ISO 27001 Information Security
Our information security is based on ISO 27001
ISO 27001 requires an ISO 27001 compliant ISMS framework to be established to summarize policies and procedures to protect an organization's sensitive data, including intellectual property. This framework is based on the processes, people, technologies, and procedures required for information security controls to secure systems and devices and protect data from unauthorized access that may result in data misuse, data disclosure, disruption, data manipulation, or data destruction. In addition, ISMS policies and procedures help reduce data risk from cyberattacks and internal threats through risk assessment. An ISMS can also better comply with a variety of data protection regulations such as the General Data Protection Regulation (GDPR) by enforcing integrity, confidentiality and data availability.
Implementation in practice:
Daily data backup and outsourcing of security-relevant data to external data drives offer the highest level of data security. Employee training on the dangers of cybercrime should include: contribute to increasing the sensitivity of employees when dealing with the email program and the Internet.
Firewall and multiple spam filters and virus filters ensure that LiDi is protected as far as possible.
Regular checks by an external IT company are intended to further increase our data security.