| My TeamDrive | Contact   +49 40 389 044 33


Home / Certification

Data security and data protection are the top priority for TeamDrive.

It was our aim to develop software that, with the help of the latest encryption technologies and a sophisticated network architecture, safeguards the confidentiality of all data and only allows access to authorized persons.

The results of our work have found an application in the TeamDrive system and in particular in the TeamDrive software. In order to verify our achievements, we commissioned accredited experts to audit the TeamDrive solution. The certifications that they provided were then assessed by the Independent Regional Centre for Data Protection of Schleswig-Holstein
(Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein (ULD)). In June 2016 the TeamDrive software (TeamDrive version 4) was awarded the Data Protection Seal of Privacy for its consistent and successful implementation of all aspects of data protection and data security. This was a re-certification for another two years.
(Test certificate number 2-3/2005, valid until June, 2nd, 2018).

Accredited auditor for IT security with the ULD in Kiel

Andreas Bethke
Dipl. Inf. (FH)
Graduate in Computer Science
Expert in IT products (technical)
approved by the Independent Regional Centre
for Data Protection of Schleswig-Holstein

Papenbergallee 34
25548 Kellinghusen

tel +49 4822 37 89 – 05
fax +49 4822 37 89 – 04
mobile +49 179 321 97 88

email: gutachter@datenschutz-guetesiegel.sh
web: www.datenschutz-guetesiegel.sh

Stephan Hansen-Oest
Expert in IT products (legal) approved by the Independent
Regional Centre for Data Protection of Schleswig-Holstein

Speicherlinie 40
24937 Flensburg

tel +49 0461 – 213 53
fax +49 0461 – 221 42
mobile +49 0171 – 20 44 98 1

e-mail sh@datenschutzkontor.de

It is generally a matter of the compliance of the product with the regulations on data protection and data security. Particular value is attached to the issues of data avoidance and minimization, data security and traceability and the safeguarding of the rights of those concerned. The ULD makes a catalogue of requirements for IT products available that covers both legal and technical aspects. This is revised at regular intervals.
The certificates are issued by the experts and expert test centres accredited by the Independent Regional Centre for Data Protection of Schleswig-Holstein (ULD). Accreditation by the ULD depends on providing proof of the necessary expertise, reliability and independence. The ULD keeps a public list of its accredited experts and test centres. You will find application forms and the list on our homepage.
The length of the process depends on a combination of the time it takes for the experts to certify the product and for the ULD to approve that certification. The main factor that affects the certification period is the complexity of the product, although the quality of the documentation and the user instruction manual also play a part. In practice, it normally takes a few months. If flaws are identified in the certification process, rectifying them can prolong the certification period. The same applies to the approval process, which is determined by the complexity of the product and the quality and completeness of the certification. Here, too, a period of a few months is to be expected in practice, especially if there are questions for the auditors or manufacturers and the experts are required to provide greater detail in their certificate.
Federal Office for Security in Information Technology (Bundesamt für Sicherheit in der Informationstechnik (BSI))
Basic IT security – the basis for IT safetyMany work processes are controlled electronically and large volumes of information are stored, processed and transferred over networks in digital form. As a result, business and official institutions and each individual citizen depend on the smooth functioning of the IT that we use.In view of the varied and growing potential risks and our increasing dependence, all users are faced with the following questions when it comes to IT security: how, where and by what means can I ensure greater security?Further information under: Basic IT security