The current technical and organisational measures of Fidectus are defined in the following sections. The measures are based on the policies of Fidectus' ISO27001-certified Information Security Management System (ISMS). Fidectus may change these measures at any time without prior notice as long as a comparable or higher level of security is maintained. Individual measures may be replaced by new measures that fulfil the same purpose without reducing the security level for the protection of personal data.
1. ACCESS CONTROL
Unauthorised persons are denied physical access to facilities, buildings and premises in which data processing systems that process or use personal data are located.
1.1. Measures
1.1.1. Fidectus protects buildings with appropriate measures.
1.1.2. Buildings are generally secured by access control systems (e.g. access by chip card).
1.1.3. As a minimum requirement, the external entrances to a building must be equipped with a locking system, including a key management system.
1.1.4. Depending on the security classification, buildings, individual areas and the surrounding grounds may be protected by additional measures. These include special access profiles, video surveillance, intruder alarm systems and biometric access control systems.
1.1.5. Access rights are assigned to authorised persons on an individual basis in accordance with the measures for system and data access control (see sections 1.2 and 1.3 below). This also applies to the access of visitors. Guests and visitors to Fidectus buildings must register by name and be accompanied by authorised Fidectus personnel.
1.1.6. Fidectus personnel and external personnel must wear their company ID/access card at all Fidectus locations.
1.2. Additional measures for data centres
1.2.1. Strict security measures apply to all data centres, which are supported by security personnel, surveillance cameras, motion detectors and access control mechanisms, among other things, to protect data centre systems and facilities from unauthorised access. Only authorised persons have access to the systems and infrastructure of the data centres. Security devices (motion sensors, cameras, etc.) are serviced at regular intervals to ensure that they function properly.
1.2.2. Fidectus and all data centres operated by third parties log the names and times of authorised persons who enter the non-public areas of Fidectus within the data centres.
|