A closer look at Userlike's data security measures
- Does Userlike use SSL encryption?
- Can I use Userlike on-premises?
- Do you have any password requirements implemented?
- What kind of data is being logged in my Userlike account and how can I access the data?
- Does Userlike offer a single sign-on option?
- Where can I find the contact details of the IT security officer and the data protection officer of Userlike and Hetzner?
- Can you demonstrate your TOMs (Technical and Organizational Measures) for data security accordingly?
- Is the connection between the provider and end user encrypted using a suitable encryption method?