Impressum
ZeroByte Software GmbH
Geschäftsanschrift:
Geigerstraße 27a
82166 Gräfelfing
Deutschland
Geschäftsführer: Florian Meder
E-Mail: meder@zerobyte-software.com
Registergericht: Amtsgericht München
Handelsregister-Nummer: HRB 261022
USt-IdNr: DE337762357
Datenschutz-
erklärung
Google Workspace APIs are not used to develop, improve, or train generalized AI and/or ML models.
Google user data
Google user data is used only for providing or improving our applications functionality.
Google user data is not shared, transfered, or disclosed to anyone.
Data Protection Mechanisms for Sensitive Information
We take the security and confidentiality of your sensitive data seriously. We have implemented a range of data protection mechanisms to ensure that any personal or sensitive information collected, processed, or stored is protected against unauthorized access, disclosure, alteration, or destruction. These mechanisms include, but are not limited to
Encryption
We utilize secure encryption protocols such as SSL/TLS to protect data transmitted between users and our servers. Sensitive data is stored using advanced encryption standards (AES-256) or similar encryption mechanisms to prevent unauthorized access.
Access Control
Access to sensitive data is restricted to authorized personnel only, based on a least-privilege principle. Role-based access control are enforced to safeguard against unauthorized access. We only collect and process sensitive data that is strictly necessary for the intended purposes. Wherever possible, we apply pseudonymization or anonymization techniques to sensitive data to reduce the risks associated with data processing.
Secure Data Storage
Sensitive data is stored in secure environments with physical security measures and monitored systems that detect and prevent unauthorized access. We use cloud storage providers that comply with industry standards for data security, including ISO/IEC 27001 certification and regular security assessments.
Regular Security Audits and Vulnerability Assessments
We regularly perform security audits, vulnerability assessments, and penetration tests to identify and address potential vulnerabilities in our systems that could compromise sensitive data. Any identified vulnerabilities are promptly addressed through patches, updates, or additional security measures.
Data Retention and Deletion
We retain sensitive data only for as long as necessary to fulfill the purposes for which it was collected or as required by law. Once the retention period expires or the data is no longer required, we securely delete or anonymize it.