message disclaimer

title

body
Danmark
  • Domæner
  • Hjemmesider
  • WordPress
  • Hosting
  • Websikkerhed
  • E-mail og Office
  • Specialtilbud
  • Partner-programmer
  • Mere
  • Find et domæne
  • Søg domænenavne
  • Massesøgning efter domæner
  • Nye domæneendelser
  • Domænemægler
  • Domænenavns-generator
  • Domænetjenester
  • Flytning af domæne
  • WHOIS
  • Værdiansættelse af domæne
  • Auktioner
  • Domæneauktioner
  • Sæt et domæne på auktion
  • Priser
  • Domæne-investeringsværktøjer
  • Domæne reservation
  • Domæne-investering
Gd Nav Domains 2X Få mere at vide om domæner
  • Hjemmesider + Markedsføring
  • Hjemmesideprogram
  • Digital marketingpakke
  • Søgemaskineoptimering
  • WordPress
  • WordPress-websites
Img Mega Nav Wm Udforsk hjemmesidemuligheder
  • Privat og erhverv
  • WordPress-hosting
  • WordPress E-handel + Hosting
  • Designere og udviklere
  • Administrationsværktøjer til hjemmeside
Img Mega Nav Wordpress Få mere at vide om WordPress
  • Hosting af hjemmesider
  • Webhosting
  • Business-hosting
  • WordPress-løsninger
  • WordPress-hosting
  • WordPress E-handel + Hosting
  • Servere
  • VPS-hosting
  • Dedikeret servere
Gd Nav Hosting 2X Få mere at vide om hosting
  • SSL-certifikater
  • SSL-certifikater
  • EV SSL-certifikater
  • OV SSL-certifikater
  • DV SSL-certifikater.
  • SAN SSL-certifikat
  • Vilkårlige SSL-certifikater
  • Hjemmesidebeskyttelse
  • Hjemmeside-sikkerhed
  • Sikkerhedskopiering af hjemmeside
  • Sikkerhedsressourcer
  • Vejledning til SSL-certifikat
Gd Nav Websecurity 2X Få mere at vide om websikkerhed
  • Produktivitet
  • Professionel e-mail
  • Microsoft Office
Gd Nav Email 2X Få mere at vide om E-mail og Office
  • Tilbud
  • Rabatkodekuponer
  • Vis koder
Img Mega Nav Coupon Codes Rabatkodekuponer Gd Nav Promos 03 2X Fornyelseskoder
  • Programmer
  • Partnere
  • GoDaddy Pro – designere og udviklere
  • Forhandlerprogrammer
Gd Nav Partners 01 2X Partnere Gd Nav Partners 03 2X GoDaddy Pro Img Mega Nav Resellers Program Forhandlerprogram
Kontakt os

Ring til os

24/7 support på engelsk
36 92 77 33

Global opslagsliste
Telefonnumre og åbningstider

Hjælpecenter

Udforsk vores ressourcer til onlinehjælp

Få hjælp

Hjælp

Meddelelser

  • Du har ingen meddelelser.
    De er her, når du modtager dem.

Log ind
Hurtige link
  • Kontrolpanel-links:
  • Administrer domæner
  • Administrer Hjemmesideprogram
  • Administrer hosting
  • Administrer SSL-certifikater
  • Administrer e-mail
  • Links til indbakke:
  • Log på Office 365 e-mail
  • Log på GoDaddy Webmail
Registrerede brugere

Har du en konto? Log på nu.

Log ind
Ny kunde

Er det første gang, du bruger GoDaddy? Opret en konto, og kom i gang i dag.

Opret min konto
{{displayName}}
Kundenr.:{{shopperid}} | PIN-kode: Vis
  • GoDaddy Pro
  • Mine produkter
  • Kontoindstillinger
  • Fornyelse og afregning
Besøg Min konto Log af
Gå til kassen nu
GoDaddy

Sikkerhedsstandarder
Sidst revideret: 9. maj 2018

I.  Technical and Organizational Measures

We are committed to protect our customers' information.  Taking into account the best practices, the costs of implementation and the nature, scope, circumstances and purposes of processing as well as the different likelihood of occurrence and severity of the risk to the rights and freedoms of natural persons we take the following technical and organizational measures.  When selecting the measures the confidentiality, integrity, availability and resilience of the systems are considered. A quick recovery after a physical or technical incident is guaranteed.

II.  Data Privacy Program

1. Confidentiality. “Confidentiality means that personal data is protected against unauthorized disclosure.”  

We use a variety of physical and logical measures to protect the confidentiality of its customers' personal data. Those measures include:   

Physical Security  

  • Physical access control systems in place (Badge access control, Security event monitoring etc.) 
  • Surveillance systems including alarms and, as appropriate, CCTV monitoring  
  • Clean desk policies and controls in place (Locking of unattended computers, locked cabinets etc.)  
  • Visitor Access Management 
  • Destruction of data on physical media and documents (shredding, degaussing etc.) 

Access Control & Prevention of Unauthorized Access

  • User access restrictions applied and role-based access permissions provided/reviewed based on segregation of duties principle  
  • Strong authentication and authorization methods (Multi-factor authentication, certificate based authorization, automatic deactivation/log-off etc. ) 
  • Centralized password management and strong/complex password policies (minimum length, complexity of characters, expiration of passwords etc.)   
  • Controlled access to e-mails and the Internet 
  • Anti-virus management  
  • Intrusion Prevention System management  

Encryption  

  • Encryption of external and internal communication via strong cryptographic protocols  
  • Encrypting PII/SPII data at rest (databases, shared directories etc.)   
  • Full disk encryption for company PCs and laptops   
  • Encryption of storage media  
  • Remote connections to the company networks are encrypted via VPN  
  • Securing the lifecycle of encryption keys  

Data Minimization

  • PII/SPI minimization in application, debugging and security logs  
  • Pseudonymization of personal data to prevent directly identification of an individual 
  • Segregation of data stored by function (test, staging, live) 
  • Logical segregation of data by role based access rights 
  • Defined data retention periods for personal data   

Security Testing

  • Penetration Testing for critical company networks and platforms hosting personal data 
  • Regular network and vulnerability scans   

2. Integrity. “Integrity refers to ensuring the correctness (intactness) of data and the correct functioning of systems. When the term integrity is used in connection with the term "data", it expresses that the data is complete and unchanged.”  

Appropriate change and log management controls are in place, in addition to access controls to be able to maintain the integrity of personal data such as:    

Change & Release Management  

  • Change and release management process including (impact analysis, approvals, testing, security reviews, staging, monitoring etc.)  
  • Role & Function based (Segregation of Duties) access provisioning on production environments    

Logging & Monitoring

  • Logging of access and changes on data  
  • Centralized audit & security logs   
  • Monitoring of the completeness and correctness of the transfer of data (end-to-end check)    

3. Availability. “The availability of services and IT systems, IT applications, and IT network functions or of information is guaranteed, if the users are able to use them at all times as intended.”    

We implement appropriate continuity and security measures to maintain the availability of its services and the data residing within those services:    

  • Regular fail-over tests applied for critical services  
  • Extensive performance/availability monitoring and reporting for critical systems  
  • Incident response programme  
  • Critical data either replicated or backed up (Cloud Backups/Hard Disks/Database replication etc.) 
  • Planned software, infrastructure and security maintenance in place (Software updates, security patches etc.)   
  • Redundant and resilient systems (server clusters, mirrored DBs, high availability setups etc.) located on off-site and/or geographically separated locations    
  • Use of uninterruptible power supplies, fail redundant hardware and network systems  
  • Alarm, security systems in place  
  • Physical Protection measures in place for critical sites (surge protection, raised floors, cooling systems, fire and/or smoke detectors, fire suppression systems etc.) 
  • DDOS protection to maintain availability   
  • Load & Stress Testing  

4. Data Processing Instructions. "Data Processing Instructions refers to ensuring that personal data will only be processed in accordance with the instructions of the data controller and the related company measures"  

We have established internal privacy policies, agreements and conduct regular privacy trainings for employees to ensure personal data is processed in accordance with customers’ preferences and instructions.   

  • Privacy and confidentiality terms in place within employee contracts 
  • Regular data privacy and security trainings for employees 
  • Appropriate contractual provisions to the agreements with sub-contractors to maintain instructional control rights 
  • Regular privacy checks for external service providers 
  • Providing customers full control over their data processing preferences 
  • Regular security audits 

Har du brug for hjælp? Ring til vores prisvindende supportteam på 36 92 77 33

Vi vil gerne tale med dig.

GoDaddy guides GoDaddy guides

Priser inkluderer ikke gældende afgifter og ICANN-gebyrer.

  • Om GoDaddy
    • Om os
    • Kontakt os
    • Sikkerhedscenter
    • Juridisk meddelelse
  • Support
    • Produktsupport
    • Rapportér misbrug
  • Ressourcer
    • Webmail
    • WHOIS
    • ICANN-bekræftelse
    • Produktkatalog
    • Oversigt over hjemmeside
  • Partner-programmer
    • Partnere
    • Forhandlerprogrammer
  • Konto
    • Mine produkter
    • Fornyelse og afregning
    • Opret konto
  • Indkøb
    • Domæner
    • Hjemmesider
    • WordPress
    • Hosting
    • Websikkerhed
    • E-mail og Office
    • Specialtilbud

Danmark - Dansk
Vælg dit land/område
  • Argentina - Español
  • Australia - English
  • België - Nederlands
  • Belgique - Français
  • Brasil - Português
  • Canada - English
  • Canada - Français
  • Chile - Español
  • Colombia - Español
  • Danmark - Dansk
  • Deutschland - Deutsch
  • España - Español
  • Estados Unidos - Español
  • France - Français
  • Hong Kong - English
  • India - English
  • India - हिंदी
  • Indonesia - Bahasa Indonesia
  • Ireland - English
  • Israel - English
  • Italia - Italiano
  • Malaysia - English
  • México - Español
  • Nederland - Nederlands
  • New Zealand - English
  • Norge - Bokmål
  • Österreich - Deutsch
  • Pakistan - English
  • Perú - Español
  • Philippines - English
  • Polska - Polski
  • Portugal - Português
  • Schweiz - Deutsch
  • Singapore - English
  • South Africa - English
  • Suisse - Français
  • Suomi - Suomi
  • Sverige - Svenska
  • Svizzera - Italiano
  • Türkiye - Türkçe
  • United Arab Emirates - English
  • United Kingdom - English
  • United States - English
  • Venezuela - Español
  • Việt Nam - Tiếng Việt
  • Ελλάδα - Ελληνικά
  • Россия - Русский
  • Україна - Українська
  • الإمارات العربية المتحدة - اللغة العربية
  • ไทย - ไทย
  • 대한민국 - 한국어
  • 台灣 - 繁體中文
  • 新加坡 - 简体中文
  • 日本 - 日本語
  • 香港 - 繁體中文
DKK
  • Juridisk meddelelse
  • Politik for beskyttelse af personlige oplysninger
  • Reklamepræferencer
  • Cookies
Copyright © 1999-2020 GoDaddy Operating Company, LLC. Alle rettigheder forbeholdes. GoDaddy-ordmærket er et registreret varemærke tilhørende GoDaddy Operating Company, LLC i USA og andre lande. "GO"-logoet er et registreret varemærke tilhørende GoDaddy.com, LLC i USA.
Brug af dette website er underlagt udtrykkelige brugsbetingelser. Ved at bruge dette website accepterer du, at du er bundet af disse generelle servicebetingelser.