• Secure network and systems: Firewall configurations protect the data.
  • Network segmentation: No direct Internet access to data storage (DMZ).
  • Logical access control: Access requires asymmetrical key pairs protected by strong passwords.
  • Encrypted transmission: All data sent over the Internet is encrypted using TLS.
  • Audit trail and logging: All user actions are logged.
  • Physical access control: Physical access is controlled and monitored.
  • Organisational measures: Access to data is limited and defined by need to know.

CONTACT US

©2019 ChartsBeds

Log in with your credentials

Forgot your details?