how do we protect ourselves? Privacy by design is a building block on the road to success. Intelligent solutions based on free software on servers located in Germany are another. Regular audits of the architecture and implementation are also part of this.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

With simple opt-in, you can register with any address, including third-party information. Data protection requires a second confirmation.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Outsourcing leads to the transfer of personal data to third parties. A contract between the client and the external service provider must safeguard this.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Despite many reports of hacked credentials, most users protect their accounts only half-heartedly. How does password security work?

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Sloppy password management encourages hacker attacks and can be punishable by law. A data protection impact assessment mitigates the risks.

Author
Profile picture for user DeepL
Profile picture for user luckow

Stephan Luckow

The open source software Mautic convinces with highly qualified audience intelligence (target group analysis) - without passing on the data to third parties.

Author
Profile picture for user DeepL

Secure (socket) shell enables encrypted connections within the network. We use certificates for authentication and authorisation.

Author
Profile picture for user DeepL

Encryption with GnuPG (GNU Privacy Guard) and PGP (Pretty Good Privacy) is only secure if the tools are configured and used correctly.

Author
Profile picture for user DeepL
Profile picture for user luckow

Stephan Luckow

Projects with NDA require caution in the choice of software, because Google or Microsoft services, for example, have their own privacy terms.