Security Statement

Security Statement

DearBytesSecurity Statement

Our aim is to secure your information, in whatever form, by taking adequate technical and organizational measures against loss or any form of unlawful processing of your information.

Whenever you make use of our services, you can rely on the DearBytes promise that the security of your information has the highest priority.

For our internal organization and network, the following applies:

  • Risks and threats at DearBytes are assessed and managed;
  • DearBytes is compliant with laws and regulations;
  • Several audits are performed annually;
  • Your data is safely stored and protected against theft, fire, hardware failures and software errors;
  • All sensitive data is sent over the Internet through an encrypted connection;
  • Our servers are located in highly secure office environments and data centers with 24/7 security and numerous precautions with respect to anti-burglary, equipment failures, and power outages.
  • Our data center is ISO 27001, ISO 9001, ISO 14001, OHSAS 18001, ISO 50001, SOC 1 Type II, SOC 2 Type II and PCI-DSS certified;
  • Your data is protected against threats from the outside world by firewalls and other security measures;
  • All our employees are screened;
  • DearBytes is in contact with (inter) national authorities like the National Cyber Security Center to remain constantly informed about new and existing threats.

DearBytes has documented its objectives for information security (availability, confidentiality and continuity) in an information security policy / framework in accordance with the International Code for Information Security `ISO27001:2013`, for which DearBytes is certified.

Based on our Information Security Management System standards and guidelines as well as technical and organizational measures are designed to achieve our security goals.

The quality and compliance of these measures and the process for information security is assessed annually by independent auditors. Further information on the security policies and the standards used by DearBytes can be obtained via our security officer.