Security & Data
It is a top priority for Wired Relations to secure our customers’ data access, data loss prevention and data security.
Your data security is of utmost importance for us
At Wired Relations we work with full transparency towards our users and we only work with subprocessors inside the EU/EEA that can give your information adequate level of data protection. You can see a complete list of our subprocessors here.
“The security of our users’ data is an important part of every step of development in Wired Relations.”
CTO and Co-founder of Wired Relations
We are using the AWS’ hosting environment from Amazon Web Services, Inc..
It has been essential for us at Wired Relations that AWS has been able to demonstrate the certification of their third part EY CertifyPoint.
Amazon Web Services, Inc. has certification for compliance with:
Security measures (2FA & SSO)
Wired Relations have two integrations that both supports two-factor authentication (2FA) and Single-Sign-On (SSO) that you can enable on your Wired Relations account:
- Azure AD SSO – Azure Active Directory or Microsoft 365 Business
- GSuite SSO or Google Login
If you have interest in enabling either of the integrations, please contact us via firstname.lastname@example.org.
Wired Relations is deployed using containerised standards, and it is therefore possible to get Wired Relation on-premise where you can get it setup within your own infrastructure. It doesn’t matter if it is on-premise or in your own cloud. Contact us, if you would like to know more about how we can make it happen.
Data handling & security
Wired Relations is accessed via an encrypted connection (HTTPS/SSL), and the encryption happens with the Let’s Encrypt certificate. This means that:
- Database files are encrypted
- Data transport on Internet is SSL (TLS) encrypted
The encryption level is the same as that of several online banking systems. SSL encryption means that data transmitted between a registered user and Wired Relations’ systems are encrypted to prevent unauthorised parties from picking up the transmission or parts thereof.
You can always access your private data; we do not employ vendor lock-ins. Your data belongs to you, and they are accessible to you at any time, regularly or as back ups. It is also possible, for payment, to receive a security back up of your data on an ongoing basis. To learn more about this option, your data responsible need to contact us via email@example.com.
If you ask to get your data files deleted at Wired Relations all files will be presently deleted entirely immediately. The deletion of your data is therefor a deep deletion and not just an obfuscation of information.
You are always welcome to contact us via firstname.lastname@example.org, if you have questions about our data handling and data security.
Try it out today.
Create an account in 2 minutes and see for yourself. No credit card needed.