
Yancho Yanchev
Articles
Recent activity by Yancho Yanchev
-
What are Remote’s Key Data & Security policies?
Remote has the following policies: Information Security Access Control & Termination policy Acceptable Use policy Business Continuity & Disaster Recovery plan Change Management policy Configuratio...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
How does Remote protect data in transit?
Remote is a Software-as-a-Service application available through the Internet. Access to the application happens over HTTPS (HTTP over TLS). We enforce the usage of recent versions of the TLS protoc...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
How does Remote protect data at rest ?
Remote protects data at rest by encrypting it with strong cipher suites. Applicational user data is stored in a database encrypted at rest using the AES-256 encryption algorithm, employing the usag...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Has Remote encountered any Cyber security incidents in last 3-5 Years?
No, Remote has not encountered any material cyber security incidents since its inception.
- Updated
- 1 follower
- 0 comments
- 0 votes
-
What are the technical and organizational measures (TOMs) implemented to comply with data protection obligations?
To comply with data protection obligations, we ensure continuous credentials auditing and management. Physical access to our IT infrastructure is controlled and managed by AWS & Electronic access i...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Does Remote conduct security & awareness training for its employees?
Remote has a security awareness training program in place to promote the understanding of security policies and procedures. All internal team members are required to undergo training within their f...
- Updated
- 1 follower
- 0 comments
- 1 vote
-
How does Remote manage clients' financial data?
Remote processes financial information that identifies an individual's financial account or an individual's remuneration. E.g. Bank accounts, salary, benefits. Such information is treated as confid...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Does Remote have Data Loss Prevention in place ?
Yes, we use Google DLP for Drive. Please read more here
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Does Remote allow third party audits on security?
Yes, Remote undergoes external audits as part of our SOC2 Type 2 (last certified: February 3, 2022) and ISO27001:2013 (last certified: January 17, 2023) attestations. Additionally, Remote has also ...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Types of data processing at Remote
Remote's role for data processing purposes is defined in accordance with Remote’s actual processing activities (Source - page 9, paragraph 12). In line with the WEC Guidelines on “Independent Contr...
- Updated
- 1 follower
- 0 comments
- 1 vote