Web hosting is necessary to put your website online and receive emails. From €0 you can start with us.
Web hosting you need to put your CMS online and receive emails.
Your domain name is your place on the Internet. It's the url people need to find you and use to mail you professionally.
Web hosting is necessary to put your website online and receive emails. From €0 you can start with us.
with 24/7 support
for your CMS
Your domain name is your place on the Internet. It's the url people need to find you and use to mail you professionally.
your place in the World Wide Web
This processor agreement applies to the processing of personal data by Digi Hosting on behalf of its customers and has been drafted in accordance with the General Data Protection Regulation (AVG).
This agreement governs the rights and obligations of Digi Hosting (hereinafter "the Processor") and the customer (hereinafter "the Processor") with respect to the processing of personal data. This agreement applies when Digi Hosting processes personal data on behalf of the customer, in the context of the provision of web hosting services and related services.
Digi Hosting processes the following categories of personal data:
Contact and identification information (such as name, e-mail address);
IP addresses;
Domain names;
User names;
Membership information;
Analysis and usage data;
Order history and contract information;
Communication and support requests;
Images;
Any other personal data stored by the customer.
Processing will only take place based on written instructions from the customer, unless laws or regulations require otherwise.
Personal data is processed solely for the purpose of providing the agreed services, including web hosting, email services, domain registration, technical support, backups and security measures.
Digi Hosting undertakes to:
Process personal data only as instructed by the customer;
Ensure confidentiality by requiring its employees to maintain secrecy;
Implement appropriate technical and organizational security measures (see Appendix 1);
Assisting the client with data subject requests, data breach notifications, and conducting DPIAs;
Return or delete data upon completion of services, at the client's request, unless legal retention obligations require otherwise.
Digi Hosting uses carefully selected sub-processors for the performance of its services. These sub-processors also comply with the requirements of the AVG.
The following sub-processors are used:
Subprocessor | Function | Location |
---|---|---|
Hetzner Online GmbH | Data Center | Germany, Finland |
OVHCloud | Data Center | France |
OpenProvider | Domain registration |
Netherlands |
CBA Lochristi | Accounting |
Belgium |
Bill To Box | Accounting |
Belgium |
If a security breach occurs that results in loss, theft or unauthorized access to personal data, Digi Hosting will notify the customer immediately and no later than 72 hours, with all relevant information.
Digi Hosting will cooperate with customer requests regarding the exercise of rights of data subjects, such as inspection, correction, deletion or data portability, insofar as this is within the capabilities of the service.
This processor agreement is valid as long as Digi Hosting processes personal data on behalf of the customer. After termination of the agreement, the personal data will be deleted or returned at the request of the customer, unless storage is required by law.
This appendix forms an integral part of the Processor Agreement between the Controller and Digi Hosting. It outlines the technical and organizational security measures taken by Digi Hosting to protect the processing of personal data in accordance with the requirements of the General Data Protection Regulation (AVG).
Security Ownership
Digi Hosting has appointed an information security officer in charge of coordinating, implementing and monitoring applicable security measures and procedures. This officer is supported by a management-level internal governing body that oversees the security policy.
Security roles and responsibilities
Digi Hosting employees who have access to personal data are subject to strict confidentiality obligations. These obligations are emphasized at the start of employment and periodically brought to their attention.
Risk management
Digi Hosting systematically conducts risk assessments prior to processing personal data or commissioning new services. The risk management procedure focuses on identifying, prioritizing and mitigating potential risks. Backup facilities are structurally embedded in the services.
Document Management
Security documentation is retained in accordance with legal and contractual retention obligations, even if these documents have formally expired.
Inventory of information assets
Digi Hosting maintains a detailed inventory of all data carriers on which personal data is stored. Access to this inventory is reserved solely for authorized and written personnel.
Management of information carriers
Digi Hosting classifies personal data to ensure appropriate access restrictions and protection levels.
Employees must obtain prior explicit consent for processing personal data on portable devices, outside company facilities or via remote access.
Awareness and training
All Digi Hosting employees are instructed regarding their security responsibilities. They receive periodic training and education on relevant procedures and recognizing current threats.
Access security to facilities
Physical access to locations where personal data is processed is restricted to authorized individuals based on identification and access control.
Security of information carriers
Physical data carriers containing personal data are stored in secure areas with access restrictions.
Protection against calamities
Digi Hosting uses industry-standard facilities to protect against disruptions due to power outages, fire, flooding and other risks.
Data removal
Personal data is destroyed in accordance with industry-standard procedures once it is no longer necessary for the purposes of processing.
Policies and procedures
Digi Hosting has current documentation of its security policies, including procedures and responsibilities of employees with access to personal data.
Recovery procedures
Reserve copies of personal data are stored in geographically separate locations.
Access to this data is strictly regulated and documented.
Malware Protection
Measures have been implemented to protect against malicious software, including virus scanners and network filters.
Logging
Access and usage activities related to systems processing personal data are recorded in log files, including user ID, time, access status and relevant actions.
Encryption
Data transmission over the Internet is based on encryption techniques in accordance with current standards.
Policy
Digi Hosting maintains an access control policy that defines which employees have access to which systems and data.
Authorization management
Inactive access data is automatically deactivated after a period of inactivity.
Only authorized personnel may grant, modify or revoke permissions.
Each user has a unique login identifier.
Minimal access
Access to personal data is limited to employees for whom it is necessary as part of their duties.
Session management and password protection
Sessions are automatically terminated upon inactivity or upon leaving the workstation.
Passwords are stored in a manner that guarantees irreversible encryption.
Authentication
Access to information systems is granted based on strong authentication procedures.
Passwords are regularly renewed, and expired or deactivated accesses are not reused.
Unauthorized access attempts are detected and logged.
Password management meets industry standards.
Network Security
Network architecture and access rights are designed to prevent unauthorized access to personal data.
Reporting and recording of security incidents
Digi Hosting records all security incidents including the nature, duration, impact, data involved, and measures taken.
In the event of a data breach, notification will be made to the Controller without undue delay, and at the latest within 72 hours.
Transparency in data disclosure
Data access is logged indicating nature, recipient and time.
Emergency Procedures
Digi Hosting maintains comprehensive emergency and disaster recovery plans for all data processing sites.
Redundancy and recovery
The redundant storage structure and recovery procedures are in place so that personal data can be restored to the last known complete state prior to an incident.
These security measures are periodically evaluated and adapted to the current state of the art and risk assessment, with a view to continuing protection of the Personal Data of the Processing Controller.
These terms and conditions are subject to printing errors.