When we talk about information security, we don’t just mean protecting the transmissions between your computer and SynoInt systems and platforms. We do far more to help safeguard your information.
At SynoInt, all data subjects’ trusts are our top and the most important priority. So, SynoInt has implemented appropriate technical and organisational controls to protect your personal data and information against unauthorised processing and against accidental loss, damage or destruction.
Below is information how SynoInt works in the area of security, what security measures have been implemented, what security standards are applicable.
However, please be sure you’re comfortable with our security measures and this Security policy before using services in SynoInt platforms and systems and accessing your account online.
SynoInt ensures protection of passwords and complies with the requirements below:
These requirements are applicable to all passwords of SynoInt`s employees.
When we ask you to set up a password to access parts of our sites, SynoInt systems and platforms, you must also comply with these requirements for passwords. But the biggest responsibility is for you. You are responsible for choosing a secure password. Especially SynoInt recommends keep password confidential and you should choose a password that you do not use on any other site. You should not share your password with anyone else, including anyone who works for us. Unfortunately, sending information via the internet is not completely secure. Although we will do our best to protect your personal data once with us.
SynoInt ensures that network, systems, databases, applications, network components and other computing devices are protected from malicious activity and unauthorised access.
SynoInt has implemented the appropriate controls such as anti-virus, firewalls, login control and some intrusion prevention systems.
Anti-virus software and firewalls on all computer devices, servers and networks are updated in accordance with the software providers’ recommendations and our network provider ensures that access to sensitive data is limited to properly authorised requests.
Servers and backups
All SynoInt data and information are stored on encrypted and licensed servers.
We use third-party servers from Amazon (AWS).
For data recovery we use automatic database snapshots provided by Amazon.
We have to inform, that Amazon (AWS) represents, warrants and covenants that according to Amazon (AWS) policies, security is the highest their priority and they comply with all applicable international laws and rules for personal and non-personal data protection and information security. You may also visit https://aws.amazon.com/ and https://aws.amazon.com/compliance/data-privacy-faq/ for details on Amazon (AWS) services and compliance with data privacy.
For some other data processing (storage) cases, SynoInt uses UAB Interneto vizija services. You may also visit https://klientams.iv.lt/index.php?command=signin and https://sutartys.iv.lt/preview/duomenu_tvarkymas.php for details on UAB Interneto vizija services and compliance with data privacy.
All the premises of the SynoInt provides the highest level of security.
The following security features are available on all premises of the SynoInt:
SynoInt treats that all e-mails received and sent must be kept confidential and can only be accessed by the persons indicated in the e-mails.
The e-mails services used by SynoInt meet the data security requirements of the business.
SynoInt connects to the electronical mailboxes with a secure and recognized SSL / TLS protocol that ensures reliable information encryption. Also, electronical mailboxes are protected against spam.
All outgoing and incoming e-mails are encrypted, so there is a small possibility that it could be taken over by third parties.
So, you can safely send e-mails to us and open e-mails where the sender is SynoInt.
Reliability of employees
Before recruiting, SynoInt investigates that candidates were not be punished in the past for offenses of data protection, information security, confidential and commercial secrets.
All employees of the SynoInt are of impeccable reputations.
Also, employees are educated about the information security, working with the software, working with personal data. At least once a year, SynoInt employees are provided special trainings on personal data protection and information security.
All employees’ actions with personal data in SynoInt systems and platforms are reviewed from time to time using the “log files”. Also, employees’ access to personal and non-personal data is provided through a special system that is called “System access management”.
Handling of security breaches
SynoInt is responsible for the confidentiality and security from the moment the personal data is received. Despite best efforts, we cannot always guarantee absolute security because many aspects also depend on you.
In case a threat has been determined or justifiable suspicions arise for your personal data, SynoInt informs you about such event.
SynoInt reserves the right to inform and notify law enforcement authorities about security breaches.
However, you should note that SynoInt did not have any security breach.
Business continuity and recovery plan
Despite all the efforts that organizations and companies devote to identifying and addressing external and internal problems related to security, protection of personal data, business continuity, they are constantly faced with unexpected emerging various threats and incidents. The smallest threat / incident can pose a risk for the organization’s and company`s operations, threatens its reputation, can ruin management structures, cause significant financial difficulties, or even compromise the company’s survival.
In view of this, SynoInt has prepared Business continuity and recovery plan.
SynoInt activities may be suspended, terminated, but only temporarily. Following Business continuity and recovery plan, SynoInt can return quickly and continue to operate. The main purpose of the Business continuity and recovery plan is to ensure uninterrupted activity of the SynoInt and identify actions and responsibilities in order to protect against threats and if threats occurred, how to eliminate the consequences of threats.
Chief information security officer (CISO)
We would like to inform that in adherence to the best practises on information security, SynoInt has been assigned the following Chief information security officer (CISO):
If you would like to contact SynoInt CISO, you have questions related to the information security or other matters related to information security, please contact by e-mail firstname.lastname@example.org and in part “Subject” indicate “CISO”.
Compliance with ISO
Information security includes three main aspects:
In order to ensure the confidentiality, integrity and availability of information processed by the SynoInt, SynoInt is in process creating information security management system.
SynoInt intends to open information security management system in first part of 2019 and start certifying according to ISO 27001 (LST ISO/IEC 27001:2013) until at the end of first part of 2019.
Applicable law and changes
This Security policy is governed by the law of the Republic of Lithuania.
The main and always updated version of this Security policy is posted in English on www.synoint.com/legal.