{"id":2939,"date":"2022-12-08T14:42:49","date_gmt":"2022-12-08T09:12:49","guid":{"rendered":"https:\/\/www.skubiq.com\/?page_id=2939"},"modified":"2024-06-19T21:50:10","modified_gmt":"2024-06-19T16:20:10","slug":"technical-and-organizational-security-measures","status":"publish","type":"page","link":"https:\/\/www.skubiq.com\/id\/legal\/technical-and-organizational-security-measures\/","title":{"rendered":"Technical and Organizational Security Measures"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2939\" class=\"elementor elementor-2939\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cd37b08 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"cd37b08\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b20ae3\" data-id=\"4b20ae3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e1b623 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9e1b623\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/id\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Home<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.skubiq.com\/id\/legal\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Legal<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19f926f elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"19f926f\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e04cfe\" data-id=\"6e04cfe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4f4a3e elementor-widget elementor-widget-text-editor\" data-id=\"a4f4a3e\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>TECHNICAL AND ORGANIZATIONAL SECURITY MEASURES<\/h3><p>Version 1.00<\/p><p>Last Updated: 31<sup>st<\/sup> October 2022<\/p><p><strong>\u00a0<\/strong><\/p><p><strong>1. Introduction<\/strong><\/p><p>The following is a description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, considering the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons.<\/p><p>\u00a0<\/p><p><strong>2. Certifications and Attestations<\/strong><\/p><ul><li>Inventrax maintains sufficient controls to meet the objectives stated in ISO 27001 (or equivalent standards) and any other industry standards applicable to Inventrax, including any mandatory standards required by Data Protection Laws (collectively the \u201cIndustry Standards\u201d) for the information security management systems supporting the Services.<\/li><li>At least once per calendar year, Inventrax performs an assessment against such Industry Standards (\u201cAssessment\u201d). Upon the Customer\u2019s written request, which shall be no more than once per calendar year, Inventrax may provide a summary of the Assessment(s) to the Customer. Assessments shall be Confidential Information of Inventrax.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/li><\/ul><p>\u00a0<\/p><p><strong>3. Physical Security Measures <\/strong><\/p><ul><li><strong>Systems, Machines, and Devices.\u00a0<\/strong><\/li><\/ul><p>Inventrax has (i) Physical protection mechanisms; and (ii) entry controls to limit physical access.<\/p><ul><li><strong>Media<\/strong><\/li><\/ul><p>Inventrax maintains processes designed for the: (i) Industry standard destruction of sensitive materials before disposition of media; (ii) secure safe for storing damaged hard disks prior to physical destruction; and (iii) physical or verified logical destruction of all decommissioned hard disks storing Personal Data.<\/p><p>\u00a0<\/p><p><strong>4. Technical Security Measures<\/strong><\/p><ul><li><strong>Access Administration <\/strong><\/li><\/ul><p>Inventrax has protected access to the Services by its employees and contractor with authentication and authorization systems. Access to production and sub-production systems requires user authentication. Access rights are granted depending on work requirements and are terminated upon termination of employment or consultancy agreement. User account and password restrictions are included in the production infrastructure and are accessible by the administration.<\/p><ul><li><strong>Access Controls<\/strong><\/li><\/ul><p>Inventrax implements and maintains appropriate access controls, including, without limitation, limiting access to Personal Data to the minimum number of Inventrax personnel who require such access in order to provide the Services. Inventrax provides its personnel with appropriate ongoing training regarding the protection of Personal Data and its Security Program and requires such personnel to comply with the Security Program.<\/p><ul><li><strong>Logging and Monitoring.<\/strong><\/li><\/ul><p>Inventrax\u2019s production infrastructure maintains logs of activities that are centrally collected, are secured in an effort to prevent tampering and are monitored for anomalies.<\/p><ul><li><strong>Firewall system <\/strong><\/li><\/ul><p>In order to safeguard Inventrax\u2019s systems, an industry-standard firewall has been set up and will be maintained. This firewall is present on the network and examines all incoming connections that are sent to Inventrax\u2019s environment.<\/p><ul><li><strong>Encryption <\/strong><\/li><\/ul><p>All Personal Data that is (i) transmitted over any public network or wirelessly; (ii) stored on laptops, other portable devices, or storage media; or (iii) stored on any device or media that is housed or transported outside of the physical or logical controls of Inventrax, is encrypted by Inventrax using Advanced Encryption Standard, other tools, and techniques in accordance with Data Protection Laws and Industry Standards HTTPS\/TLS (1.2 or higher).<\/p><ul><li><strong>Antivirus <\/strong><\/li><\/ul><p>Inventrax applies updates to anti-virus, anti-malware, and anti-spyware software at regular intervals.<\/p><ul><li><strong>Confidentiality, Integrity, Availability, And Resilience of Processing Systems and Services<\/strong><\/li><\/ul><p>Inventrax\u2019s customer agreements contain strict confidentiality obligations. Inventrax\u2019s personnel and subcontractors authorized to Process Personal Data are subject to confidentiality obligations substantially equivalent to the ones Inventrax committed to in the Agreement or are under an appropriate statutory obligation of confidentiality. Inventrax has a business continuity plan designed to maintain service and\/or recovery from reasonably foreseeable emergency situations or disasters. Customer Data is securely backed up on a regular basis. Inventrax infrastructure spans multiple fault-independent availability zones on its hosting provider and is supported by various tools and processes designed to maintain the availability and resiliency of Services.<\/p><ul><li><strong>Change Control.<\/strong><\/li><\/ul><p>Changes to platform, applications and production infrastructure are evaluated to minimize risk and are implemented following applicable industry standards, leading best practices, and then-current applicable standard operating procedure.<\/p><p>\u00a0<\/p><p><strong>5. Administrative Security Measures <\/strong><\/p><ul><li><strong>Personnel Security <\/strong><\/li><\/ul><p>Inventrax performs background screening on all employees and all contractors who have access to Personal Data, in accordance with applicable industry standards, leading best practices, then-current applicable standard operating procedures, and subject to applicable law.<\/p><ul><li><strong>Security Awareness <\/strong><\/li><\/ul><p>Inventrax maintains a security awareness program that includes training of Inventrax employees on the Security Program. Training is conducted at the time of hire and periodically throughout employment at Inventrax.<\/p><p>\u00a0<\/p><p><strong>6. Other Measures <\/strong><\/p><ul><li>Inventrax shall be responsible for the security of Inventrax systems, and any Personal Data stored therein. Inventrax shall employ and maintain a reasonably comprehensive, written Security Program that complies with, and adequately addresses all relevant Data Protection Laws and Industry Standards.<\/li><li>Inventrax\u2019s Information Security Program covers all networks, systems, servers, computers, notebooks, laptops, PDAs, tablets, mobile phones, and other devices and media that Processes Personal Data or provide access to Inventrax\u2019s systems.<\/li><li>If during the term of the relevant Agreement, Inventrax modifies its Security Program in any manner that materially weakens or compromises the security, confidentiality, or integrity of any Personal Data, Inventrax shall promptly notify the Customer of any such material change.<\/li><li>Inventrax shall conduct risk assessments of, and as necessary review and revise, its information security program at least annually, and whenever there is a material change in Inventrax\u2019s business or technology practices that may reasonably affect the privacy, confidentiality, security, integrity, or availability of the Personal Data.<\/li><li>Inventrax shall designate an individual as primarily responsible for the development, implementation, maintenance, and management of the Security Program.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home Legal TECHNICAL AND ORGANIZATIONAL SECURITY MEASURES Version 1.00 Last Updated: 31st October 2022 \u00a0 1. Introduction The following is a description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, considering the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons. \u00a0 2. Certifications and Attestations Inventrax maintains sufficient controls to meet the objectives stated in ISO 27001 (or equivalent standards) and any other industry standards applicable to Inventrax, including any mandatory standards required by Data Protection Laws (collectively the \u201cIndustry Standards\u201d) for the information security management systems supporting the Services. At least once per calendar year, Inventrax performs an assessment against such Industry Standards (\u201cAssessment\u201d). Upon the Customer\u2019s written request, which shall be no more than once per calendar year, Inventrax may provide a summary of the Assessment(s) to the Customer. Assessments shall be Confidential Information of Inventrax.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 3. Physical Security Measures Systems, Machines, and Devices.\u00a0 Inventrax has (i) Physical protection mechanisms; and (ii) entry controls to limit physical access. Media Inventrax maintains processes designed for the: (i) Industry standard destruction of sensitive materials before disposition of media; (ii) secure safe for storing damaged hard disks prior to physical destruction; and (iii) physical or verified logical destruction of all decommissioned hard disks storing Personal Data. \u00a0 4. Technical Security Measures Access Administration Inventrax has protected access to the Services by its employees and contractor with authentication and authorization systems. Access to production and sub-production systems requires user authentication. Access rights are granted depending on work requirements and are terminated upon termination of employment or consultancy agreement. User account and password restrictions are included in the production infrastructure and are accessible by the administration. Access Controls Inventrax implements and maintains appropriate access controls, including, without limitation, limiting access to Personal Data to the minimum number of Inventrax personnel who require such access in order to provide the Services. Inventrax provides its personnel with appropriate ongoing training regarding the protection of Personal Data and its Security Program and requires such personnel to comply with the Security Program. Logging and Monitoring. Inventrax\u2019s production infrastructure maintains logs of activities that are centrally collected, are secured in an effort to prevent tampering and are monitored for anomalies. Firewall system In order to safeguard Inventrax\u2019s systems, an industry-standard firewall has been set up and will be maintained. This firewall is present on the network and examines all incoming connections that are sent to Inventrax\u2019s environment. Encryption All Personal Data that is (i) transmitted over any public network or wirelessly; (ii) stored on laptops, other portable devices, or storage media; or (iii) stored on any device or media that is housed or transported outside of the physical or logical controls of Inventrax, is encrypted by Inventrax using Advanced Encryption Standard, other tools, and techniques in accordance with Data Protection Laws and Industry Standards HTTPS\/TLS (1.2 or higher). Antivirus Inventrax applies updates to anti-virus, anti-malware, and anti-spyware software at regular intervals. Confidentiality, Integrity, Availability, And Resilience of Processing Systems and Services Inventrax\u2019s customer agreements contain strict confidentiality obligations. Inventrax\u2019s personnel and subcontractors authorized to Process Personal Data are subject to confidentiality obligations substantially equivalent to the ones Inventrax committed to in the Agreement or are under an appropriate statutory obligation of confidentiality. Inventrax has a business continuity plan designed to maintain service and\/or recovery from reasonably foreseeable emergency situations or disasters. Customer Data is securely backed up on a regular basis. Inventrax infrastructure spans multiple fault-independent availability zones on its hosting provider and is supported by various tools and processes designed to maintain the availability and resiliency of Services. Change Control. Changes to platform, applications and production infrastructure are evaluated to minimize risk and are implemented following applicable industry standards, leading best practices, and then-current applicable standard operating procedure. \u00a0 5. Administrative Security Measures Personnel Security Inventrax performs background screening on all employees and all contractors who have access to Personal Data, in accordance with applicable industry standards, leading best practices, then-current applicable standard operating procedures, and subject to applicable law. Security Awareness Inventrax maintains a security awareness program that includes training of Inventrax employees on the Security Program. Training is conducted at the time of hire and periodically throughout employment at Inventrax. \u00a0 6. Other Measures Inventrax shall be responsible for the security of Inventrax systems, and any Personal Data stored therein. Inventrax shall employ and maintain a reasonably comprehensive, written Security Program that complies with, and adequately addresses all relevant Data Protection Laws and Industry Standards. Inventrax\u2019s Information Security Program covers all networks, systems, servers, computers, notebooks, laptops, PDAs, tablets, mobile phones, and other devices and media that Processes Personal Data or provide access to Inventrax\u2019s systems. If during the term of the relevant Agreement, Inventrax modifies its Security Program in any manner that materially weakens or compromises the security, confidentiality, or integrity of any Personal Data, Inventrax shall promptly notify the Customer of any such material change. Inventrax shall conduct risk assessments of, and as necessary review and revise, its information security program at least annually, and whenever there is a material change in Inventrax\u2019s business or technology practices that may reasonably affect the privacy, confidentiality, security, integrity, or availability of the Personal Data. Inventrax shall designate an individual as primarily responsible for the development, implementation, maintenance, and management of the Security Program.<\/p>","protected":false},"author":1,"featured_media":0,"parent":2911,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"fullwidth","_kad_post_sidebar_id":"","_kad_post_content_style":"unboxed","_kad_post_vertical_padding":"hide","_kad_post_feature":"hide","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"class_list":["post-2939","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technical and Organizational Security Measures &#8211; SKUBIQ<\/title>\n<meta name=\"description\" content=\"Technical and organisational measures implemented by the data importers to ensure an appropriate level of security...\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technical and Organizational Security Measures &#8211; SKUBIQ\" \/>\n<meta property=\"og:description\" content=\"Technical and organisational measures implemented by the data importers to ensure an appropriate level of security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.skubiq.com\/id\/legal\/technical-and-organizational-security-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"SKUBIQ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Cmo-Skubiq\/100081850339703\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T16:20:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.skubiq.com\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-26-at-7.28.06\u202fAM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3024\" \/>\n\t<meta property=\"og:image:height\" content=\"1618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@SKUBIQ_CMO\" \/>\n<meta name=\"twitter:label1\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/\",\"url\":\"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/\",\"name\":\"Technical and Organizational Security Measures &#8211; SKUBIQ\",\"isPartOf\":{\"@id\":\"https:\/\/www.skubiq.com\/it\/#website\"},\"datePublished\":\"2022-12-08T09:12:49+00:00\",\"dateModified\":\"2024-06-19T16:20:10+00:00\",\"description\":\"Technical and organisational measures implemented by the data importers to ensure an appropriate level of security...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.skubiq.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legal\",\"item\":\"https:\/\/www.skubiq.com\/pt_br\/legal\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Technical and Organizational Security Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.skubiq.com\/it\/#website\",\"url\":\"https:\/\/www.skubiq.com\/it\/\",\"name\":\"SKUBIQ\",\"description\":\"Cloud based Inventory Management  &amp; Warehousing Software\",\"publisher\":{\"@id\":\"https:\/\/www.skubiq.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.skubiq.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.skubiq.com\/it\/#organization\",\"name\":\"Avya Inventrax Pvt Ltd\",\"alternateName\":\"Inventrax\",\"url\":\"https:\/\/www.skubiq.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/www.skubiq.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/www.skubiq.com\/wp-content\/uploads\/2025\/02\/InventraxLogo_240x80_TranFin.png\",\"contentUrl\":\"http:\/\/www.skubiq.com\/wp-content\/uploads\/2025\/02\/InventraxLogo_240x80_TranFin.png\",\"width\":240,\"height\":80,\"caption\":\"Avya Inventrax Pvt Ltd\"},\"image\":{\"@id\":\"https:\/\/www.skubiq.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/people\/Cmo-Skubiq\/100081850339703\/\",\"https:\/\/x.com\/SKUBIQ_CMO\",\"https:\/\/www.linkedin.com\/company\/skubiq\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technical and Organizational Security Measures &#8211; SKUBIQ","description":"Technical and organisational measures implemented by the data importers to ensure an appropriate level of security...","robots":{"index":"noindex","follow":"follow"},"og_locale":"id_ID","og_type":"article","og_title":"Technical and Organizational Security Measures &#8211; SKUBIQ","og_description":"Technical and organisational measures implemented by the data importers to ensure an appropriate level of security...","og_url":"https:\/\/www.skubiq.com\/id\/legal\/technical-and-organizational-security-measures\/","og_site_name":"SKUBIQ","article_publisher":"https:\/\/www.facebook.com\/people\/Cmo-Skubiq\/100081850339703\/","article_modified_time":"2024-06-19T16:20:10+00:00","og_image":[{"width":3024,"height":1618,"url":"https:\/\/www.skubiq.com\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-26-at-7.28.06\u202fAM.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@SKUBIQ_CMO","twitter_misc":{"Estimasi waktu membaca":"4 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/","url":"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/","name":"Technical and Organizational Security Measures &#8211; SKUBIQ","isPartOf":{"@id":"https:\/\/www.skubiq.com\/it\/#website"},"datePublished":"2022-12-08T09:12:49+00:00","dateModified":"2024-06-19T16:20:10+00:00","description":"Technical and organisational measures implemented by the data importers to ensure an appropriate level of security...","breadcrumb":{"@id":"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.skubiq.com\/sw\/legal\/technical-and-organizational-security-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.skubiq.com\/"},{"@type":"ListItem","position":2,"name":"Legal","item":"https:\/\/www.skubiq.com\/pt_br\/legal\/"},{"@type":"ListItem","position":3,"name":"Technical and Organizational Security Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.skubiq.com\/it\/#website","url":"https:\/\/www.skubiq.com\/it\/","name":"SKUBIQ","description":"Cloud based Inventory Management  &amp; Warehousing Software","publisher":{"@id":"https:\/\/www.skubiq.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.skubiq.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Organization","@id":"https:\/\/www.skubiq.com\/it\/#organization","name":"Avya Inventrax Pvt Ltd","alternateName":"Inventrax","url":"https:\/\/www.skubiq.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.skubiq.com\/it\/#\/schema\/logo\/image\/","url":"http:\/\/www.skubiq.com\/wp-content\/uploads\/2025\/02\/InventraxLogo_240x80_TranFin.png","contentUrl":"http:\/\/www.skubiq.com\/wp-content\/uploads\/2025\/02\/InventraxLogo_240x80_TranFin.png","width":240,"height":80,"caption":"Avya Inventrax Pvt Ltd"},"image":{"@id":"https:\/\/www.skubiq.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Cmo-Skubiq\/100081850339703\/","https:\/\/x.com\/SKUBIQ_CMO","https:\/\/www.linkedin.com\/company\/skubiq\/"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/pages\/2939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/comments?post=2939"}],"version-history":[{"count":20,"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/pages\/2939\/revisions"}],"predecessor-version":[{"id":8323,"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/pages\/2939\/revisions\/8323"}],"up":[{"embeddable":true,"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/pages\/2911"}],"wp:attachment":[{"href":"https:\/\/www.skubiq.com\/id\/wp-json\/wp\/v2\/media?parent=2939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}