InforUMobile List of Sub-Processors
28th February 2019
Are there any fixed costs?
13th May 2019

Security Measures

InforUMobile Technical and Organisational Security Measures (“Security Measures”) Ref. clause 4.2.3 and 7.3 of the Data Protection Addendum https://inforumobile.ie/ufaqs/schedule-1-inforumobile-data-processing-addendum/ Effective as of 20-02-2019

  1. We shall implement and maintain the following technical and organisational security measures to protect the Protected Data In accordance with DP Laws :
    1. taking into account the state of the art, the costs of implementation and the Details of Processing and the risks of varying likelihood and severity for the rights and freedoms of natural persons and the risks that are presented by the processing,
    1. implementing appropriate  technical and organisational security measures appropriate to the risk, including as appropriate those matters mentioned in Articles 32(1)(a) to 32(1)(d) (inclusive) of the GDPR and relevant provisions of applicable DP Law and as spelled out in more detail in the chart below,
    1. 1.3                regularly review the measures in order to achieve compliance with this clause in light of developments in technology, security and methods of deliberate attack on computer systems and the factors listed in clauses 1.1 and 1.2;
    1. You acknowledge that none of the below measures relieves you of your own obligations under DP Law, notably Articles 24 (Responsibility of the Controller), 25 (Data Protection by Design and Default), and 32-34 (Security of Processing), 35-36 (Data Protection Impact Assessments).
    1. You warrant and represent that you will not in any way undermine, disable, interfere with or otherwise circumvent the above measures. This includes, but is not limited to, attempting to re-identify data that has been de-identified, which is prohibited under DP Law. 
    1. Details of Technical and Organisational Security Measures are:
 Type of measure Description
1Information security management certifications/accreditations, other certifications, codes of conduct, trust marks or sealsWe adhere to the principles of ISO27001 and plan to gain ISO27001 accreditation in  2019.We provide our Services to prominent, security-sensitive organisations who impose (and verify that we follow) strict information security guidelines.
2Physical security controls to prevent unauthorised access, theft or damage to physical equipment.Our system is stored on an International Server Farm which is under 24/7 CCTV monitoring and human-guardedOur server cabinet is locked and only specific, authorised people may gain access to it. We securely dispose of computer equipment and paper records.
3GovernanceWe have clearly defined roles and responsibilities for information security and data protection;We have implemented appropriate information security policies and procedures in line with ISO 27000.We have procedures/policies to regularly review data access rights (joiners, movers, leavers).Procedures/policies are in place for the secure disposal of data, media and equipment.
4Staff reliability checks are carried out when recruiting.Employer reference checks on all staff.Enhanced security checks conducted by third parties.
5Staff are trained on information security, confidentiality and data protection.All staff undergo data protection and IT security training. New employees undergo comprehensive induction programmes inclusive of the above subject matter.Staff sign legally-binding confidentiality agreements and are made aware that any re-purposing or use of Protected Data and any Personal Data we process for our own purposes as a Controller is strictly prohibited.
6Access ControlsControls on access to Protected Data are in place and access is limited to staff who need to have access to carry out legitimate tasks, notably: Customer account is protected by an encrypted password (see below). Only Support Staff and a limited number of Super-Users have access to Customer accounts and Protected Data, with the exception of phone numbers in SMS logs, which retain for billing purposes;A limited number of Super-Users are permitted to access to Customer Accounts to resolve an alert, e.g. a problem with the cue, that may affect Service / platform performance and impact various Customers. We use inhouse developers. Other staff do not have access to Protected Data. Our production system is segregated from our staging system. Developers only used test / dummy data. They are prohibited from using real data.Only support staff have access to certain Protected Data and, in such cases, only incidentally in the course of providing technical support. We keep and review audit logs for anomalies.
7Robust Password PolicyThe system will not accept passwords unless they meet minimal security conditions regarding length, characters, etc. It is configured to automatically reject passwords that don’t meet these conditions . Multiple failed password attempts trigger a block on the account.
8Personal data is securely encrypted when stored and when transferred.Encrypted in transitCustomer accounts are protected by encrypted password.
9Data-minimisationWe validate email addresses and phone numbers based on format, not actual Contact Data. It is Customer’s responsibility to ensure accuracy of the Contact Data. Customer may embed code or parameters to track the source of inbound traffic or place cookies for analytics or other purposes on their Contact’s devices but only Customer can see, access or use that information. InforUMobile does not use or benefit from such collection. Metrics and reports: metrics generated by InforUMobile on behalf of Customer are on an aggregate basis. E.g.  if 100 visitors visit your landing page but only 2 submit a form the rate would be 2%. Traffic report functionality is automatically included in the Landing Page Service but do not capture identifiable elements so do not involve Personal Data. We do not track individual Contact behaviour, though you will have access to more granular detail using the Reporting function, campaign-tagging, etc. using optional features. This remains within your Customer Account.
10Data Subject Rights and Preference ManagementCaller ID blocking not permitted: where DP Law requires you to include your actual phone number or a prefix to indicate a direct marketing call, we technologically require you to show your real number .  SMS functionality includes an unsubscribe function that automatically populates a suppression listWhen Customer or Authorised User attempts to send a Contact Communication using Contact Data on the suppression list, it is automatically removed from the transmission (i.e. it is not sent but the remainder are).Consent-management / right to object: Advanced distribution control allows Customer to segment Contacts and apply distribution rules that respect Contact preferences, e.g. frequency, type of campaign or Contact Communication. Other functionality can reduce Communications fatigue; quiet hours / days. It is Customer’s responsibility to configure the settings accordingly by use of the platform functionality.DSRs: Customer can correct, delete or export in common machine-readable format any data elements you have inputted the forms in your account  to help fulfil erasure, rectification, portability or access requests.
11Technical protection is in place against deliberate or malicious attacks on systems and is regularly tested.Our communication system is shielded by a firewall. We screen Contact Communications for viruses, malware, malicious attachments or known insecure links and malicious code and reserve the right to automatically block / quarantine the message to prevent you sending a message that could create security risks for your Contacts but you bear ultimate responsibility for ensuring your Contact Communications do not contain security threats .Our platform undergoes regular penetration tests by external parties, including tests required under specific regulation such as banking regulations, and these can be performed with varying frequency but generally take place once a year.  Our Windows and SQL servers are frequently tested and undergo regular security updates and patches. We also run internal vulnerability assessments.We require our developers to comply with strict internal coding standards that align with best practice.
12Business continuity measures are in place to provide protection against equipment failure or damage  and are tested regularly. e.g. back-up systems, mirrored systems, ability to restore data.

 

Category: Contact Management and GDPR
  • i survived 100 days of school shirt says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    With havin so much content and articles do you ever run into any problems of plagorism or copyright violation? My blog has a lot of completely unique content I’ve either authored myself or outsourced but it looks like a lot of it is popping it up all over the internet without my permission. Do you know any techniques to help reduce content from being ripped off? I’d genuinely appreciate it.
  • 100 days of school t shirt ideas for teachers says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Awesome things here. I am very satisfied to look your article. Thanks so much and I’m taking a look forward to contact you. Will you kindly drop me a e-mail?
  • 100 days of school shirt diy says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hi, I do think this is an excellent web site. I stumbledupon it 😉 I am going to come back once again since I saved as a favorite it. Money and freedom is the best way to change, may you be rich and continue to guide others.
  • how to make 100 day shirt says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    This article offers clear idea for the new users of blogging, that really how to do blogging.
  • how to make 100 day shirt says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I read this paragraph completely about the resemblance of most recent and earlier technologies, it’s remarkable article.
  • kobe bryant shirt says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hey there! I understand this is somewhat off-topic but I needed to ask. Does building a well-established website such as yours require a massive amount work? I am brand new to operating a blog however I do write in my journal everyday. I’d like to start a blog so I can share my personal experience and feelings online. Please let me know if you have any kind of suggestions or tips for new aspiring bloggers. Appreciate it!
  • ow.ly says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Appreciating the time and energy you put into your website and detailed information you offer. It’s great to come across a blog every once in a while that isn’t the same old rehashed information. Great read! I’ve bookmarked your site and I’m including your RSS feeds to my Google account.
  • http://ow.ly says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Great paintings! That is the kind of information that are supposed to be shared around the net. Disgrace on Google for now not positioning this put up higher! Come on over and discuss with my web site . Thanks =)
  • kobe shirt says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Simply wanna input that you have a very decent internet site, I enjoy the style and design it actually stands out.
  • ow.ly says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I precisely wanted to thank you very much all over again. I am not sure the things that I would’ve worked on in the absence of those methods contributed by you concerning this situation. It was actually an absolute frightening situation for me, however , understanding a new specialized way you dealt with it forced me to jump over delight. I will be grateful for this advice and even hope you are aware of a great job your are doing training other individuals by way of a web site. Most likely you have never come across all of us.
  • kobe t shirt says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Thank you for any other informative site. The place else may just I am getting that type of info written in such a perfect way? I have a mission that I am simply now working on, and I’ve been on the look out for such info.
  • mobile legend hack says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Wonderful goods from you, man. I’ve take note your stuff prior to and you’re simply too great. I actually like what you’ve bought here, really like what you are stating and the best way in which you say it. You’re making it entertaining and you continue to take care of to stay it wise. I can not wait to read much more from you. That is actually a wonderful website.
  • seo planner says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    wflkbngck opmrp dbwkyhe heqm sskynetgxuwbigv
  • seo planner says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    fvrirrmxw voicr cwfywuq odmw shcbbqkxyfxhlie
  • BrmcttM says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    729468 640012Hey, you used to write great, but the last few posts have been kinda boringK I miss your tremendous writings. Past few posts are just a little bit out of track! come on! 472398
  • YesBet88 says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Most viewed claus you have ever seen ! https://bestplay88.com
  • mobile legends hack for fun says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hi there, always i used to check blog posts here in the early hours in the daylight, as i enjoy to find out more and more.
  • clickfunnels pricing says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I blog quite often and I truly appreciate your information. This article has really peaked my interest. I am going to take a note of your website and keep checking for new information about once a week. I subscribed to your Feed too.
  • mobile legends characters says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    This is a great tip especially to those new to the blogosphere. Short but very precise info… Appreciate your sharing this one. A must read post!
  • t shirt graphic design says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    When someone writes an piece of writing he/she keeps the image of a user in his/her brain that how a user can know it. Therefore that’s why this article is perfect. Thanks!
  • ugly christmas sweater knit says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Wow, wonderful blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your site is wonderful, as well as the content!
  • mobile legends upcoming heroes says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    When I initially commented I appear to have clicked the -Notify me when new comments are added- checkbox and now each time a comment is added I recieve 4 emails with the exact same comment. There has to be a means you are able to remove me from that service? Thanks!
  • ctshirts offer code says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Good way of telling, and good article to take facts concerning my presentation focus, which i am going to present in school.
  • t shirt 49ers says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    This is a topic that’s near to my heart… Cheers! Where are your contact details though?
  • league of legends y mobile legends says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I loved as much as you’ll receive carried out right here. The sketch is attractive, your authored subject matter stylish. nonetheless, you command get got an impatience over that you wish be delivering the following. unwell unquestionably come further formerly again as exactly the same nearly a lot often inside case you shield this hike.
  • mobile legends hack says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Thanks for the auspicious writeup. It if truth be told was a enjoyment account it. Look complex to more delivered agreeable from you! By the way, how could we be in contact?
  • mobile legends says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Wow, this paragraph is pleasant, my younger sister is analyzing these kinds of things, so I am going to inform her.
  • mobile legends hack says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I’ve been exploring for a little bit for any high-quality articles or weblog posts in this kind of space . Exploring in Yahoo I at last stumbled upon this web site. Reading this info So i’m glad to convey that I have a very just right uncanny feeling I came upon exactly what I needed. I so much without a doubt will make sure to do not omit this site and give it a glance regularly.
  • mobile legends cheat says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hmm is anyone else encountering problems with the pictures on this blog loading? I’m trying to figure out if its a problem on my end or if it’s the blog. Any feed-back would be greatly appreciated.
  • rules of survival cheat says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hmm it seems like your site ate my first comment (it was extremely long) so I guess I’ll just sum it up what I wrote and say, I’m thoroughly enjoying your blog. I as well am an aspiring blog writer but I’m still new to the whole thing. Do you have any helpful hints for rookie blog writers? I’d certainly appreciate it.
  • rules of survival hack android no root says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hello, i think that i saw you visited my site thus i came to “return the favor”.I am trying to find things to improve my website!I suppose its ok to use some of your ideas!!
  • mobile legends hack says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I know this web site gives quality depending articles and other data, is there any other web page which presents such stuff in quality?
  • mobile legends hack.zyx says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Thanks for the auspicious writeup. It in truth was a entertainment account it. Glance complex to far introduced agreeable from you! However, how could we keep in touch?
  • mobile legends hack tool apk says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hi I am so delighted I found your webpage, I really found you by accident, while I was looking on Yahoo for something else, Anyhow I am here now and would just like to say thank you for a incredible post and a all round interesting blog (I also love the theme/design), I don’t have time to browse it all at the minute but I have saved it and also added your RSS feeds, so when I have time I will be back to read more, Please do keep up the awesome jo.
  • mobile legends hack august 2019 says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Appreciating the time and effort you put into your website and in depth information you offer. It’s great to come across a blog every once in a while that isn’t the same unwanted rehashed material. Fantastic read! I’ve bookmarked your site and I’m including your RSS feeds to my Google account.