We take organizational and technical measures (TOM) to ensure that data is stored securely and protected from unauthorized access.
1.1. Entry control
Data processing by Friendly shall be performed in a secure computer centre. The computer centre is certified according to ISO 27001 concerning its information security management system. Access to the computer centre is secured by state-of-the-art control systems.
1.2. Access control
Friendly is required to prevent the intrusion by unauthorised persons into systems and applications used for the processing of personal data. Friendly ensures this by granting access to the data processing systems solely to explicitly authorised administrators. The login is done via multi-factor authentication wherever possible. It is only possible to log in via connections that are encrypted using state-of-the-art technology.
The Customer can only access the services of Friendly via an encrypted connection (SSL/HTTPS).
1.3. Access controls
Friendly is required to prevent unauthorised activities within the data processing systems. Accordingly, only the respective Customer and a small group of individually-named administrators have access to the data. Technical measures shall ensure that a Customer cannot view, modify or erase data of other Customers. Within the services provided by Friendly, access is controlled via a comprehensive role-based access control and authorisation concept. Rights are allocated by the Customer by assigning appropriate roles and rights.
1.4. Separation control
All data records that are collected, processed or used by the Friendly ‘s systems and applications are explicitly and clearly assigned to the respective Friendly and technically separated from other data. The Friendly’s data processing systems are specially designed for data processing that is limited to a specific purpose and specific client. Access to the data of another client is thus technically impossible.
2.1. Transfer control
Control of the transfer of the Customer’s data is ensured by various technical and organisational security measures. For the purpose of invoicing for services, billing data is transferred to the Friendly’s accounting systems via an encrypted connection.
2.2. Input control
Friendly must guarantee the transparency and/or documentation of data processing. For this purpose, all entries made into the systems and applications are logged by Friendly. The logs are archived and erased once the purpose has been achieved or on the basis of legal requirements.
3.1. Availability control
Friendly must protect personal data against accidental destruction or loss. For this purpose, the architecture of Friendly’s data processing systems, including network infrastructure, the power supply and the connection to the Internet must be designed redundantly.
A comprehensive backup and recovery concept must be in place to prevent data loss. Friendly takes full daily backups of all systems and data.
The systems and applications are continuously monitored with regard to availability, functionality, safety and utilisation. A written emergency plan is in place to restore the backups in the event of loss or destruction.
3.2. Rapid recoverability
Measures must be taken to ensure that data can be recovered quickly in the event of data loss. A combination of redundant systems and backup solutions is used to protect against the loss of the Customer’s data.
Resilience means the ability to resist attacks or to quickly bring systems back into working order after an attack.
The technical systems of Friendly are able to cope with expected disruptive events without their functionality being significantly impaired. IT systems are continuously hardened to protect against known attacks such as denial-of-service attacks.
In addition, each essential component is designed redundantly so that in the event of a fault, a switch to a defect-free component takes place automatically. Additional capacities can also be flexibly exchanged or expanded.
Emergency plans exist which, in the event of a fault, provide precise instructions for restoring the desired condition. These emergency plans, and the protection concepts, are continuously reviewed and the relevant employees receive regular training in connection with their deployment.
5.1. Contact details of Friendly’s representative (s)
Our data protection officer can be reached at .
5.2. Process for regular testing, assessment and evaluation
A process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing must be implemented.
This measure is to be implemented with the aid of a data protection management system. The effectiveness of the technical and organisational measures implemented is to be tested and optimised within the scope of a continuous improvement process.
5.3. Incident response management; reporting channel
Measures must be in place to ensure that Friendly informs the Customer without undue delay in the event of a personal data breach or the suspicion of a personal data breach.
All contractual partners are contractually obliged to report data protection incidents within the legal deadlines. Internal processes ensure that the Data Protection Officer is involved in case of data protection incidents.
5.4. Data protection by default
Appropriate technical and organisational measures must be implemented for ensuring that, by default, only personal data that are necessary for each specific purpose of the processing are processed.
After expiration of the test phase, as well as after termination of the contractual relationship, customer data that have been collected must be erased within three months. In addition, the customer can independently delete individual person’s data within its Friendly services.
5.5. Contractor control
Friendly processes data submitted to them in accordance with the applicable contract and, in doing so, ensures compliance with statutory provisions and requirements defined by contract within the scope of the instructions provided by the Customer.
The services provided by Friendly have an administration interface through which the Customer can manage their customer account. The Customer specifies their access data within their user account during the initial account creation process. Only persons who have such access data can enter, change or delete data within the scope of their assigned authorisations. The written form requirement applies to all other tasks that the Customer cannot perform independently via the administration interface.
Most recently updated: November 24, 2021