We secure all data and authentication protocols. We planned to test the robustness of our applications via functional audits as part of a continuous improvement process.
Our servers are hosted in European datacenters, all traffic is encrypted, and the database is regularly backed up.
Our technical teams are authorized to operate. They are trained to best confidentiality and security practices. We limit access to data to authorized persons only, and only by necessity.