Security & Compliance at Seatti

General information on security policy

Protect Seatti's information and IT resources (including, but not limited to, all computers, mobile devices, network equipment, software, and sensitive data) from all internal, external, intentional, or incidental threats and mitigate risks associated with theft, loss, misuse, damage, or abuse of these systems;

Information protection

Ensuring the protection of information from any unauthorized access. Users may access only those resources for which they have special access authorization. The assignment of privileges must be strictly controlled and regularly reviewed.

Confidentiality of information

Protecting the confidentiality of information. When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized persons.

Information integrity

Ensuring INTEGRITY of information. The integrity of information refers to the protection of information against changes by unauthorized persons.

Information availability

Maintaining the AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.

Compliance with legal requirements

Compliance and, wherever possible, adherence to national legal and regulatory requirements, standards and best practices.

Maintenance of business operations

Developing, maintaining and testing business continuity plans to ensure we stay on track despite any obstacles we may encounter. It's all about "keeping calm and moving on".

Information security awareness

Raise awareness of information security by providing information security training to all employees. Security awareness and targeted training must be consistent, responsibility for security must be reflected in job descriptions, and compliance with security requirements must be expected and accepted as part of our culture.

Protection of employees

Ensure that no action is taken against employees who disclose information security concerns through reporting or direct contact with the IT Security & Compliance Administrator, unless such disclosure indicates beyond a reasonable doubt an unlawful act, gross negligence, or repeated intentional or willful disregard of regulations or procedures.

Report all actual or suspected information security breaches to Security@seatti.co.

Seatti is certified according to the ISO27001. The certificates can also be downloaded:

ISO Certificate - German

ISO Certificate - English