Define our Information Technology Security and ensure they are kept current with relevant legislation and ensure they are available to relevant stakeholders.View Policy
This policy describes how this personal data must be collected, handled and stored to meet the data protection standards and to comply with the law.View Policy
Changes are made to the information technology systems in a seven-step process to ensure quality, usability and security of newly released features.View Policy
Consistently detect, respond, and report incidents. Restore information system functionality and business continuity as soon as possible.View Policy
Take a look a our changelog. It highlights important changes we make to Ambassify and is the perfect way to keep up to date with the latest and greatest new features.View our Changelog
Our Ambassify platform is auditted on a yearly basis for security vurnabilities by an external party. Read below what Preben from Sectricity had to say about the lastest security audit.
Sectricity has conducted a vulnerability assessment and has come to the conclusion that Ambassify has been built using secure design principals. The test conducted on May 2020 yielded no serious impactful threats.Download Audit Overview