Protecting your data is our top priority

To ensure the security of your data, we use world-class encryption technologies, advanced firewalls and access controls, conduct regular security audits by outside experts, and have industry-leading certification.

Untitled

We always strive to establish world-class security standards and, to this end, have fully implemented the information security controls defined as a minimum requirement by the International Organization for Standardization (ISO).

You can find our ISO 27001: 2017 certificate in english language here.

tchop protects your data based on a comprehensive, TÜV-certified information security management system. This security system continuously checks the product and platform for vulnerabilities and uses industry-leading security technologies. In doing so, we follow state-of-the-art Defense-in-Depth concepts to protect data.

The core guidelines of our information security management system (ISMS) you can find here:

Information Security Policy (Public Version)

Interested contacts on the customer side can gain insight into the details of our management system, as far as this is possible against the background of confidentiality.

The basics of our information security approach

Virtual private cloud

Operational security

Complete and secure encryption

Compliance with regulatory requirements

High availability

Customer access control

TÜV certified

Untitled

The independent testing organization TÜV Süd has confirmed the correct application of our information security management system (ISMS) by certifying it in accordance with ISO 27001:2017 at the beginning of 2023.

We were audited in English, as our ISMS is also written in English. This is done against the background of our international workforce. tchop internally communicates exclusively in English.

ISO/IEC 27001 is the leading international standard for information security management systems (ISMS) and therefore the most important cyber security certification. It provides organisations of all sizes with clear guidelines for planning, implementing, monitoring and improving their information security. The requirements are generally applicable and apply to private as well as public companies or non-profit institutions.