Data Security
and Compliance
Glassix - A Partner You Can Trust
Compliance
General Data Protection Regulation (GDPR)
Glassix is fully compliant with GDPR, ensuring that all personal data is processed following strict privacy and transparency guidelines.
Our GDPR-centric practices include data minimization, clear consent mechanisms, and robust data subject rights to enhance your control over personal information.
Service Organization Controls (SOC 2)
Our SOC 2 compliance underscores our commitment to the highest standards of security, availability, processing integrity, confidentiality, and privacy.
Glassix's systems and controls are regularly audited by independent third parties to ensure our operations meet rigorous criteria.
Privacy by Design
Frequently asked question
How does Glassix ensure GDPR compliance specific to customer data storage and handling?
At Glassix, we ensure GDPR compliance by implementing data protection from the onset of designing our systems, also known as privacy by design. We strictly manage and monitor all data access points, and only authorized personnel have access to personal data, under strict role-based permissions. Additionally, we provide customers with tools to manage their data directly, facilitating compliance with requests for data access, rectification, erasure, and portability.
Сan Glassix provide details on the encryption methodologies used to protect data?
Glassix employs industry-standard encryption methods to secure customer data both at rest and in transit. For data at rest, we use AES-256 encryption, one of the strongest block ciphers available. For data in transit, we use TLS 1.2 or higher, ensuring that all data exchanged between our servers and client applications is secure from interception or tampering.
What specific measures does Glassix take to ensure compliance with SOC 2?
Glassix's SOC 2 compliance is supported by comprehensive security policies and procedures that include regular third-party audits, internal risk assessments, and continuous monitoring of our controls. Our compliance covers all five trust service principles: security, availability, processing integrity, confidentiality, and privacy. This ensures not only the security of the infrastructure but also the operational practices that protect client data from unauthorized access or use.
How does Glassix handle data breaches or potential security threats?
In the unlikely event of a data breach or security threat, Glassix has a robust incident response plan that includes immediate mitigation measures, thorough investigation, and transparent communication with affected users. We are committed to notifying users and regulatory authorities in accordance with applicable laws and within the required timelines. Continuous monitoring and real-time alerts enable us to respond promptly to potential security incidents.
Where can users find resources or support for understanding how their data is being used and protected by Glassix?
Users can access detailed documentation on how their data is handled and protected through their user dashboard and our official website. Additionally, our dedicated support team is available to answer any further questions about data protection practices at Glassix. Users can reach out to us at contact@glassix.com for personalized support and resources.