New EmailLabs Panel
API DOCSEmail API & Cloud SMTPPricingBlog
EN
EN
  • πŸ‘‹New EmailLabs Panel
  • πŸ’‘first steps
    • Completing Company Data
    • GDPR Agreement
      • Choosing the Right GDPR Agreement
      • Signing the GDPR Agreement
    • Security
      • Changing Your Login Password
      • Password Reset
      • IP Authorization
      • Two-Factor Authentication (2FA)
    • SMTP Server Password
    • Sender Authorization
    • SPF Record
      • If You Don’t Have an SPF Record
      • If You Have an SPF Record from Another Service
  • πŸ’ŒEmail
    • Introduction
      • How the Email Channel Works with Omnichannel
      • How to Use Email Campaigns vs API Sends
    • Email API
      • Dashboard
        • Elements on the Dashboard
          • Date Selection
          • SMTP Account Selection
          • Message Statuses and Line Chart
        • Server Information
      • Emails Report
        • Navigation and Tab Selection
          • Structure of the Email Reports Tab
            • Search Tool
            • Email List
              • Detailed Message Logs
      • Tag Report
        • Compare Statuses
          • Search Tool
          • Tags Report Search Results
        • Compare Tags
          • Search Tool
          • Tags Report Search Results
      • Domain Report
        • Search Tool
        • Search Results
      • Blacklist Report
        • Emails Blacklist
          • Search Tool
          • Adding and Exporting Email Addresses
            • Importing Addresses to the Blacklist
            • Exporting Email Addresses from the Blacklist
            • Adding a New Address
        • Domains Blacklist
          • Tool Search
          • Adding a New Domain
        • Import List
          • Search Tool
        • Export List
          • Search Tool
      • Whitelist Report
        • Email Addresses Whitelist
          • Search Tool
          • Add New Address
        • Domain Addresses
          • Search Tool
          • Add New Domain
      • Settings
        • SMTP Accounts
          • General Settings
          • IP Authorization
          • SPF
          • S/MIME
          • Block Disposable Temporary Addresses
          • Tags
            • Configuring a New Rule
          • Headers
            • Configuring Headers
          • Footer
            • Configuring the Footer
          • Link Tracking
            • Link Tracking Configuration
          • Open Tracking
            • Open Tracking Configuration
          • Deep Links
          • Google Analytics
            • Google Analytics Configuration
          • Unsubscribe
            • Unsubscribe Configuration
              • Unsubscribe Page
              • Redirect to Your Unsubscribe Page
            • List-Unsubscribe Header (One-Click Unsubscribe)
        • Blacklist
          • Types of Blacklist
          • Validity of Entries on the Blacklist
          • Bounce Number Before Address Blocking
        • Messages Templaets
          • Email Template Configuration
          • Sending Emails with a Template
    • Email Campaigns
      • Dashboard
        • Elements on the Dashboard
      • Campaigns
        • Campaign List
          • Overview of the Campaign List
          • Campaign Search
          • Campaign List
        • Campaign Export
          • How to Export Campaign List
          • Data Included in the Export File
      • Creating a New Email Campaign
        • Email Template
        • Basic Information
        • Recipients
        • Summary
          • Campaign Preview and Summary
          • Action Button
          • Booster Configuration
          • Campaign Execution
        • Booster Configuration in E-mail Campaign
        • A/B Campaign Email Builder
        • Designing Emails Using the Drag-and-Drop Editor
          • Features of the Editor
            • Content Blocks
            • Rows
            • Settings
          • Creating an Email Design in the Editor
            • Adding Rows
            • Adding Content Elements
            • Personalization and Modification
            • Testing and Optimization
            • Saving and Launching the Campaign
      • Outgoing
        • How to Access Outgoing Emails?
        • Outgoing Emails List
        • Email Details
      • Campaign Reports
        • Summary
        • Opens
        • Clicks
        • Domain Report
        • Heatmap
        • Geo/Tech
        • Tools
        • Data Availability
      • Settings
        • Unsubscribe Pages
          • Adding a New Unsubscribe Page
          • Creating the Unsubscribe Confirmation Page
          • Saving and Completing the Process
          • Available Actions for Created Templates
  • Common Settings
    • Sender Domain Authorization
      • Login and Domain Selection
      • Advanced Settings
      • Generating and Adding DNS Records
        • Domain Authorization in Cloudflare
        • Domain Authorization in GoDaddy
        • Domain Authorization in cyber_Folks
        • Domain Authorization in home.pl
        • Domain Authorization in nazwa.pl
        • Domain Authorization in OVHcloud
        • Domain Authorization in Zenbox
      • Verification and Process Completion
      • Restricting Authorization to Specific SMTPs
      • Technical Support
  • πŸ“±SMS
    • Overview
    • SMS Campaings
      • Dashboard
        • Dashboard Elements
      • Campaigns
        • Campaign List
          • Campaign List Overview
          • Campaign Search
          • Campaign List
        • Campaign Export
          • Data Included in the Export File
        • Creating a New SMS Campaign
          • Sender
          • Recipients
          • Content
            • Message Content
            • Personalization
            • Character Count and Message Billing
            • Message Billing Rules
            • Billing Table
            • Additional Options
              • Campaign Name
              • Campaign Description
              • Progress Notifications (email)
              • Capacity [SMS/h]
              • Unsubscribe Page Template
              • Insert Tracking List
              • Debug Message Content
          • Summary
          • Test Send
          • Booster Configuration
          • Save and Send Campaign
        • Booster Configuration in SMS Campaign
        • Send Test to Multiple
        • Delivery Report
          • Summary
          • Clicks
          • Tools
      • Incoming Messages
        • Incoming Messages
        • Incoming Messages List
        • Exporting Incoming Messages
      • Outgoing Messages
        • Access to Outgoing Messages
        • Outgoing Messages List
        • Exporting Outgoing Messages
      • Settings
        • Links with Suffixes
          • Creating a New Link with a Suffix
          • Managing Links with Suffixes
          • Exporting Link Click Data
          • Best Practises
        • Unsubscribes Pages
          • Configuration Options
          • Unsubscribe Page Functionality
          • Best Practises
    • SMS API
      • Dashboard
      • Incoming Messages
        • Access to Incoming Messages
        • Incoming Messages List
        • Exporting Incoming Messages
      • Outgoing Messages
        • Access to Messages Sent via the API
        • Outgoing Messages List
        • Exporting Outgoing Messages
    • Common Settings
      • SMS Headers
        • Adding a New Sender ID
        • Managing Headers
        • Searching for Headers
        • Security and Best Practises
  • SMS Billing
  • πŸ“²PUSH
    • Push Notifications – How Does It Work?
      • Push Notification Specifications
    • PUSH Campaigns
      • PUSH Dashboard
      • Campaigns
        • Creating a New PUSH Campaign
          • Content
          • Applications and Recipients
          • Summary
        • Booster Configuration in PUSH Campaign
        • Send Test to Multiple
        • Delivery Report
      • Outgoing
    • PUSH API
      • PUSH API Dashboard
      • Outgoing
    • Common Settings
      • Applications
      • Test Contacts
  • βš™οΈIntegrations
    • SMTP
      • SMTP Relay
      • Atomstore
      • BaseLinker
      • eFitness
      • IdoSell
      • Joomla!
      • Microsoft Outlook
      • Mozilla Thunderbird
      • PrestaShop
      • SALESmanago
      • Selly
      • Shoper
      • SOTE
      • User.com
      • WordPress
    • API
    • SMS
      • SALESmanago
  • πŸ‘₯Account
    • Users
      • Adding a User
      • Assigning Permissions
      • 2FA Settings
        • Resetting 2FA Settings
      • User Account Activation
      • Editing and Deleting a User
    • Settlements
      • Company Data
      • Invoices
    • Settings
      • Security
        • IP Authorization
        • Two-Factor Authentication (2FA)
      • API
        • Generating API Keys
        • Assigning Permissions
        • Limiting Access to Specific IP Addresses
        • Managing API Keys
        • Integration and Technical Requirements
      • Webhooks
        • Supported Channels and Events
        • Webhook Configuration
        • Data Transmission
    • Notifications
      • Notification Icon
      • Accessing the Full Notification List
        • Full Notification List View
    • Operations List
      • Operation Search
    • File Manager
    • GDPR
  • 🀝CONTACTS
    • Contacts Dashboard
    • Contacts List
      • Adding Individual Contacts
      • Editing Contacts
    • Groups List
      • Adding a New Group
      • Assigning Contacts to a Group
      • Static Group Segmentation
    • Dynamic Segments
      • List of Dynamic Segments
      • Creating a New Dynamic Segment
    • Import
      • Importing Contacts from a File
    • Archive
      • List of Archived Contacts
      • Managing Archived Contacts
    • Additional Fields
      • Adding a New Additional Field
  • πŸ”SECURITY CENTER
    • User Account Security
      • Managing Login Password
      • Two-Factor Authentication (2FA)
      • IP Address Access Authorization (Panel, API, SMTP)
      • Managing Users and Roles in the Account
    • Email Sending Security and Authorization
      • Introduction to Sender Authorization
      • SPF (Sender Policy Framework)
      • DKIM (DomainKeys Identified Mail)
      • DMARC (Domain-based Message Authentication, Reporting & Conformance)
      • BIMI (Brand Indicators for Message Identification)
      • Transmission Encryption (TLS)
    • Data Security and EmailLabs Infrastructure
      • EmailLabs' General Commitment to Security
      • Data Center Security
      • Technical and Organizational Measures Applied by EmailLabs
      • Service Protection and Connection Security (Cloudflare WAF)
    • Personal Data Protection and GDPR Compliance
      • Personal Data Processing in EmailLabs
      • EmailLabs Privacy Policy
      • Document Templates for Clients
    • Standards, Certifications, and Audits
      • ISO Certifications
      • Compliance with DORA & NIS2
      • Security and Penetration Tests
    • Protection against Threats and Abuse
      • How EmailLabs Protects Against Phishing and Abuse
      • How to Recognize and Analyze Suspicious Emails (User Tips)
      • Reporting Abuse (Anti-Abuse Policy)
    • Security – Frequently Asked Questions (FAQ)
Powered by GitBook
On this page
  • General Questions about the Service and Data
  • Data Protection Officer
  • Data Controller
  • Entrustment and Further Entrustment of Personal Data Processing
  • Implementation of Information Security Management System
  • Risk Assessment
  • Business Continuity
  • Security Incident Management and Personal Data Breach Handling
  • Information Classification
  • Employees
  • Access Control and Access Management
  • Remote Access
  • Portable and Mobile Devices
  • Document Destruction
  • Server Security
  • Network Security
  • Logs
  • Data Security at Rest and in Transit
  • Physical Security
  • Cloud Computing
  • Data Protection Measures
  1. SECURITY CENTER

Security – Frequently Asked Questions (FAQ)

PreviousReporting Abuse (Anti-Abuse Policy)

Last updated 2 days ago

General Questions about the Service and Data

Does Emailabs have cloud email services?

The SMTP server is provided to the Client by a virtual server separated from the physical server belonging to VERCOM, to which is assigned the IP address used for sending e-mail messages. The SMTP server can be shared or dedicated to the client. it is always a VPS (Virtual Private Server).

Diagram of the technical structure of the EmailLabs Service:

I. "Sending" part

The main functionality of the EmailLabs Service is the possibility of mass sending e-mail messages to the address database specified by the customer.

II. Database part

It includes the processing of data on a completed email sent. The data is logically separated.

Therefore, it should be stated that the data contained in e-mail messages sent using the EmailLabs Service are processed on servers belonging to VERCOM.

In the case of backups, the data is encrypted (and stored in this form on servers provided by third parties.

What the data processing process at EmailLabs looks like?

The processing of entrusted data (in the context of the GDPR) distinguishes:

  1. Data in transit: data is encrypted with SSL.

  1. Data at rest: we store only the e-mail addresses of e-mail recipients (e-mail logs in the panel). This data is not encrypted due to the computational overhead of processing such databases. However, in 2024 Quarter 1 there will be a functionality of data anonymization.

Is there data anonymization available?

Yes, the injected status is processed in the database and a log is saved with the anonymous TO address.

When the final email status is processed (OK, hard bounce, dropped, etc.), the status is saved to the database and the server logs are also anonymized in a similar way to the logs in the database.

Anonymization could involve, for example, leaving the first character and domain, e.g. instead of "john.walk@abcabc.pl" it would be "j***********@abcabc.pl". On the customer’s side, the log of such an email would be precisely identifiable by the message_id.

Data Protection Officer

Has the Processor appointed a Data Protection Officer?

Yes, VERCOM S.A. has appointed a Data Protection Officer.

Please provide the contact details of the Data Protection Officer.

Marika Rybarczyk,

Are the activities of the Data Protection Officer (the person responsible for the area of data protection) documented?

Yes, the activities of the DPO are documented.

Data Controller

Have the principles for exercising the rights of data subjects (to information, access to data and their copies, rectification or completion of data, deletion of data, restriction of processing, data portability, objection, and not being subject to automatic profiling) been implemented?

Yes, to the extent that these obligations rest with Vercom S.A. as the Data Controller. Vercom supports Data Controllers in fulfilling their legal obligations to the necessary extent. Vercom's solutions are not database management systems, so functionalities in this area may be limited.

Does the processor maintain a register of data subject requests?

As a processor, we do not maintain a register of data subject requests, as these matters fall under the responsibility of the Data Controller.

All requests from Data Subjects that we receive are promptly forwarded to the Data Controllers in accordance with the processing agreement, and the requesting party is informed that the data has been forwarded to the Controller. The processor supports the Data Controllers in fulfilling their obligation to respond to data subject requests.

Are there designated persons responsible for maintaining contact with the Controller entrusting the processing?

Yes.

The first line of support is the business manager and Customer Service Office. Each Data Controller also has the option to contact the Data Protection Officer (DPO) directly.

Entrustment and Further Entrustment of Personal Data Processing

Does Emaillabs have a DPA for their client?

Yes, please find the agreement template in the Document Templates for Clients section.

What is the subject, nature, and purpose of processing personal data?

The processing is carried out to provide the Service to the Client based on the Main Agreement and to fulfill Vercom's obligations arising from this Data Processing Agreement, particularly concerning data security, including ensuring their integrity and availability.

What categories of individuals does the agreement cover?

The processed personal data concerns the following categories of individuals: End Users - individuals who are recipients of electronic communications sent by the Client based on the Main Agreement.

What types of special categories of personal data are covered by the agreement?

The processed special categories of personal data include the following categories: Not applicable.

How many subcontractors does the processor use and to what extent?

Depending on the service provided, the list of processors may vary. Details are regulated by the personal data processing agreement.

The list is available in the Personal Data Processing in EmailLabs section.

Have all subcontractors used during the provision of services been checked to ensure an appropriate level of personal data protection?

Yes, subcontractors undergo an annual assessment.

Do you process data outside European Union?

Vercom declares that the Processing of Personal Data shall be performed in the territory of the European Union or the European Economic Area, unless the obligation to transfer the Personal Data to the third country, in the meaning of the GPDR, derives from the Law

Where are the data entrusted for processing stored?

All operations performed on personal data take place within an IT system. Data entrusted for processing are not stored on employees' computers. Vercom does not process personal data in paper form as part of its services. All personal data entrusted to us for processing are stored in an external data center that meets the highest security standards and undergoes multi-layered security measures.

Have internal regulations been prepared and implemented regarding the supervision and monitoring of personal data processing processes?

Yes. Periodic internal and external audits are conducted. Testing occurs at least once every 12 months or more frequently if necessary.

The most recent ISO 22301 audit took place in January 2025. Previous external audits for ISO 27001 and ISO 27018 were conducted in August 2024. These audits covered the entire organization, assessing compliance with all required standards and evaluating the effectiveness of security controls. Compliance with ISO 22301, ISO 27001, and ISO 27018 was verified, resulting in the issuance of a certification of conformity.

Additionally, in 2024, three internal audits were conducted, culminating in an audit report and a review of the Information Security Management System’s performance.

Is there a record of suppliers to whom you entrust or further entrust the processing of personal data?

Yes, there is a detailed list of further processors used by Vercom S.A., last updated on 20_03_2023, as well as a Register of Processing Activities at VERCOM S.A.

How does the entity ensure separation of data entrusted to it by the Controller from data of other entities, including its own data?

Vercom uses logical separation of data in its systems provided as part of the services rendered.

Is a Register of Processing Activities maintained?

Yes.

Is a Register of Categories of Processing Activities maintained?

Yes.

Is the storage and processing of data carried out only within the EEA?

The main server environment within VERCOM's CPaaS is located within the EEA. All further processors handling personal data provide services covered by regionalization within PL, EU, or EEA territories. We do not process data outside of the EEA.

Do we have procedures regarding backups of the data we process?

According to the documented and implemented policy, backups are created daily. Backup copies are stored for 2 years and are encrypted. Backups are maintained only within the EEA in external data centers with the highest security standards, subject to multi-layered security measures.

Implementation of Information Security Management System

Has the Information Security Policy and regulations regarding the processing and protection of personal data been implemented?

Yes.

Implemented and confirmed with ISO 27001 and ISO 27018 certification. ISMS-01 Information Security Process Book DP-01 Personal Data Security Policy

Has the instruction for managing IT systems used for processing personal data or other internal regulations regarding IT infrastructure management been implemented?

Yes.

Implemented and documented procedure DO-02: Instruction for managing IT systems.

Has the implemented Information Security Policy and regulations regarding personal data protection been accepted by the management team?

Yes.

Do we ensure the capability to continuously maintain the confidentiality, integrity, availability, and resilience of processing systems and services?

Yes.

Are the Information Security Policy and regulations regarding personal data protection published and accessible to staff (employees/contractors)?

Yes.

Does the data processor implement the principle of data protection by design?

Yes.

We operate in accordance with the principles of Privacy by Design and Privacy by Default.

Does the data processor implement the principle of data protection by default?

Yes.

We operate in accordance with the principles of Privacy by Design and Privacy by Default.

Risk Assessment

Has a methodology for assessing the risk of infringement of rights or freedoms of natural persons been implemented?

Yes.

Implemented procedure DO-03: Methodology for Assessing the Risk of Personal Data.

Has a methodology for assessing the impact on personal data protection been implemented?

Yes.

Implemented procedure DO-03: Methodology for Assessing the Risk of Personal Data.

Is risk assessment conducted periodically? Please provide the date of the last risk assessment.

Yes, as of April 14, 2023.

According to the implemented and documented Risk Assessment procedure, a Risk Assessment Sheet is maintained electronically. Risk assessment is conducted annually and additionally whenever necessary due to planned activities.

Business Continuity

Are monitoring and detection mechanisms in place to identify activities that may impact information security and business continuity?

Yes, a variety of monitoring solutions are implemented to monitor system events and alert on detected anomalies. Additionally, the company has an internal cybersecurity team conducting regular tests of deployed solutions.

Has a Business Continuity Plan (BCP) and/or Disaster Recovery Plan (DRP) been implemented?

Yes. A Business Continuity Plan has been developed and implemented, regularly tested (at least once a year). Vercom also maintains a DRP. PBI-01 Appendix 03 Business Continuity Plan Schema (BCP).

Is regular testing and evaluation conducted on the effectiveness of implemented organizational and technical measures to ensure an adequate level of processing security?

Yes, as part of annual BCP tests.

Security Incident Management and Personal Data Breach Handling

Has the supplier established procedures for handling personal data breaches (security incidents)?

Yes, there is a formal process in place for handling all personal data breaches and security incidents. All breaches of personal data and security incidents are reported to management, recorded, and managed by designated personnel.

We have documented and implemented ISMS-03 Security Incident Management. We maintain full documentation, including supervisory documentation, under which ISMS-03 Appendix 1 Breach and Incident Register for Personal Data Protection at VERCOM S.A.

Is there a record of breaches being maintained?

Yes, we maintain a Register of Security Incidents and Personal Data Protection Incidents.

Has a supervisory authority or court issued a final decision finding a violation of personal data protection by the provider?

No.

Information Classification

Is there an implemented classification and categorization of information based on its importance within the organization?

Yes.

Do the regulations concerning processed information include: secure processing, storage, transmission, transport, destruction, and classification change?

Yes.

Are employees informed about the classification methods and information processing procedures mandated within the organization?

Yes.

Employees

Have employees been required to maintain the confidentiality of personal data?

Yes. Every employee and collaborator signs a confidentiality statement confirming their commitment to maintaining the confidentiality of personal data.

Are authorizations issued for employees involved in the personal data processing process?

Yes. Only employees appropriately authorized have access to the data. Access is granted based on the principle of limited access ('need to know')β€”to the extent necessary to perform duties in their respective roles.

A record of individuals authorized to process personal data is maintained and regularly updated.

Do employees receive identification badges and are they required to wear them?

Yes. Each employee is issued an access control card and is required to carry it at all times. Each identifier is assigned to a specific user and is used to gain access to office spaces. Each use of the identifier is logged in the system.

The assigned identifiers do not display company or employee markings for security reasons, to deter potential misuse if lost.

Are training sessions organized for newly hired employees before they begin processing personal data?

Yes. Within a maximum of 30 days from the start of employment, the ISO Data Protection Officer conducts basic training with the newly hired employee on the processing of personal data within the company. This training also covers job-specific guidelines (Job Instructions) and familiarizes them with the Information Security Policy.

The organization ensures continuous enhancement of its employees' and collaborators' knowledge through regular training sessions and other awareness activities on data protection issues.

At least once a year, the Information Security Officer (ISO) organizes mandatory training sessions for employees on personal data processing within the company and job-specific guidelines. Employees participate in these trainings following the procedures outlined in PBI 04 Annex 1 Access and Resource Management Instruction. The last training took place on 25_01_2023.

In addition to the annual mandatory training sessions on GDPR and ISO requirements, employees and collaborators also participate in additional trainings conducted by a Cybersecurity Penetration Tester. As part of best practices, the organization conducts a cycle of 'Cyber Tuesdays' trainings.

We also provide opportunities for additional trainings related to digital threats. Each employee reviews a detailed Job Instruction immediately upon employment. IT department-specific trainings are also mandatory and periodic, along with training cycles tailored for Customer Support department employees.

We consistently strive for continuous improvement and skill enhancement for employees and collaborators, providing them access to specialized trainings relevant to their roles.

Is pre-employment screening conducted?

Yes. The organization has implemented and follows a system of employment verification procedures.

Verification includes, among other aspects, reviewing employee references, analyzing qualifications, and confirming the following: - Identity verification based on appropriate documentation (ID card or passport) - Confirmation of relevant academic qualifications (based on certificates/diplomas/degree certificates) - Verification of declared professional experience (as stated in the CV and references).

Does the company collect declarations of criminal record from employees?

Yes, employees sign relevant declarations and are required to inform the employer of any changes.

Is the clean desk policy applied?

Yes.

Is the clean screen policy applied?

Yes.

Access Control and Access Management

Does user panel has a managing access levels for different users?

Yes, the panel has the ability to manage users and various access levels.

IS 2FA method available?

Yes, the panel has the ability to manage users and various access levels.

Does the company have a regulated password policy?

Yes, a consistent password policy has been implemented.

Passwords have a maximum validity period, a minimum length requirement, and a history enforcement. They must not be too easy or obvious, and cannot be dictionary words. Each employee and collaborator stores passwords in a password manager (KeePassXC).

Is there a procedure governing access and identity management?

Yes, according to PBI - 04 Annex 01 Access Management Instruction at Vercom S.A.

Access is granted solely upon approval by management. Employees must have unique identifiers and are prohibited from sharing individual passwords with others. There is an implemented procedure for user authentication in the IT system – Instruction for Managing the Information System. Each employee has individual accounts, logins, and passwords.

Do we ensure accountability of individuals utilizing IT resources and data through digital identity management and logging the activities of those assigned to these identities?

Yes.

Are default accounts such as generic accounts, embedded accounts, non-personalized accounts, and guest accounts secured, blocked, or removed as part of the procedure?

The system does not allow the creation of generic, non-personalized, or guest accounts.

Remote Access

Is remote access to organizational resources regulated by internal procedures?

Yes, according to the documented and implemented Procedure for the Use of IT Resources by Users.

Is remote access authorized by management for each individual employee or groups of employees?

Yes.

Are employees informed about the risks of working with remote access?

Yes. Every newly hired employee and collaborator undergoes mandatory training in this regard.

Is encrypted end-to-end connection required between the organization and the end user?

Yes.

Is two-factor authentication required for remote access?

Yes.

Portable and Mobile Devices

Are the rules for using portable devices documented, described, and implemented?

Yes, in the procedure "Using IT Resources by Users".

Is the use of personal portable devices (PPDs) regulated by internal procedures?

Yes. The use of private mobile devices is regulated, described, documented and implemented in PBI's internal instructions - 04 Use of IT resources by users. The organization maintains a strict policy against the use of personal portable devices (PPDs).

Are PPDs protected by virus/malware detection software? Is this software and its updates centrally managed?

Yes, according to the implemented procedures for mobile devices used by employees. Mobile devices are configured with access control, and are protected by anti-malware and antivirus software. The software and its updates are centrally managed.

Are all portable devices used within the organization registered in a central registry?

Yes, there is a hardware register maintained.

Data entrusted for processing are processed exclusively within the IT system and are not transmitted outside of it.

Are cryptographic techniques applied to mobile devices?

Yes, we have a documented and implemented Procedure for Managing Security and Cryptographic Keys, which also relates to the security of using mobile devices.

Are only portable media authorized by administrators allowed for use in the organization?

According to our Procedure for the Use of IT Resources by Users, there is a total prohibition on using external information media. External drives may only be used by selected IT department employees and system administrators, with prior consent from the Data Protection Officer (DPO) and the Information Security Officer (ISO). They are subject to detailed guidelines, their number is strictly defined, they are registered, encrypted, and undergo annual reviews. No personal data may be stored on them. Data entrusted for processing are processed exclusively within the IT system and are not transmitted outside of it.

Are the rules for the destruction of portable data carriers and the data stored on these carriers regulated in internal instructions?

Yes. Everything is conducted in accordance with the documented and implemented Data Retention Procedure of VERCOM and the Instruction for Managing the Information System, tailored to the data category.

Document Destruction

Is the organization managing printouts properly, and is there a procedure for managing them?

Yes. The handling of printouts is described in the implemented and documented procedure DO - 02 Information System Management Instruction. Unnecessary documents are destroyed in a manner that makes them unreadable, for example, using shredders with an appropriate security levelβ€”recommended for destroying documents containing personal data such as names, email addresses, etc., and by a specialized external company that specializes in document destruction.

Data entrusted for processing are processed exclusively within the IT system. Vercom does not process customer data in paper form.

Are employees required to immediately collect prints containing personal data or other confidential information from printers?

Yes. According to the implemented and documented procedure DO - 02 Information System Management Instruction.

Vercom does not process customer data in paper form.

Server Security

Is access to servers restricted to authorized administrators only?

Yes.

Are servers located exclusively in a data center?

Yes.

Does the data center have adequate security measures?

The facility meets the requirements of the international Tier III standard. The data center is equipped with various systems including air conditioning, Uninterruptible Power Supply (UPS), fire suppression, and uses redundant power systems (e.g., in servers). The air conditioning and UPS systems are regularly tested.

Are server resources monitored (e.g., CPU usage, RAM, disk space)?

Yes.

Are the servers protected by a firewall system?

Yes.

Network Security

Is the internal network separated from the Internet by Firewall/IPS/IDS devices?

Yes.

PBI - 04 Use of IT Resources by Users 1.2; PBI - 05 Use of Resources - Administrators 1.2.

Do only authorized personnel have access to network devices?

Yes.

Are there contingency plans for network devices, and are they implemented?

Yes.

Do we provide filtering/blocking measures for incoming and outgoing network traffic to protect data and resources from intentional or accidental breaches of confidentiality, integrity, or availability?

Yes.

Is access to the wireless network monitored for unauthorized access?

Yes.

What security measures are implemented at the interface with the public network?

The wireless network is separated from the internal LAN by firewall rules. Access to the local network and remote networks (e.g., the Internet) is granted based on a request from the employee's supervisor, submitted via an email request to the system administrator to assign system permissions and access to IT resources (login, password, email), or directly by the department manager. This includes allowing and blocking access to websites. The organization specifies which URLs are blocked and which are allowed.

Logs

Are network logs recorded?

Yes.

How long are network logs retained?

Network logs are retained for 1-12 months.

How are logs analyzed?

Automatically. Network logs are analyzed automatically and manually when an event requires investigation.

Who has access to the logs?

Administrators and developers handling customer requests.

Data Security at Rest and in Transit

Do we have a procedure regulating the encryption of data at rest and in transit?

Yes, according to the implemented policy PBI - 04 Annex 02 Procedure for Managing Security and Cryptographic Keys. Data in transit is encrypted using the SSL protocol. Long-term data storage in the form of backups is fully encrypted. Operational data is not encrypted for optimization reasons.

Are access to data and actions resulting in changes to production environments recorded/logged?

Yes.

Is the development and testing of IT systems/applications conducted exclusively outside of the production environment?

Yes.

Is there segregation/separation of the production environment from development, testing, and acceptance environments?

Yes.

Are solutions such as automated (static) code review/analysis, dynamic code analysis, vulnerability scanning, penetration testing, and peer code review used for software security testing?

Yes.

Is there control over the source code developed by or for the Provider?

Yes.

The code is developed internally.

Is the source code and related elements stored in a controlled central source library?

Yes.

Is the source code and related elements not located in the production environment?

Yes.

The source code is stored in an independent environment.

Do we regularly perform penetration tests? How frequently?

Yes. Vercom conducts penetration tests according to the document 'Vercom Vulnerability Management Process.' We perform cyclic penetration tests of our application annually internally by our Pentester, and at least once every two years by an external auditing company (alternating between internal and external tests). The test plan is determined by the test coordinator in consultation with project directors and the CTO. A detailed test plan is established each time based on the suggested schedule.

Physical Security

Are physical security measures implemented in the building (e.g., camera systems, secure locks, ID badges, access control)?

Yes. Access to the building is restricted to authorized personnel only, with all entrances secured by personal access cards. The building is a Premium class office building.

As outlined in the Technical and Organizational Measures Applied by EmailLabs section.

Based on a risk analysis, have appropriate organizational and technical measures been implemented to ensure an adequate level of security for the confidentiality, integrity, availability, and resilience of systems and services?

Yes.

Is access to the premises under the Processor's control restricted after working hours for third parties, and is access for cleaning staff and security personnel closely supervised?

Only authorized personnel have access, with all entrances secured by personal access cards. In the office buildings where we work, no personal data entrusted to us for processing is stored. All personal data entrusted to us is stored in an external data center that meets the highest security standards and is subject to multi-level security - SOC 2 certification. After working hours, cleaning staff or, in exceptional situations, building security may be present in the office building. This is outlined in our procedures related to the implemented ISO 27001. We have NDA agreements signed with all individuals, including cleaning staff who work after hours. However, areas where data is stored are NOT accessible to third parties after working hours.

Cloud Computing

Will the personal data entrusted for processing be processed in the cloud?

Yes, our service constitutes a specific form of public cloud computing, entirely created and managed by Vercom S.A. We do not use a third-party cloud service provider; instead, we are the provider. In understanding cloud computing, it encompasses not just commonly known resources or 'virtual space,' but also services, infrastructure, and platforms for application development. It should be identified as a hybrid solution, combining service, platform, and infrastructure. The term CPaaS (Communications Platform as a Service) has also become popular, referring to a solution dedicated to communication between businesses and their customers via a specialized platform that organizes this communication process.

Are external audits conducted for the cloud services provided?

Yes, a security audit based on the OWASP TOP 10 vulnerabilities and the OWASP ASVS methodology is conducted. Additionally, audits are performed in relation to ISO 27001 and ISO 27018 certification.

Data Protection Measures

Please indicate the methods for securing the premises.

According to the Technical and Organizational Measures Applied by EmailLabs section.

Please indicate the organizational measures for protecting Personal Data.

According to the Technical and Organizational Measures Applied by EmailLabs section.

Please indicate the hardware measures for IT and telecommunications infrastructure.

According to the Technical and Organizational Measures Applied by EmailLabs section.

Please indicate the protective measures within software tools and databases.

According to the Technical and Organizational Measures Applied by EmailLabs section.

More information about the security of the main server facility can be found directly on the website:

πŸ”
iod@vercom.pl
https://www.beyond.pl/en/data-centers/beyond-pl-data-center-1/