Skip to content

Information security

We understand the importance of ensuring confidentiality, availability and integrity of information within your firm.

ISO 27001

RegLab understands the importance of ensuring the confidentiality, availability and integrity of information within your firm. That is why we use the globally recognised ISO 27001 information security standard.   

This means we set up our processes in a structured and controlled way to identify and minimise information security risks. This enables us to ensure the confidentiality, availability and integrity of information within our application.   

When using our private cloud-based solution, you don't have to worry about the security of your data. This is because we ensure that your information is stored and processed in a secure manner, in accordance with the ISO 27001 standard.   

Feel free to contact us for more information.  

 


Privacy

What is RegLab’s cookie policy

Where is RegLab’s product infrastructure hosted?

Data Encryption and Storage

How does RegLab encrypt data in transit?

How does RegLab encrypt data at rest?

Can RegLab track changes to sensitive data?

Does RegLab ensure logs are tamper-evident and regularly monitored?

Data Backup and Recovery

Did RegLab define a backup policy?

Do the backups have defined recovery procedures?

Are backups stored off-site?

Are backups encrypted using strong encryption algorithms?

How can I perform my own backups of my data?

Reliability

What is RegLab’s uptime commitment?

Security Management

Does RegLab have a ISO27001 certification?

Does RegLab use adequate anti-malware software?

Does RegLab deploy password protection solutions, such as encryption?

Has RegLab defined a policy for updating the components (software, libraries, etc.) of the application? How are vulnerabilities monitored?

User and Identity Management

Are the default authentication elements on equipment and services systematically changed?

Are RegLab’s user and administrator accounts nominative?

Audit and Monitoring

Is an information security audit plan defined?

Authentication and Access Control

How do I set up Two-Factor Authentication (2FA)?

How do I set up Single Sign On (SSO)?

Is the access to the application outside of SSO blocked?