All incoming and outgoing communication protocols are secure, so the transmission of emails and attachments is always encrypted. (More details: GDPR - art. 5, paragraph 1 f)
All passwords are encrypted using a specific HASH encryption function so that they cannot be read in any other way. (More details: GDPR - art. 5, paragraph 1 f)
Redundancy also involves individual servers, providing an additional guarantee of the resilience of the systems. (More details: GDPR – art. 32, paragraph 1 b)
No attempt is made to read the information contained in emails for any reason or purpose. (More details: GDPR - art.32, paragraph 1 f)
To guarantee adequate security of personal data, including protection, using appropriate technical and organizational methods. (More details: GDPR - art. 5, paragraph 1 f)
To reduce the risk of vulnerability to attacks by viruses, malware, phishing attempts or other fraudulent techniques normally targeted via email. (More details: GDPR - art.1, paragraph 1)
All data is copied in real time to a second storage device at a different Data Center. (More details: GDPR – art. 32, paragraph 1 c)
Use of a secure communication protocol, guaranteeing security by using webmail for email. (More details: GDPR – art. 5, paragraph 1 f)