InfoSec & Compliance
Beyonity products run on high-security data centers
- ISO 27001
- ISO 27018
- SOC 1/2/3
- CSA STAR
- PCI DSS
We can help you assess your information security and compliance
Product security
Deleting data/files
Delete your dossiers without losing relevant data for ESG reporting & co.
Beyonity retains data on tenants/buyers, but this data no longer allows any conclusions to be drawn about the actual individuals. For this reason, you can process dossier data containing CID and learn from it over the long term, without leaving the data in the cloud for an unnecessarily long time.
IP whitelisting
SSO
Integrate your own OpenID-based identity provider to centralize identity management and provide a seamless user experience for authentication.
Two-factor authentication (2FA)
Beyonity offers a wide range of authentication methods:
Password-based authentication
Users need at least a password to log into their client. This also applies to Beyonity employees.
Multi-factor authentication
In addition, users can enable 2FA authentication. This access security is enforced for Beyonity employees. After each login, all users receive a bearer token.
API communication – HTTPS client authentication
Beyonity uses HTTPS for all communication to ensure confidentiality, authenticity, and integrity. It also improves data protection for applications and users utilizing the API. For APIs that support CORS (Cross-Origin Resource Sharing)* or JSONP requests, it also ensures that the requests are not blocked as mixed content.
HTTP basic authentication
Beyonity webhooks can use HTTP, but do not contain sensitive information.
API access tokens
Integrations use API keys that users can generate (and rotate) themselves. Access tokens are suitable for applications where many users require access. They are secure and easy to handle from the end users’ perspective.
Data encryption
Encryption by default, at rest and in transit.
We encrypt data in transit between systems and at rest to ensure that only authorized roles and services with verified access to the encryption keys can access it.
Penetration tests
With the launch of BeyonityHELLO, Beyonity conducts an annual penetration test through an independent firm to identify potential vulnerabilities and implement preventive measures.
The report and detailed assessment are provided upon request. The penetration tests are conducted in the second half of each year.
Monitoring vulnerabilities
Infrastructure security
Intruder detection
Multi-site operation
Access to the encryption code
Access to the production network
Log management
Firewall
Backups
Organizational security
Business Continuity Planning
Employee screening & checks
The hiring process at Beyonity includes a comprehensive 3-part assessment for new employees. This includes the submission of a self-disclosure/resume, a series of interviews with at least six people, and a separate skills assessment. Reference checks and criminal record extracts are also part of the evaluation.
In addition, Beyonity conducts annual reviews of its employees, which also include updated criminal record extracts and a refresher on bank client secrecy provisions. All employees participate in annual data protection training, which is logged and confirmed by the employee.
Risk analysis methodology
Risk analysis plays a crucial role at Beyonity, as it enables the company to identify and proactively address potential issues that could affect its IT infrastructure. By conducting a thorough assessment, Beyonity can identify various threats—including structural, technical, human, and natural threats—and evaluate their potential risk.
Based on the analysis, appropriate risk management procedures are implemented. These include protective measures to reduce the likelihood of risks, mitigation measures to lessen the impact of disasters, recovery measures to restore systems and infrastructure, and contingency plans to guide actions in the event of incidents or disasters. Through IT risk analyses, Beyonity ensures the resilience and security of its IT environment.
Wide range of measures
Data and data protection
EU-GDPR
revDSG
Beyonity operates in full compliance with the revised Swiss Data Protection Act (revDSG) and ensures that all data processing activities comply with the principles and requirements of the regulation.
We prioritize the protection of personal data, respect individual rights, implement appropriate security measures, conduct necessary assessments, and maintain documentation in accordance with the revDSG.
Our commitment to data protection enables us to provide our customers and stakeholders with a trustworthy and compliant environment.
Data classification Ppolicy
Beyonity maintains a data classification policy to ensure the proper handling and protection of sensitive information. This policy establishes guidelines for categorizing data based on its level of confidentiality, so that appropriate security measures can be implemented.
By classifying data, Beyonity can apply the necessary controls and safeguards, such as encryption or access restrictions, to protect sensitive information from unauthorized access or disclosure.
The data classification policy reflects Beyonity’s commitment to data privacy and security, helping to mitigate risks and maintain the confidentiality, integrity, and availability of valuable data assets.
Data Processing Agreement
Beyonity requires all customers to sign Data Processing Agreements (DPAs) to ensure the protection and proper handling of personal data. These agreements establish the responsibilities, obligations, and protective measures for the processing of customer data in accordance with applicable data protection laws, such as the EU General Data Protection Regulation (GDPR).
By requiring DPAs, Beyonity establishes a clear understanding between the company and its customers regarding the handling, security, and confidentiality of personal data. This commitment to data protection helps build trust and transparency in the customer relationship and ensures that personal data is processed in a compliant and secure manner.
Data breach notifications
Beyonity has implemented additional procedures to ensure the swift and effective handling of data breach notifications. In accordance with data protection regulations, such as the EU General Data Protection Regulation (GDPR), Beyonity has established processes for detecting, assessing, and reporting data breaches.
These procedures enable the organization to respond quickly, notify the relevant authorities within the prescribed timeframe, and take appropriate measures to mitigate the impact of the breach on the rights and freedoms of individuals. By establishing robust data breach notification procedures, Beyonity demonstrates its commitment to transparency, accountability, and the protection of personal data. To date, Beyonity has not experienced a data breach.
Data transfer agreements
Beyonity is able to assist with data transfer agreements to ensure the secure and lawful transfer of personal data. In accordance with data protection regulations, such as the EU General Data Protection Regulation (GDPR), Beyonity recognizes the importance of protecting data when it is transferred outside the European Economic Area (EEA).
Beyonity supports its customers with guidance and expertise in navigating the complexities of cross-border data transfers. The organization helps to assess the adequacy of data protection measures, implement appropriate safeguards, and establish legally binding agreements to protect personal data during international transfers. Beyonity’s expertise regarding data transfer agreements ensures compliance with regulations and promotes the secure exchange of data across borders.
Deletion of customer data
Beyonity pays close attention to the deletion of customer data and emphasizes the secure and permanent removal of customer data from its systems. Recognizing the importance of data privacy and individual rights, Beyonity employs robust processes and controls to ensure the proper deletion of customer data upon request or upon the expiration of the agreed retention period.
By complying with data protection regulations, such as the EU General Data Protection Regulation (GDPR), even in non-EU countries, Beyonity ensures that customer data is handled with the utmost care and is deleted promptly and securely in accordance with legal requirements. This commitment to the deletion of customer data reflects Beyonity’s dedication to data privacy and customer trust.