Neghotel

Private hotel rate negociation

Compliance

ISO 27001:2022

SOC 2

SOC 2

Resources

View all 3 resources

DPA

Terms of Service

Privacy policy

Controls

View all controls

Infrastructure security

Unique production database authentication

Encryption key access restricted

Unique account authentication enforced

Infrastructure security

Unique production database authentication

Encryption key access restricted

Unique account authentication enforced

Infrastructure security

Unique production database authentication

Encryption key access restricted

Unique account authentication enforced

Organizational security

Asset disposal procedures utilized

Continuity and Disaster Recovery plans established

Portable media encrypted

Organizational security

Asset disposal procedures utilized

Continuity and Disaster Recovery plans established

Portable media encrypted

Organizational security

Asset disposal procedures utilized

Continuity and Disaster Recovery plans established

Portable media encrypted

Product security

Data encryption utilized

Control self-assessments conducted

Penetration testing performed

Product security

Data encryption utilized

Control self-assessments conducted

Penetration testing performed

Product security

Data encryption utilized

Control self-assessments conducted

Penetration testing performed

Internal security procedures

Continuity and Disaster Recovery plans establis

Continuity and disaster recovery plans tested

Cybersecurity insurance maintained

Internal security procedures

Continuity and Disaster Recovery plans establis

Continuity and disaster recovery plans tested

Cybersecurity insurance maintained

Internal security procedures

Continuity and Disaster Recovery plans establis

Continuity and disaster recovery plans tested

Cybersecurity insurance maintained

Data and privacy

Data retention procedures established

Customer data deleted upon leaving

Data classification policy established

Data and privacy

Data retention procedures established

Customer data deleted upon leaving

Data classification policy established

Data and privacy

Data retention procedures established

Customer data deleted upon leaving

Data classification policy established

Data collected

Employee personally identifiable information

Customer personally identifiable information

Credit card information

Personal health information

Subprocessors

View all 10 subprocessors

Logo for Stripe

Stripe • Finance and payments

Supabase • Data storage

OpenAI • Large Language Models

Logo for Stripe

Framer • Infrastructure

FAQ

View all 5 FAQs

Why is cybersecurity important?

Cybersecurity is crucial in today's digital age because it helps to prevent unauthorized access to sensitive information, safeguard personal privacy, protect against financial losses,

Why is cybersecurity important?

Cybersecurity is crucial in today's digital age because it helps to prevent unauthorized access to sensitive information, safeguard personal privacy, protect against financial losses,

Why is cybersecurity important?

Cybersecurity is crucial in today's digital age because it helps to prevent unauthorized access to sensitive information, safeguard personal privacy, protect against financial losses,

What are common types of cyber threats?

What are common types of cyber threats?

What are common types of cyber threats?

How can I protect my information online?

How can I protect my information online?

How can I protect my information online?