LogoLogo
LoginGo to website
English
  • Plattform
  • API
English
  • Getting started
    • First steps
    • Login
  • Navigation
    • Sidebar
    • Path navigation
    • Home
    • Resources
  • Account management
    • Account
    • Profile
    • Security and access
    • Personal Access Key (PAK)
    • Notifications
  • Organization management
    • General
    • Members
    • Groups
    • Tags
    • Connect
  • Workspaces
  • Solutions
  • Datasets
    • Create dataset
    • Explore dataset
    • Upload data
    • Export data
    • Manage dataset
  • Insights
    • Create insight
    • Aggregation
    • Filters
    • SQL Editor
    • Visualization
      • Table chart
      • Line chart
      • Bar chart
      • Pie chart
      • Single number
      • Maps
        • JSON and GeoJSON
        • Create a map
    • Joins
      • Basics
      • Joins in insights
    • Manage insights
  • Reports
    • Create reports
    • Manage reports
  • Forms (soon)
  • Documentation
  • Roles and permissions
    • Roles
    • Permissions
    • Permission matrix
  • Security and data protection
    • Trust Center
    • Security measures
    • Data protection
    • Hosting
  • Help and support
Bereitgestellt von GitBook
Auf dieser Seite

War das hilfreich?

Als PDF exportieren
  1. Security and data protection

Data protection

Learn about data protection and privacy measures in the Polyteia Platform.

VorherigeSecurity measuresNächsteHosting

Zuletzt aktualisiert vor 5 Tagen

War das hilfreich?

The Polyteia Platform ensures GDPR compliance across all business areas, based on standards and recommendations from Bitkom-Consult. Role-based access ensures that personal data is only viewed and processed by authorized individuals.

Furthermore, the Polyteia Platform implements data deletion concepts based on data sensitivity and customer requirements. Your data is exclusively processed and stored in BSI-certified (C5) data centers that have their headquarters and location in Europe.

All devices that process customer data have a security profile installed, use hardware encryption, and are managed by an MDM solution.

For more information and relevant documents for download, please visit our .

Trust Center