Security

Data Protection

  • Encryption: Participants’ data is encrypted both in transit and at rest to protect against unauthorized access.
  • Secure Storage: Secure storage methods are used for personal data and photographs submitted by participants.
  • Access Control: Access control measures, such as role-based access, are implemented to ensure that only authorized personnel can access sensitive data.

Website Security

  • HTTPS Protocol: The website uses HTTPS to secure all communications between participants and the server.
  • Firewall Protection: Firewalls are used to protect the website from malicious attacks.
  • Regular Security Audits: Regular security audits are conducted to identify and address vulnerabilities.

Data Privacy

  • Compliance with Laws: The processing of personal data complies with data protection laws.
  • Consent Management: Participants’ consent is obtained for the use of their personal data and photographs.

Security Updates

  • Software Updates: The website’s software is regularly updated to protect against known vulnerabilities.