
Neghotel
Private hotel rate negociation
Compliance
ISO 27001:2022

SOC 2
Resources
View all 3 resources
DPA
Terms of Service
Privacy policy
Controls
View all controls
Infrastructure security

Unique production database authentication

Encryption key access restricted

Unique account authentication enforced
Infrastructure security

Unique production database authentication

Encryption key access restricted

Unique account authentication enforced
Infrastructure security

Unique production database authentication

Encryption key access restricted

Unique account authentication enforced
Organizational security

Asset disposal procedures utilized

Continuity and Disaster Recovery plans established

Portable media encrypted
Organizational security

Asset disposal procedures utilized

Continuity and Disaster Recovery plans established

Portable media encrypted
Organizational security

Asset disposal procedures utilized

Continuity and Disaster Recovery plans established

Portable media encrypted
Product security

Data encryption utilized

Control self-assessments conducted

Penetration testing performed
Product security

Data encryption utilized

Control self-assessments conducted

Penetration testing performed
Product security

Data encryption utilized

Control self-assessments conducted

Penetration testing performed
Internal security procedures

Continuity and Disaster Recovery plans establis

Continuity and disaster recovery plans tested

Cybersecurity insurance maintained
Internal security procedures

Continuity and Disaster Recovery plans establis

Continuity and disaster recovery plans tested

Cybersecurity insurance maintained
Internal security procedures

Continuity and Disaster Recovery plans establis

Continuity and disaster recovery plans tested

Cybersecurity insurance maintained
Data and privacy

Data retention procedures established

Customer data deleted upon leaving

Data classification policy established
Data and privacy

Data retention procedures established

Customer data deleted upon leaving

Data classification policy established
Data and privacy

Data retention procedures established

Customer data deleted upon leaving

Data classification policy established
Data collected
Employee personally identifiable information
Customer personally identifiable information
Credit card information
Personal health information
Subprocessors
View all 10 subprocessors

Stripe • Finance and payments
Supabase • Data storage
OpenAI • Large Language Models

Framer • Infrastructure
FAQ
View all 5 FAQs
Why is cybersecurity important?
Cybersecurity is crucial in today's digital age because it helps to prevent unauthorized access to sensitive information, safeguard personal privacy, protect against financial losses,
Why is cybersecurity important?
Cybersecurity is crucial in today's digital age because it helps to prevent unauthorized access to sensitive information, safeguard personal privacy, protect against financial losses,
Why is cybersecurity important?
Cybersecurity is crucial in today's digital age because it helps to prevent unauthorized access to sensitive information, safeguard personal privacy, protect against financial losses,
What are common types of cyber threats?
What are common types of cyber threats?
What are common types of cyber threats?
How can I protect my information online?
How can I protect my information online?
How can I protect my information online?

