{"id":25794,"date":"2018-05-24T18:15:45","date_gmt":"2018-05-24T16:15:45","guid":{"rendered":"https:\/\/gis-consulting.de\/privacy-of-our-software-solutions\/"},"modified":"2023-04-25T14:41:26","modified_gmt":"2023-04-25T12:41:26","slug":"privacy-of-our-software-solutions","status":"publish","type":"page","link":"https:\/\/gis-consulting.de\/en\/privacy-of-our-software-solutions\/","title":{"rendered":"Privacy of our software solutions"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[mk_page_section bg_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/02\/gis-datenschutz-1-1.jpg&#8221; bg_color=&#8221;#5b7e96&#8243; bg_position=&#8221;left center&#8221; bg_repeat=&#8221;no-repeat&#8221; min_height=&#8221;0&#8243; padding_top=&#8221;85&#8243; padding_bottom=&#8221;85&#8243; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_style=&#8221;curve-bottom&#8221; visibility=&#8221;hidden-sm&#8221; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider size=&#8221;155&#8243;]<div id=\"mtm-overlay-box-1\" class=\"mtm-overlay-box\"><div class=\"mtm-overlay-box-content-wrapper\"><h2 class=\"mtm-overlay-box-title\">Simply safe. Protect data. Safety in focus.<\/h2><p class=\"mtm-overlay-box-content\"><\/p><\/div><\/div>[mk_padding_divider size=&#8221;60&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/mk_page_section][vc_row][vc_column][mk_padding_divider size=&#8221;70&#8243;][vc_column_text css=&#8221;.vc_custom_1677110488342{margin-bottom: 0px !important;}&#8221;]\n<h1>Privacy of our software solutions<\/h1>\n[\/vc_column_text][mk_padding_divider][\/vc_column][\/vc_row][vc_row id=&#8221;Strategisch&#8221;][vc_column width=&#8221;1\/3&#8243;][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/02\/gis-datenschutz-und-it-sicherheit.png&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221; crop=&#8221;false&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]\n<p class=\"p1\">The EU General Data Protection Regulation<\/p>\n[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1677101201105{margin-bottom: 0px !important;}&#8221;]Processing personal data is part of everyday professional life in all companies. The applications of gis GmbH have always processed personal and thus highly sensitive data. Consequently, the responsible handling of personal data is essential &#8211; not only since the increasing importance due to the legal changes of the EU-DSGVO.[\/vc_column_text][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1677101223388{margin-bottom: 0px !important;}&#8221;]In addition to the requirements of data protection and data security, systems that process data must fulfill various requirements and specifications in order to be able to guarantee the requirements of IT security. These requirements can be summarized as confidentiality, availability and integrity. If only those persons who are authorized to view data worthy of protection can do so, confidentiality is guaranteed. The timely provision of data refers to availability. Complete and intact data worthy of protection ensures integrity. The software solutions of gis GmbH integrate the requirements of IT security across the board and beyond the prescribed minimum. In addition, the error-free and complete documentation within the software ensures that you comply with data protection requirements and can also prove them.[\/vc_column_text][\/vc_column][\/vc_row][vc_row id=&#8221;Digital&#8221;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Data protection in our software applications[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1677101249794{margin-bottom: 0px !important;}&#8221;]The software solutions of gis GmbH ensure in detail that the data protection requirements are implemented and also verifiably documented.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1677101260696{margin-bottom: 0px !important;}&#8221;]The responsible handling of data, which is anchored in Article 32 DSGVO, is made clear by the software of gis GmbH through a uniform and automated allocation of access authorizations, which are based on predefined sets of rules.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1677101273840{margin-bottom: 0px !important;}&#8221;]In addition, the risk of data misuse is reduced to a minimum on the basis of our intelligent authorization management, as only those groups of people who really have a need are given authorization to handle personal data.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1677101284402{margin-bottom: 0px !important;}&#8221;]The predefined and clear approval procedures also ensure that the company&#8217;s internal processes comply with these specifications and that approvals can be issued accurately based on individual company requirements.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1677101293150{margin-bottom: 0px !important;}&#8221;]And all these processes can be documented in an audit-proof manner for years to come and retrieved at any time.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_padding_divider size=&#8221;60&#8243;][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/datenschutz_anwendung.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221; animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][\/vc_column][\/vc_row][mk_page_section bg_color=&#8221;#e74c39&#8243; border_color=&#8221;#e74c39&#8243; speed_factor=&#8221;4&#8243; min_height=&#8221;0&#8243; padding_top=&#8221;60&#8243; padding_bottom=&#8221;40&#8243; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;false&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;25&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]We are looking forward to cooperation[\/mk_fancy_title][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_button dimension=&#8221;outline&#8221; size=&#8221;medium&#8221; icon=&#8221;mk-icon-long-arrow-right&#8221; icon_anim=&#8221;side&#8221; url=&#8221;\/kontakt&#8221; target=&#8221;_blank&#8221; outline_skin=&#8221;light&#8221;]CONTACT US[\/mk_button][\/vc_column][\/mk_page_section]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/02\/gis-datenschutz-1-1.jpg&#8221; bg_color=&#8221;#5b7e96&#8243; bg_position=&#8221;left center&#8221; bg_repeat=&#8221;no-repeat&#8221; min_height=&#8221;0&#8243; padding_top=&#8221;85&#8243; padding_bottom=&#8221;85&#8243; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_style=&#8221;curve-bottom&#8221; visibility=&#8221;hidden-sm&#8221; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider size=&#8221;155&#8243;][mk_padding_divider size=&#8221;60&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/mk_page_section][vc_row][vc_column][mk_padding_divider size=&#8221;70&#8243;][vc_column_text css=&#8221;.vc_custom_1677110488342{margin-bottom: 0px !important;}&#8221;] Privacy of our software solutions [\/vc_column_text][mk_padding_divider][\/vc_column][\/vc_row][vc_row id=&#8221;Strategisch&#8221;][vc_column width=&#8221;1\/3&#8243;][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/02\/gis-datenschutz-und-it-sicherheit.png&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221; crop=&#8221;false&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;] The EU General Data Protection Regulation [\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1677101201105{margin-bottom: 0px !important;}&#8221;]Processing personal [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-25794","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/25794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=25794"}],"version-history":[{"count":10,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/25794\/revisions"}],"predecessor-version":[{"id":25821,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/25794\/revisions\/25821"}],"wp:attachment":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=25794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}