Security, Privacy and Compliance Information

Content

Security, privacy and compliance topics has been, and continues to be, a top priority for Quadient.

On this page, you can find an overview of our security, privacy and compliance program.

 

 

Image
secure document delivery

Access our Quadient ICA Knowledge Base

Access

Access our Quadient MRS Knowledge Base

Access

Main security, privacy and compliance areas

This chapter serves as an overview of Compliance, Security and Privacy controls implemented by Quadient group (hereinafter, “Quadient”). Such controls are applied on the Software as a Service (SaaS) solution Quadient Intelligent Communication Automation (“ICA”) platform including Impress, Inspire, Quadient Account Payable by Beanworks and Quadient Account Receivable by YayPay as further explained below. These controls are regularly reviewed by internal auditors and independent external auditors to provide that all controls are in place, working as intended and in line with both Quadient and its customers’ expectations.

ICA Services

The following ICA Services are provided as SaaS from the ICA platform for which Quadient uses Microsoft Azure (Azure) and Amazon Web Services (AWS):

Customer Experience Management (CXM)

Referring to Inspire solutions. For enterprises who wish to create exceptional customer experiences, we provide omnichannel software solutions and expertise that deliver compliant and meaningful customer interactions.

Intelligent Documentation Automation (IDA)

Referring to Impress solutions. For businesses who want to streamline document production processes and departmental workflows, we provide digital solutions that help automate communications and accelerate cash flow.

Account Receivables (AR)

Referring to “Quadient AR, by YayPay”. Automate Accounts Receivable to simplify the collection Process and reduce DSO.

Account Payables (AP)

Referring to “Quadient AP, by Beanworks”. Approve invoices and pay vendors remotely while reducing AP costs.

General

Compliance

Overview Committees

Policies

Team

Reports and Records

What can be shared

Privacy

Data Protection Officer

Data Breach Notification

Data Subjects Rights

Data Retention

Data Erasure

How to Contact Us

Privacy Statement

Product Security

Datacenters

Customer Data Separation

Quadient Access to Customer Data

Sub Processors

Security

Awareness

Acceptable Use

Access Control

Availability and Continuity

Asset Management

Backups

Business Continuity

Change Management

Cyber Insurance

Disaster Recovery

Encryption

Page Type
Protected
Off