Thousands of businesses use Howspace as a platform to deliver impactful change projects. These businesses trust us to ensure their data is secure, available, and protected.
The information on this page is here to provide transparency on how we protect your data. If you can't find what you're looking for, please email us at firstname.lastname@example.org.
All data in each workspace is stored as a separate database located in Howspace servers. Backups from the service's database are created at least once a day and are stored on a separate server. The service's logs are also stored in a separate server at least once a day. Howspace also accumulates the necessary customer data (contact information, invoicing details etc.) to conduct its business.
Humap Software uses the data only to ensure a functioning service. The ownership and usage rights stay with the data controller (usually the workspace owner). Backups and logs are deleted automatically in 7-180 days and are used only for maintenance of the service.
Data of Humap Software’s customers is protected within the organization according to Humap Software’s Corporate Security Policy. Humap Software's Corporate Security Policy has been composed to describe the principles of corporate security followed in the company. The Policy describes the goals, processes, essential tasks and responsibilities of corporate security. The data in physical server premises is also protected by adequate security measures.
Yes. The requirements for data privacy and the data subject rights stated in GDPR are fulfilled in Howspace. Read more about the Howspace GDPR here.
The service is designed to be available continuously without interruptions. Service availability and underlying servers are monitored 24/7. If a failure is detected, technical persons are informed immediately.
Technical persons act on monitoring information at least during support hours of 09:00-16.30 Finnish time during work days.
The system maintained and provided by Humap Software gathers data logs, by which it is possible to monitor the use of the system by user rights, possible information security breaches and threats and detailed information thereof. The users of the system are identified by email addresses and the use of the system may be monitored by exploiting data logs. Service availability and underlying servers are monitored 24/7.