Chief Information Security Officer

As head of development, Finn Ruijter has the necessary experience in the field of privacy and security. In the role of Chief Information Security Officer (CISO), he has ultimate responsibility for privacy and security. Finn maintains contacts with suppliers, monitors processes and provides support where necessary.


We work with the best parties in the industry to properly process and secure our and your data.


Security Measures

We strive to keep all data and personal information secure. To this end, we work closely with specialized partners. Furthermore, we have implemented various technical and organizational security measures to prevent loss of data or unauthorized access to your personal data.

  • logical access control, using passwords and two-factor authentication;
  • physical measures for access security;
  • organizational measures for access security;
  • Randomly check for policy compliance;
  • A secure internal network;
  • Continuous monitoring for policy compliance;
  • Securing network connections through Transport Layer Security (TLS) certificates.

Processor Agreement

The Processing Agreement consists of two inseparable parts. Part 1: the Data Pro Statement is available upon request a is specifically prepared for each client. Part 2: Standard Clauses for Processing together with Part 1 forms the Processing Agreement.

Data Pro Standard Clauses
Download here the 'Standard Clauses for Processing Part 2 of 2, version 1.0′ as part of the processing agreement.

Version Control
Data Pro Statement - Version 1.0, published on 1 January 2018
Standard clauses for processing operations - Version 1.0, published on 1 January 2018


Secure page for clients. View the current list of sub-processors.

Data Protection Officer

ICT Recht fulfills at the request of 2manydots the role of Data Protection Officer (DPO), also known as Data Protection Officer (FG).

Privacy Policy

Our privacy statement tells you about our data, what personal data is, what is meant by processing personal data, for what purposes we process your personal data, what your rights are, what we do to ensure that your personal data is processed securely and how long your personal data is kept. This privacy statement applies when you visit our website ( and/or enter into an agreement. Click here to read our privacy statement.


We have cyber security insurance with comprehensive coverage.