Security
Data Protection
- Encryption: Participants’ data is encrypted both in transit and at rest to protect against unauthorized access.
- Secure Storage: Secure storage methods are used for personal data and photographs submitted by participants.
- Access Control: Access control measures, such as role-based access, are implemented to ensure that only authorized personnel can access sensitive data.
Website Security
- HTTPS Protocol: The website uses HTTPS to secure all communications between participants and the server.
- Firewall Protection: Firewalls are used to protect the website from malicious attacks.
- Regular Security Audits: Regular security audits are conducted to identify and address vulnerabilities.
Data Privacy
- Compliance with Laws: The processing of personal data complies with data protection laws.
- Consent Management: Participants’ consent is obtained for the use of their personal data and photographs.
Security Updates
- Software Updates: The website’s software is regularly updated to protect against known vulnerabilities.