GDPR and data privacy

We love helping clients manage their customer’s data to create outstanding personalized experiences. Data privacy management is not only required by law, but it is also essential to nurture a good relationship with clients. Showing commitment to handling the information customers share and respecting their preferences creates an important sense of trust that will benefit both sides.

Image

Our GDPR Compliance

The General Data Protection Regulation (GDPR) established in Europe was a significant social innovation. It clarifies and allows individuals to manage their privacy preferences and have visibility about the information they share.

Technology tailor made to the compliance

Our Customer Data Platform automatically collects, cleans, and presents all customer data from different marketing tools in one place, in real-time.

Manage multiple data flows in one place

Multiple data flows and sources manually increases your risk of failure to meet privacy protection requirements and compromises your company’s reputation.

Appointing a Data Protection Officer

Spotler Activate (before Datatrics) has appointed a person to manage corporate compliance and act as a point of contact between the company and the competent authorities.

Cybersecurity management

We have significant experience with threat protection, privacy protection, and a wide range of compliance regulations. In addition to that, our company leverages the organizational model of its holding, Spotler Group, to better manage its security measures.

Compliance standards and requirements

We regularly access our infrastructure and security policies to maintain the highest data protection compliance standards following the laws and regulations requirements.

Policies and workflow changes

We use state-of-the-art protocols for data encryption in transit across networks, such as SSH-2 and TLS 1.2 and above. We use AWS VPN with certificate-based authentication for logging into EC2 instances.

Software development life cycle follows an Agile methodology. We keep development, staging, and production environments separated within AWS. We adopt Input sanitization techniques across all phases of software development.

Physical and logical security measures

We use state-of-the-art protocols for data encryption in transit across networks, such as SSH-2 and TLS 1.2 and above. We use AWS VPN with certificate-based authentication for logging into EC2 instances.

Software development life cycle follows an Agile methodology. We keep development, staging, and production environments separated within AWS. We adopt Input sanitization techniques across all phases of software development.

Software development

We use state-of-the-art protocols for data encryption in transit across networks, such as SSH-2 and TLS 1.2 and above. We use AWS VPN with certificate-based authentication for logging into EC2 instances.

Software development life cycle follows an Agile methodology. We keep development, staging, and production environments separated within AWS. We adopt Input sanitization techniques across all phases of software development.

Mitigation techniques

We use state-of-the-art protocols for data encryption in transit across networks, such as SSH-2 and TLS 1.2 and above. We use AWS VPN with certificate-based authentication for logging into EC2 instances.

Software development life cycle follows an Agile methodology. We keep development, staging, and production environments separated within AWS. We adopt Input sanitization techniques across all phases of software development.

Go to top