Lock icon representing robust security on tchop platform that protects users privacy and data

Security & GDPR

Audited and certified by industry leading standards

The protection of your users privacy and all of your data is one of our top priorities and has deeply influenced our technical architecture, the selection of our tools and frameworks as well as a lot of business decisions along the way.

Lock icon representing robust security on tchop platform that protects users privacy and data

Security & GDPR

Audited and certified by industry leading standards

The protection of your users privacy and all of your data is one of our top priorities and has deeply influenced our technical architecture, the selection of our tools and frameworks as well as a lot of business decisions along the way.

Lock icon representing robust security on tchop platform that protects users privacy and data

Security & GDPR

Privacy and security are our highest priorities.

The protection of your users privacy and all of your data is one of our top priorities and has deeply influenced our technical architecture, the selection of our tools and frameworks as well as a lot of business decisions along the way.

As the data controller, tchop GmbH has implemented numerous technical and organizational measures to ensure the protection of personal data processed through this website in the best possible way.

tchop™ is ISO27001 certified through German TÜV Süd.

Please also read our Privacy Policy carefully, which you can find here.

In the following we describe key goals and implementations of our certified Information Security Management System (ISMS).

Focus on highest standards

tchop.io has achieved ISO 27001 certification by TÜV Süd in the year 2021. This prestigious certification underscores our commitment to the highest standards of information security management. With this certification, our users can trust that their data is protected by robust security protocols, ensuring confidentiality, integrity, and availability.

Secure hosting and data handling

The tchop platform is hosted on Amazon Web Services (AWS) and German Hetzner Cloud, which both comply to ISO 27001 and SSAE-16 standards, ensuring full data security. Enterprise clients can choose where they want their data to be hosed.

All information is encrypted using TLS 1.2 and PFS, security incidents are reported to our security team 24/7 and access to the tchop production servers is restricted. We do daily backups and have a contractually binding uptime of 99.9%.

Robust and secure architecture

Our platform architecture is designed to minimize the risk of a security breaches by permitting access to the minimal required systems only, while other systems, such as database servers, are only accessible internally. All traffic to our application servers is routed through our proxies and gateways. All other systems in our data centres never have direct access to the Internet - neither inbound nor outbound.

Protection

Our network is protected by redundant layer-4 firewalls, secure HTTPS-transport communication over public networks, VPN only access to our production and testing systems and key-based authentication for system administrators for maintenance purposes.

Security Incident Event Management

A security incident event management (SIEM) system gathers all available logs from our systems to analyze these for correlated events. The SIEM system notifies the tchop team about the event, so that the team can respond quickly.

DDoS protection

Distributed Denial of Service (DDoS) is mitigated by multiple tools, including 'AWS Shield' for our AWS servers, which provides always-on detection and automatic inline mitigations that minimize application downtime and latency.

Controlled access

Access to the tchop production environment is restricted to the core operations team. This includes frequently auditing and monitoring the accesses. All productive systems are secured by VPN and require key-based authentication.

Encryption in transit

All communication of our systems over public networks is encrypted using HTTPS with Transport Layer Security (TLS 1.2) and Perfect Forward Secrecy (PFS). We disabled SSLv3 on all systems to prevent security breaches.

Encryption at rest

All user passwords are encrypted by using best-practice one-way hash functions to minimize the impact of a data breach.

End-to-end encrypted chat

We use a secure end-to-end AES 256 and TLS 1.2 encryption for our chat. All chat messages and chat history are also stored fully encrypted on European servers only.

Uptime

We guarantee a minimum 99.9% uptime for the tchop platform. In the past we have usually in fact reached 99.99%. Also we are happy to provide references of long time clients, that can report the high availability of our services.

Redundancy

We do backups of all relevant systems in daily frequency and store these backups up to a month for restoring based on identified incidents. Also, all productive services of the tchop platform run at least in dual-mode to provide a fast performing failover. Our development team is equipped with plans for different scenarios and therefore is able to regain data in cases of emergency.

QA

We perform automated tests on our code base in order to ensure a maximum level on QA. Also, we follow a test-driven development approach and peer-review all code changes that are submitted to the code base by our team.

Secure environments

We work with testing and staging systems that are logically separated from production systems, so that we can rollout and improve on beta and alpha versions in an iterative process that never harms live services.

Secure credential storage

Passwords in tchop cannot be extracted, as they are stored in the database using bcrypt, a one-way-hash function designed to be collision free.

Security training

We periodically train our developers to be aware of common security risks for development as well as the data privacy of our customers' data.

Confidentiality agreement

All our team members have signed a confidentiality agreement to protect customer data, as well as agreements obligating them to comply with the data secrecy provisions of § 5 of the BDSG (Bundesdatenschutzgesetz) and the confidentiality of telecommunications (§ 88 Telecommunications Act).

Reduced access

Access to our production systems is reduced to a minimum set of people responsible for maintenance and operations. Only our management has access to the most sensitive spaces.

User management

We offer several ways for onboarding your users. They can be invited directly by email or phone number. Also users with a certain email domain can register without having been invited individually. Even when you do not know the email address of your users, you can invite them by generating unique access codes for one-time registration. Finally, you can use your own SSO for access management.

Data Processing Agreements (DPA)

Where required under applicable data protection law, we provide an agreement on commissioned data processing.

EU General Data Protection Regulation (GDPR)

tchop complies with the requirements of the EU General Data Protection Regulation and provides a secure communication platform that protects employee and customer data equally. The privacy rights of our customers and the security of their personal data are our highest priorities.

Logo

Platform

Solutions

Resources

Company

EN

Login

Logo
EN

Login

Logo
EN

Login

Grid pattern