Your Data Security

The security of our customers and partners data is always our priority. At Heylean and we always meet the strictest security and compliance requirements for data security. Our employees, customers and partners are responsible for acting in accordance with these safety and compliance requirements. At Heylean, we apply Zero-Tolerance for data security requirements.

Data



OUR DATA SECURITY POLICY

You can find some of the most stringent security and compliance requirements. We are not able to share details of the data security policy due to operational security.

International Security Standards

Heylean customers and partners data is always hosted on systems that meet international security standards. These international standards, including but not limited to ISO/EIC 27001 - ISO/EIC 27017 - ISO/EIC 27018.

Regular Internal Audit

Our data center is subject to regular internal audits, including but not limited to technologies, employees and company internal practices. All physical and software systems are regularly audited and monitoring to prevent data breaches and possible data breaches.

Employee Compliance Requirements

Our employees are subject to regular security screening for the data security of our customers, physical and software-defined systems. In addition, any Heylean employee cannot gain physical and software-based access to the unauthorized system. If access to the relevant data is required, only authorized Heylean employees who have successfully completed the data security orientation processes, who have passed a security screening and whose result is positive, can access this data within the framework of the data access policy.

Monitoring

Heylean physical and software-defined systems are monitored 24 hours a day, 7 days a week. Physical and software-defined monitoring is carried out continuously to prevent possible data breaches, detect cyber attacks, prevent unauthorized physical access and operate systems.

Security Test

Heylean physical and software systems are regularly subjected to a series of security and reliability tests. These security and reliability tests are carried out to prevent a possible threat and vulnerability. All security and reliability tests are carried out in two separate processes, manually and autonomously powered by Artificial Intelligence.