message disclaimer

title

body
België
  • Domeinen
  • Websites
  • WordPress
  • Hosting
  • Webbeveiliging
  • E-mail en Office
  • Acties
  • Partnerprogramma's
  • Meer
  • Een domein zoeken
  • Domeinnaam check
  • Meerdere domeinen zoeken
  • Nieuwe domeinextensies
  • Domeinmakelaar
  • Domeinnaam-generator
  • Domeinservices
  • Domeinnaam verhuizen
  • WHOIS
  • Domeinnaamevaluatie
  • Veilingen
  • Domeinveilingen
  • Een domein vermelden
  • Prijs
  • Tools voor domeininvesteerders
  • Domeinen nabestellen
  • Domein investering
Gd Nav Domains 2X Meer informatie over domeinen
  • Websites + Marketing
  • Webbouwer
  • Digitale marketingsuite
  • Zoekmachineoptimalisatie
  • WordPress
  • WordPress-websites
Img Mega Nav Wm Verken website-opties
  • Zakelijk en persoonlijk
  • WordPress-hosting
  • WordPress Ecommerce Hosting
  • Ontwerpers en ontwikkelaars
  • Site-beheertools
Img Mega Nav Wordpress Meer informatie over WordPress
  • Webhosting
  • Webhosting
  • Zakelijke hosting
  • WordPress-oplossingen
  • WordPress-hosting
  • WordPress Ecommerce Hosting
  • Servers
  • VPS-hosting
  • Dedicated servers
Gd Nav Hosting 2X Meer informatie over hosting
  • SSL-certificaten
  • SSL-certificaten
  • EV SSL-certificaten
  • OV SSL-certificaten
  • DV SSL-certificaten
  • SAN SSL-certificaat
  • Wildcard SSL-certificaten
  • Websitebeveiliging
  • Websitebeveiliging
  • Website back-up
  • Beveiligingsbronnen
  • Handleiding over SSL-certificaten
Gd Nav Websecurity 2X Meer informatie over webbeveiliging
  • Productiviteit
  • Professionele e-mail
  • Microsoft Office
Gd Nav Email 2X Meer informatie over E-mail en Office
  • Aanbiedingen
  • Coupons met promocodes
  • Verlengingscodes
Img Mega Nav Coupon Codes Coupons met promocodes Gd Nav Promos 03 2X Verlengingscodes
  • Programma‘s
  • Partners
  • GoDaddy Pro: voor ontwerpers en ontwikkelaars
  • Programma's van reseller
Gd Nav Partners 01 2X Partners Gd Nav Partners 03 2X GoDaddy Pro Img Mega Nav Resellers Program Resellerprogramma
Contact

Bel ons

24/7 support in het Engels
078 48 20 46

Globale contactenlijst
Telefoonnummers en openingstijden

Helpcenter

Bekijk onze online hulpbronnen

Hulp nodig?

Help

Meldingen

  • Je hebt geen meldingen.
    Als die er zijn, zie je ze hier.

Aanmelden
Snelle links
  • Links bedieningspaneel:
  • Domeinen beheren
  • Webbouwer beheren
  • Hosting beheren
  • SSL-certificaten beheren
  • E-mail beheren
  • Postvak IN-koppelingen:
  • Inloggen bij e-mail van Office 365
  • Inloggen bij GoDaddy-webmail
Geregistreerde gebruikers

Heb je een account? Nu aanmelden.

Aanmelden
Nieuwe klant

Nieuw bij GoDaddy? Maak een account en ga vandaag nog aan de slag.

Mijn account aanmaken
{{displayName}}
Klantennummer:{{shopperid}} | PIN: Weergeven
  • GoDaddy Pro
  • Mijn producten
  • Accountinstellingen
  • Verlengen en facturatie
Bezoek mijn account Afmelden
Nu afrekenen
GoDaddy

Beveiligingsstandaarden
Laatst herzien: 9 mei 2018‌‌

I.  Technical and Organizational Measures

We are committed to protect our customers' information.  Taking into account the best practices, the costs of implementation and the nature, scope, circumstances and purposes of processing as well as the different likelihood of occurrence and severity of the risk to the rights and freedoms of natural persons we take the following technical and organizational measures.  When selecting the measures the confidentiality, integrity, availability and resilience of the systems are considered. A quick recovery after a physical or technical incident is guaranteed.

II.  Data Privacy Program

1. Confidentiality. “Confidentiality means that personal data is protected against unauthorized disclosure.”  

We use a variety of physical and logical measures to protect the confidentiality of its customers' personal data. Those measures include:   

Physical Security  

  • Physical access control systems in place (Badge access control, Security event monitoring etc.) 
  • Surveillance systems including alarms and, as appropriate, CCTV monitoring  
  • Clean desk policies and controls in place (Locking of unattended computers, locked cabinets etc.)  
  • Visitor Access Management 
  • Destruction of data on physical media and documents (shredding, degaussing etc.) 

Access Control & Prevention of Unauthorized Access

  • User access restrictions applied and role-based access permissions provided/reviewed based on segregation of duties principle  
  • Strong authentication and authorization methods (Multi-factor authentication, certificate based authorization, automatic deactivation/log-off etc. ) 
  • Centralized password management and strong/complex password policies (minimum length, complexity of characters, expiration of passwords etc.)   
  • Controlled access to e-mails and the Internet 
  • Anti-virus management  
  • Intrusion Prevention System management  

Encryption  

  • Encryption of external and internal communication via strong cryptographic protocols  
  • Encrypting PII/SPII data at rest (databases, shared directories etc.)   
  • Full disk encryption for company PCs and laptops   
  • Encryption of storage media  
  • Remote connections to the company networks are encrypted via VPN  
  • Securing the lifecycle of encryption keys  

Data Minimization

  • PII/SPI minimization in application, debugging and security logs  
  • Pseudonymization of personal data to prevent directly identification of an individual 
  • Segregation of data stored by function (test, staging, live) 
  • Logical segregation of data by role based access rights 
  • Defined data retention periods for personal data   

Security Testing

  • Penetration Testing for critical company networks and platforms hosting personal data 
  • Regular network and vulnerability scans   

2. Integrity. “Integrity refers to ensuring the correctness (intactness) of data and the correct functioning of systems. When the term integrity is used in connection with the term "data", it expresses that the data is complete and unchanged.”  

Appropriate change and log management controls are in place, in addition to access controls to be able to maintain the integrity of personal data such as:    

Change & Release Management  

  • Change and release management process including (impact analysis, approvals, testing, security reviews, staging, monitoring etc.)  
  • Role & Function based (Segregation of Duties) access provisioning on production environments    

Logging & Monitoring

  • Logging of access and changes on data  
  • Centralized audit & security logs   
  • Monitoring of the completeness and correctness of the transfer of data (end-to-end check)    

3. Availability. “The availability of services and IT systems, IT applications, and IT network functions or of information is guaranteed, if the users are able to use them at all times as intended.”    

We implement appropriate continuity and security measures to maintain the availability of its services and the data residing within those services:    

  • Regular fail-over tests applied for critical services  
  • Extensive performance/availability monitoring and reporting for critical systems  
  • Incident response programme  
  • Critical data either replicated or backed up (Cloud Backups/Hard Disks/Database replication etc.) 
  • Planned software, infrastructure and security maintenance in place (Software updates, security patches etc.)   
  • Redundant and resilient systems (server clusters, mirrored DBs, high availability setups etc.) located on off-site and/or geographically separated locations    
  • Use of uninterruptible power supplies, fail redundant hardware and network systems  
  • Alarm, security systems in place  
  • Physical Protection measures in place for critical sites (surge protection, raised floors, cooling systems, fire and/or smoke detectors, fire suppression systems etc.) 
  • DDOS protection to maintain availability   
  • Load & Stress Testing  

4. Data Processing Instructions. "Data Processing Instructions refers to ensuring that personal data will only be processed in accordance with the instructions of the data controller and the related company measures"  

We have established internal privacy policies, agreements and conduct regular privacy trainings for employees to ensure personal data is processed in accordance with customers’ preferences and instructions.   

  • Privacy and confidentiality terms in place within employee contracts 
  • Regular data privacy and security trainings for employees 
  • Appropriate contractual provisions to the agreements with sub-contractors to maintain instructional control rights 
  • Regular privacy checks for external service providers 
  • Providing customers full control over their data processing preferences 
  • Regular security audits 

Hulp nodig? Bel ons bekroonde supportteam via 078 48 20 46

We nemen graag je telefoontje aan.

GoDaddy guides GoDaddy guides

Prijzen zijn exclusief belastingen en ICANN-kosten.

  • Info GoDaddy
    • Over ons
    • Contact
    • Vertrouwenscentrum
    • Juridisch
  • Support
    • Productondersteuning
    • Misbruik melden
  • Hulpbronnen
    • Webmail
    • WHOIS
    • ICANN-bevestiging
    • Productcatalogus
    • Sitemap
  • Partnerprogramma's
    • Partners
    • Programma's van reseller
  • Account
    • Mijn producten
    • Verlengen en facturatie
    • Account maken
  • Winkelen
    • Domeinen
    • Websites
    • WordPress
    • Hosting
    • Webbeveiliging
    • E-mail en Office
    • Acties

België - Nederlands
Kies je land/regio
  • Argentina - Español
  • Australia - English
  • België - Nederlands
  • Belgique - Français
  • Brasil - Português
  • Canada - English
  • Canada - Français
  • Chile - Español
  • Colombia - Español
  • Danmark - Dansk
  • Deutschland - Deutsch
  • España - Español
  • Estados Unidos - Español
  • France - Français
  • Hong Kong - English
  • India - English
  • India - हिंदी
  • Indonesia - Bahasa Indonesia
  • Ireland - English
  • Israel - English
  • Italia - Italiano
  • Malaysia - English
  • México - Español
  • Nederland - Nederlands
  • New Zealand - English
  • Norge - Bokmål
  • Österreich - Deutsch
  • Pakistan - English
  • Perú - Español
  • Philippines - English
  • Polska - Polski
  • Portugal - Português
  • Schweiz - Deutsch
  • Singapore - English
  • South Africa - English
  • Suisse - Français
  • Suomi - Suomi
  • Sverige - Svenska
  • Svizzera - Italiano
  • Türkiye - Türkçe
  • United Arab Emirates - English
  • United Kingdom - English
  • United States - English
  • Venezuela - Español
  • Việt Nam - Tiếng Việt
  • Ελλάδα - Ελληνικά
  • Россия - Русский
  • Україна - Українська
  • الإمارات العربية المتحدة - اللغة العربية
  • ไทย - ไทย
  • 대한민국 - 한국어
  • 台灣 - 繁體中文
  • 新加坡 - 简体中文
  • 日本 - 日本語
  • 香港 - 繁體中文
EUR
  • Juridisch
  • Privacybeleid
  • Advertentievoorkeuren
  • Cookies
Copyright © 1999 - 2020 GoDaddy Operating Company, LLC. Alle rechten voorbehouden. Het GoDaddy-woordmerk is een geregistreerd handelsmerk van Godaddy Operating Company, LLC in de VS en andere landen. Het logo “GO” is a een geregistreerd handelsmerk van GoDaddy.com, LLC in de VS.
Voor het gebruik van deze site gelden uitdrukkelijke gebruiksvoorwaarden. Door deze site te gebruiken, ga je ermee akkoord gebonden te zijn aan deze Universele servicevoorwaarden.