Our answers to 11 security questions as set out by the Danish government’s Agency on Digitization:
Where is the company’s data physically located?
- Data Breach Procedures
- Data Breach Notification Procedures
- Data Breach Log
- If you lose your work computer but it is password protected, it is probably unlikely to pose a big risk. However, this depends of what kind of data you have how much, where you lost it etc.
- If your organization is hacked and all your data is stolen, there is no doubt you must inform the competent supervisory authority as well as the people involved.
- If you have a break-in at the office and your hard-drives with sensitive data are stolen, there is no doubt you must inform the competent supervisory authority unless everything is thoroughly encrypted and doesn’t pose a risk for the involved.
User controls access
The user chooses which files DataMapper can access and retains full control to manage data access over time.
Data encrypted at rest
Azure private blob storage encrypted at rest with Azure managed AES 256 bit keys