Security & Compliance

Welcome to the Security & Compliance Hub.

SUCCESS IS BUILT ON TRUST

And trust starts with information. On this page, you can read about Outbound & Flows by Enreach's security measures and how we ensure that we are in GDPR Compliance.

We guarantee that your data is in safe hands with us!


GDPR

Outbound & Flows by Enreach is GDPR and ISO27001 compliant.

As part of our Information Security Management System, our solutions and all aspects related to the delivery of them – from all technical and organizational measures to the entire value chain – are reviewed annually by external, independent IT auditors based on the ISAE 3402 and ISAE 3000 audit standards. You can download and read the full reports here.


Legal documents

There are in total four Legal Documents defining our relation as vendor/customer, as well as data processor/data controller. These are: The contract; the terms and conditions; the Data Processing Agreement; and our Data Privacy & Platform Security Legal Documents. Read about them here.


Data hosting

Our services are co-located across Danish data centers and AWS in Dublin and Frankfurt.

Physical servers are hosted in our racks in data centers in Denmark, and virtual servers are hosted in the AWS data centers in Frankfurt, Germany, and Dublin, Ireland.

Production data is hosted in EU-based data centers only, and no data ever leaves the European Union.

To see the overall architecture and security setup is illustrated click here.


Sub-data processors

When using Outbound & Flows by Enreach, the following sub-data processors are used to provide you with our services securely: Outbound by Enreach & Flows by Enreach


Security & Compliance FAQ

Click a link below to head to a section, or use your browser's search function to search for specific keywords or phrases:



Other Resources:

Outbound & Flows product collateral (SharePoint access required)

Most recent ISAE 3402 report (SharePoint access required)

Audit reports, legal documentation, and sub-data processers


Access Management & Cryptography 

Enreach Campaigns shall 1. describe its process for access management and how the access rights are managed throughout the lifecycle (e.g. process for requesting, approving, deploying, removing access rights to prove that only authorised persons have access the information). 2. describe how the authentication is performed (e.g. 1- or 2-factor authentication) for the different users (e.g. users, business administrators, it administrators) and machines accessing the information. 3. describe how the access to its own network is controlled for remote working or remote support and troubleshooting. (e.g. with strong authentication, access via a secure gateway, encrypted sessions, restricted network access, all troubleshooting activity logged and subject to independent review)   We have a string of procedures that ensure that access control and the allocation of rights occur in compliance with the established security level. Only employees with a work-related need for having access to systems and data are granted access to the concerned business systems and associated data. The heads of department are responsible for access rights being granted on the basis of a work-related need and in consideration of regulatory and contractual obligations. We have a number of controls that ensure that this occurs on an ongoing basis, and that all access corresponds to the work-related needs in each function and for each employee. We have defined a string of requirements for the protection of all devices (PCs, mobile phones, tablets) as well as passwords in all business systems. Employees are trained and checked continually within these areas. We have a number of procedures that ensure that only a group of privileged personnel has access to system administrator tools, central servers (e.g. domain controller), source code etc. Production servers and other servers containing production data and customer data are only present in Enreach Campaigns’ data centres and not at any office locations. Only specially trusted employees with a work-related need have access to the data centres. These accesses are assessed and inspected regularly. 
Enreach Campaigns shall describe the encryption key management process and responsibilities in case encryption is used.   We have procedures for the use of cryptography, including the generation and management of encryption keys and certificates. This means that Outbound by Enreach and Flows by Enreach must have a valid SSL certificate, which Enreach Campaigns verifies, such that data exchange only occurs in a secure and encrypted manner (through HTTPS). SSL-certificates are managed solely by the IT department, where the application architect and network administrator are responsible for SSL certificates. No certificates may be acquired or issued bypassing these. This requirement concerns access to Outbound by Enreach and Flows by Enreach through the user interface and through API alike. Databases are encrypted hence assuring encryption at rest also. Enreach Campaigns solely controls encryption keys. 
Are password for the application encrypted to prevent unauthorised or malicious re-use.  Yes, passwords are hashed and salted (using PBKDF2).
Does the application adhere to the below password settings: - Lockout Duration: 30 Minutes or Until Administrator Intervention - Password History: 10 Previous Passwords - Unsuccessful Logon Attempts: 6 - Minimum Characters: 8 Characters for Standard Users, 15 for Service/Generic and Privileged Accounts. - Complexity: Enabled, enforcing a combination of Upper and Lowercase Characters and use alphanumeric and special characters.- Maximum Password Age: 90 Days. - Minimum Password Age: 1 Day.  Yes, partial compliance. Fully support: Lockout duration, unsuccessful logon attempts, complexity rules (a combination of different character types and/or length). Do not support: Password history and age, we can however trigger password reset upon request from customer. 
Does the application terminate idle sessions after a reasonable period of inactivity?  Yes – Idle sessions are terminated after 30 mins or more. Sessions are flushed nightly (not more frequently by design to avoid interrupting wrapup after calls or admin work being paused). 
Is privileged access across Information Systems reviewed on a periodic basis?  Yes - Privileged access reviews are performed at least on a quarterly basis. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. 
At the application or infrastructure level, are service or technical accounts assigned to an individuals for accountability purposes? If yes, are these reviewed on a periodic basis?  Yes – Service accounts are used with accountability documented, which is reviewed periodically. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. 
Does the application ensure that information in transmission between two endpoints (Data in motion) is secured via an industry best practice encryption method?  Yes – Encryption mechanism is industry best practice. All data exchange takes place via https only. 
Is the data at rest secured via an Encryption method?  Yes – Encryption mechanism is industry best practice. Data is encrypted both in transit and in rest. 
Are controls in place to protect encryption keys from unauthorised access specific to encryption methods used for the application and underlying infrastructure?  Yes – Controls exist and are formally documented. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. 

Approved encryption solutions 

Does Enreach Campaigns only use encryption solutions that have been evaluated, documented and approved? Any exceptions shall be risk based, approved and documented. 

Yes.

Key management 

Does Enreach Campaigns have a documented procedure for cryptographic key management throughout their life-cycle, including generating, storing, archiving, retrieving, distributing, revoking and destroying keys?

Yes.

Asset Management

Enreach Campaigns shall describe how they keep an inventory, manage information and asset ownership, and classify information. 

All assets are defined with ownership, criticality, and technical dependencies such as services that are dependent on certain assets.

Servers, systems, network etc. are documented and available for relevant technical personnel. At the introduction of new equipment and new systems, or at changes to architecture and infrastructure, relevant documentation is updated to ensure that this is always up-to-date.

The acceptable use of systems for employees has been defined, which i.a. includes guidelines for accessing, using, and exporting data. Data is considered categorised according to GDPR’s categories for this purpose, and special procedures are applicable for certain types of data.

We have procedures concerning the management of portable devices, disposal of devices, as well as transport of portable, data-carrying devices, as well as for the classification and labelling of data. This means, for one thing, but is not limited to, that data solely must be stored in systems and on physical and virtual servers labelled and specified for the purpose.

Customer data must not in principle be present anywhere else, including locally, on USB sticks, on other disks (flash drives), and similar. An exception to this is if a customer has requested in writing to be handed over data, or if it is necessary to transport data between two servers, and the transmission cannot occur via network.  If data is stored temporarily on such USB sticks, drives and similar, data must, to the widest extent possible, be anonymised or pseudonymised, and the physical device (including folders on it) must be password protected.

As a rule, these devices must never be sent by regular mail to customers but must be transported by Enreach Campaign’s employees or picked up by the customer. When physical servers are decommissioned, and data on hard disks no longer needs to be present on the drives in question, these disks must either a) be formatted in such a way that restore of data no longer is possible, b) be physically destroyed and the disks disposed of by employees in Enreach Campaigns’ IT department, or c) both. 

Inventory of assets 

Have assets that contain, handle or process the data controller's information of any kind been identified, catalogued and included in an inventory which is maintained, updated and periodically reviewed?

Yes.

Ownership of assets 

Does each information asset have an appointed owner within the provider’s organisation who is responsible for the asset during the whole life cycle, including the implementation of appropriate technical and organisational security measures derived from the information classification?

Yes.

Rules for the acceptable use 

Does Enreach Campaigns have documented rules for the acceptable use of information assets within the organisation? In case Enreach Campaigns or its agents make use of the data controller's assets/equipment they shall not be used for non-data controller purposes. 

Yes.

Procedure for information classification 

Has Enreach Campaigns implemented a procedure for information classification and labelling, that ensures that the data controller's information receives an appropriate classification in accordance with its importance?

Yes.

Disposal of media 

Is there shall be a documented procedure that ensures secure disposal and re-use of equipment based on the information classification scheme?

Yes.

Compliance

Is Enreach Campaigns ISO27001 compliant, and is this documented?  Yes. Our company's ISMS is based on ISO27001, in which we are audited annually based on the ISAE3402 and ISAE3000 audit standards. You can download and read the full reports here.
Enreach Campaigns shall describe how Enreach Campaigns follows-up that the information and IT security controls are implemented. The description shall also include control of 3rd parties and how the Enreach Campaigns ensures the 3rd parties information and IT security.  We regularly check that rules and procedures are observed, followed, and documented. We ensure that we act in accordance with applicable legislation and furthermore that we adhere to the requirements posed to documentation by national legislation. We ensure that personal data is protected and processed in accordance with the Data Protection Act and GDPR. For years, we have used ISO 27001 as the framework of reference for information security in Enreach Campaigns and regarding the development and operations of Outbound by Enreach and Flows by Enreach. It has been embedded in the management that compliance with rules and procedures in our information security code of practice, including controls connected with rules and procedures, must be formalised, documented, and subject to annual audit by an independent external IT auditor, which is why we also in future will prepare ISAE 3402 and ISAE 3000 assurance reports. 
Enreach Campaigns shall describe if there are any limitations for customers to review the Enreach Campaigns, it’s provided Service(s) and applicable audit reports performed by 3rd parties. The response shall cover the potential usage of 3rd parties.  Full ISAE3402 and ISAE3000 audit reports are made available to customers through Enreach Campaigns website. Pen test reports are confidential and cannot be shared fully with end-customers. Reports are confidential and for internal use, they are provided to our auditors and key results are part of the audit reports if relevant. 
Enreach Campaigns shall describe the proposed routine of managing customers information at contract termination (e.g. is, how and when is the information removed? what actions are taken to protect the information?).  Customers have the possibility to delete all data in their setups. This is done by setting up deletion rules at project level in Outbound by Enreach, deleting all personal data stored in Outbound by Enreach. Should the contract be terminated, customers are able to request data to be handed back either via file exports (and upload to e.g. SFTP) prior to deletion. This will be agreed between the two parties as also defined in the DPA. 
Is Enreach Campaigns subject to annual penetration testing?  Yes, penetration tests are conducted at least annually by an external third party. Reports are confidential and for internal use, they are provided to our auditors and key results are part of the audit reports if relevant. 

Identification of applicable legislation and contractual requirements 

Are all contractual requirements and regulatory requirements, affecting and regulating information security for the service, identified, documented and kept up to date? 

Yes.

Intellectual property rights 

Does Enreach Campaigns have procedures to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary software products? 

Yes,

Procedure for information retention 

Does Enreach Campaigns have procedures for retention of information types established and aligned with contractual and regulatory requirements?

Yes.

Continuous review of security compliance 

Is the security management system and its implementation independently reviewed at planned intervals, or when significant changes occur?

Yes.

Compliance with security policies and standards 

Does Enreach Campaigns regularly review compliance with security controls and measures defined in the applicable security management system? For the information and cyber security elements, this will also include technical reviews for ensuring compliance.

Yes.

Connectivity & Integrations 

What private connectivity options — if any — can the Enreach Campaigns offer (either directly or via carrier partners)?  

As our solution is a web application, it is accessed over the internet.

HTTPS is used for data transfer only. Users authenticate via instance, username and password, and MFA + IP whitelist can be applied (and is recommended). 

Can Enreach Campaigns integrate any customisations or extensions into the platform if needed? Can the user interface be modified if necessary to meet any specific organisational preferences or accessibility requirements? 

Outbound by Enreach offers various features to integrate with other systems and applications.

Besides API, HTTP triggers and third-party integration frameworks, Outbound by Enreach offers an in-app scripting interface, where modifications to the "contact page" (the primary GUI for agent users) can be conducted by customers themselves. For scripting and GUI modification within this interface, TypeScript is being used as the language. 

Are both internal and external integration technologies and available APIs? 

A wide set of integration features are available. Both Outbound by Enreach and Flows by Enreach offer a comprehensive external API which can be used for various types of integrations.

The API is REST based and allows the user of it to create, update, read and delete all logical entities. For reference, see the publicly available documentation page for the API of Outbound by Enreach here.

Both Outbound by Enreach and Flows by Enreach offer HTTP triggers which can push calls to any external webservice/API based on even driven rules, e.g.: “When a lead is closed as a success (typically a sale), make a POST request to an external API inserting details about the collected lead- and order data”.

Outbound by Enreach offers a Zapier app for integrations via Zapier. Flows by Enreach offers scheduled imports of data files from SFTP servers. 

How your solution communicates with any embedded / integrated features? 

Customer can set up their own e-mail gateway (SMTP server).

Customer can utilise the built-in SMS features (via Enreach Campaign’s own SMS providers).

Customers can set up jobs using our standard APIs to expose data in all kinds of third-party solutions, incl. reporting solutions (subject to development work being carried out by the customer themselves if needed). 


Data Hosting 

Do Enreach Campaigns outsource data hosting (ie data centre) either in a physical datacentre or cloud service provider? If so, what security assurance have you carried out? 

Outbound by Enreach and Flows by Enreach are hosted in professional data centers only: Two physical hosting (housing) providers in Denmark, and AWS.

Full details available at our website: GDPR and sub-data processors.

Providers are controlled annually by evaluating audit reports based on ISAE 3402 or SOC 2, in addition to follow-up meetings to discuss details and actions, if any.

At AWS, instances are dedicated instances and all data encrypted both in rest and in transit as recommended by EDPB, even though data is not transferred outside EU. Prior to entering business with AWS, we have collected written confirmation that with the choice of their EU locations only, data will not be transferred nor replicated out of the EU. 

Is the Cloud Provider / Data Processor for Enreach Campaigns an EU company, and doesn't have a parent company outside the EU?

AWS (Amazon Web Services) is a US company with data center locations in multiple places across the world. The choice of their EU locations is, at this time of writing, accepted by EDPB (confirmed with Enreach’s Group DPO).

Prior to entering business with AWS, we have collected written confirmation that AWS will not transfer data to any other locations given that we as an AWS customer do not actively order/configure services in other locations.   

In case of changes in the use of approved sub-processors the data controller is notified timely in relation to being able to do objection applicable and/or withdraw personal data from the data processor?  Yes, this is secured by the data processor (audited by IT auditor). 
Are there written ones procedures that contain requirements that the data processor must inform the data controllers by breach of personal data security, and is carried out continuously – and at least once a year – assessment of whether the procedures must updated?  Yes, this is secured by the data processor (audited by IT auditor). 

Data Protection & Extraction

What capabilities does Enreach Campaigns offer to protect customer data — above and beyond standard authentication and role- based access control mechanisms? Are encryption options available within the IaaS platform in order to protect data at rest? If so, does Enreach Campaigns handle key management, or can customers bring their own keys?  Are secure communication pathways (such as HTTPS or IPsec VPNs) available in order to protect data in-transit? 

From an application point of view, all features, permissions and data access rights can be controlled at a detailed level via roles and/or individual permissions. 


All data transfer takes place via HTTPS only. Internally (internal Enreach Campaigns architecture and infrastructure) VPNs and dedicated connections are used to access and transfer data.

Data is encrypted at rest, encryption keys are managed by Enreach Campaigns. Further details and descriptions are available at our website: GDPR.

What would be the required time frame to extract all data that is expected to live within the platform? 

Customer data can easily be exported (either from GUI or via API) and then deleted/overwritten with blank values (either from GUI or via API) in case of contract termination.

The exact time it would take to extract all data depends on the volume which customers will upload and store, but from an immediate point of view, as all is available and can be exported with no row-level limitation (as limitations can be removed upon request), it could be done in less than one day. 

Is there a clear data protection and data privacy policy in place that is sufficient to protect PID?  Yes, this is part of our ISMS (information security management system) based on ISO 27001, which is the framework used for information security and service delivery at Enreach Campaigns, and also the standard we chose as foundation for our ISAE 3402- and 3000-based audits. 
How can I contact the Enreach Data Protection Officer (DPO)? You can find the contact information for the Enreach Data Protection Team and the Data Protection Officer here.
What data is sent to the service? (e.g. PII, PCI, financial, product details, etc.). The customer itself controls what data to upload and how long time to store datafor. The service needs, as a minimum, just telephone number to be able todispatch outbound calls. Other data can be uploaded as the customer needs andwants (all done by the customer itself). Data is deleted from Outbound by Enreach according to deletion rules set up/configured by the customer itself.
What does the service do with/to the data? (e.g. store, process,forward, report, analyze, etc.) Thecustomer itself controls what data to upload and how long time to store datafor. The service needs, as a minimum, just telephone number to be able todispatch outbound calls. Other data can be uploaded as the customer needs andwants (all done by the customer itself). Data is deleted from Outbound by Enreach according to deletion rules set up/configured by the customer itself.
Is the data sent anywhere else? (e.g. besides Equifax or this CSP) This is solely controlled by the customer themselves. Data is NOT automatically sentanywhere else. The customer is, as a data controller, fully in charge of all data and data flows. The customer CAN, if relevant and wanted, export data via API or use HTTP triggers to make calls to external webservices to send data. But this is, like anything else, solely controlled and set up by the customer.
How is the data stored at rest? (e.g. db, cached, S3) Database (MySQL), encrypted both at rest and in transit.
How is the data lifecycle managed? (e.g. how and who does delete, destroy, remove, etc.) Thecustomer itself controls what data to upload and how long time to store datafor. The service needs, as a minimum, just telephone number to be able todispatch outbound calls. Other data can be uploaded as the customer needs and wants (all done by the customer itself). Data is deleted from Outbound by Enreach according to deletion rules set up/configured by the customer itself.
How is the data retention managed? (e.g. who is responsible for the archive or repository) The customer itself controls what data to upload and how long time to store datafor. The service needs, as a minimum, just telephone number to be able todispatch outbound calls. Other data can be uploaded as the customer needs and wants (all done by the customer itself). Data is deleted from Outbound by Enreach according to deletion rules set up/configured by the customer itself.

What Encryption?

Technical Details: not just ciphers

  • DIT (data in transit) - HTTPS
  • DAR (data at rest) - PBKDF2
  • DIU (data in use, e.g. memory)

What Encryption?

Key management details

All instances encrypted with encryptions keys managed by Enreach. Keys stored in AWSKMS with all access requests and use logged in AWSCT.

Event Logging

Are event / audit logs retained for a minimum of 6 months?  Yes.
Are event / audit logs reviewed on a real time basis or on a periodic basis?  Yes – Logs are reviewed on an ad hoc basis. Some events are reviewed on a real time basis, some events are reviewed on a periodic basis. 
How are log files stored and how can they be accessed?

All changes to personal data and system entities inside Outbound (and Flows) by Enreach are logged.

The logs are, from a backend point of view, kept in database tables which contain per-record logs of changes to entities.

These are made visible in the UIs as well, hence visible to users who have the decent levels of permissions to access and reviews these logs.

What information is stored in the log files?

The scope of the logs are the following system entities which can contain personal data and/or other types of data: Users; organisational units (teams, departments); campaigns and its supporting entities; leads (which would be the entities that contain data on customers and potential customers).

All CRUD operations are logged, incl. the detailed change (what was changed, from what, to what).

The user who conducted the particular action is logged.

The session of the user (incl. the ip address of the user, the session id and when this session started and ended) is logged.

If the operation is conducted by an external system (incl. via API), this is logged, and the username of the API account is shown explicitly as evidence of which system requested the action and when. In the event that an external system or API user tries to conduct an action which permission levels do not allow, the request and reason code is logged.

The exact timestamp of the request and operation is shown. Timestamps are always shown in CET unless otherwise stated.

Logs can, when required, be exported from the UIs by users with sufficient levels of permissions themselves, and if bulk export operations are required, these can be ordered from Enreach Campaigns Support.


GDPR & Data Deletion 

Does the solution support the GDPR law in regards of deleting PID (personal identifiable data) from one individual customer from the solution (right to be forgotten) on the individual’s request? Please be aware of all the different types of PID both for agent data as well as customer data in your platform, such as call detail records, login/logout and agent states data, absences incl. reasons, working schedules, preferences for working schedules incl. reasons (e.g. in WFM systems), quality ratings, call recordings and transcripts. 

Partially. With regards to customer data, all individual leads can be “forgotten” hence deleted by a feature tailor made to this from the GUI. This is also reflected in the status of the lead, which will be set to “Anonymized (status code 610)”.

For agent users, personal data can be deleted, but the user entity will still exist with a system id. In some logs, e.g. the login log, a previous login attempt (successful or unsuccessful) will still be displayed with the original user name even if this has been anonymised/overwritten, for security purposes. 

How easy is it to identify, extract and/or delete requested PID? Is there a standard process for that in place and how long does it take? 

Our solutions are designed to support the customers in being fully self-serviced here, hence data can easily be searched, retrieved, edited, exported, deleted etc.

If our customers reach out to our support for assistance on this, or if Enreach Campaigns receive inquiries from data subjects directly, we have standard procedures for this.

There is an API available that allows clients and partners to fulfil the individual EU citizen rights in terms of extraction, correction and deletion of their PID. 

Can the solution restrict the use of data only to the timeframe when it’s still needed, and provide the option for automatic deletion? 



Yes: the solution supports the GDPR law in regards of deletion of PID data after x days. This time frame (deletion after x days) can be defined individually by every client/tenant.

This time frame can be different for different data types, such as mails / chats / recordings, CDRs, agent login data and any other PID data types. These jobs are executed nightly on Outbound by Enreach database servers and are based on delta time from loading/entering to (the set interval), and delete all data marked as covered by the jobs for deletion.

The same function is available at the single field level to support that individual fields (their values) are deleted after just 1 or a few days while the rest are stored longer (for example). Flow by Enreach: The same principles apply, where the functionality is called macros – here it is also based on delta time from loading / entering, to (the set up interval). In addition to this (applicable to both systems), data with manual jobs can be deleted immediately, i.e. without waiting until the next night.

Describe how the system supports a log of deletion of information. 

The previously described functionality by which data is deleted works in practice so that the fields on a lead (system entity for data subject) are retained, but that the values are replaced with "nothing" (in the database context, the value of the fields is updated to NULL). The subjects retain their system ID, which is a system key with no context with personally identifiable data (e.g., 527972S3012).

In the log at the single topic level, it appears that as of (given date) an update has taken place, where the fields X, Y, Z (field names) for subject id (e.g. 527972S3012) has been updated to nothing. The original values are deleted from all log tables after 3 days, cf. the description below. 

Describe the procedure for deletion in connection with database backups, including 1. How to ensure that deleted information is not recovered when reloading from previous backups, and 2. How to ensure that the integrity of any logs of deletion runs that need to be rerun after reloading previous backups is preserved. 

The described functionality from both Outbound by Enreach and Flows by Enreach means that tables with data that are visible to users are cleared for content at the latest at night. When executing jobs, the deleted data is transferred to a hidden, temporary database table called _itemdata. Records in this table are encumbered with a timestamp for insertion, and are deleted after 3 days.

All changes in production (master databases) are immediately (in near real time) reflected to all slaves (read and failover databases). Offsite backup is taken by Enreach Campaigns A/S for both Outbound by Enreach and Flows by Enreach nightly, and stored for 3 days rolling. After this, backups are deleted older than 3 days. In practice, this means that deleted data is stored in some database instance for 3 days after the data has been removed visibly to the user. The above methods mean that deleted information is not restored in connection with restore from backup; that data is deleted from all instances (including backups) after 3 days (but is invisible to the user from after each nightly run) and that a data basis is established for double-securing deletion of data in connection with restore from backup (integrity). The above descriptions, including that these are accurate and work in practice, have been audited by an independent IT auditor, through which the supplier has obtained ISAE3402 and ISAE3000 statements. 

Sometimes, data should rather be anonymised or pseudonomised than deleted, so that some statics etc. are still accurate. Does your deletion concept take that into account and rather anonymise data where needed? Can this be individually configured per tenant and per data type?  Yes. Some data is replaced with “ “ (blank or null) rather than deleted, and on some entities, only the actual PID is deleted but not system data on the entity, in order to accommodate exactly this. 
How do you prove to customers that you have security and data protection controls in place which guarantee that your cloud service is GDPR compliant?  We have independent service auditor’s assurance reports based on ISAE 3000 and ISAE 3402, both for Outbound and Flows. You can download and read the full audit reports here.
Is the cloud solution ISO 9001 (quality management) certified?  No.
Is the cloud solution ISO 27001 (information security) certified?  ISO 27001 certified no. The solution is ISO 27001 compliance audited, as ISO 27001 is selected as the information security framework in our ISAE 3000 and 3402 audits. But we have not obtained a direct ISO 27001 certification. 
Is the solution ISO 27017  (information security for cloud services) certified?  No. 
Is the solution ISO 27018 certified (protection of personally identifiable information in public clouds)  No.
Is the solution ISAE 3000 certified?   Yes (ISAE 3000 audited). 
Is the solution SOC 2 certified (Service Organization Control)?  The solution is ISAE 3402 audited, which is the equivalent of SOC 2. 
Is the solution SOC 3 certified (Service Organization Control)?  No. The solution is ISAE 3402 audited, which is the equivalent of SOC 2. 
Is the solution certified based on any other IT Security or Data Protection guidelines/certifications not listed above? Please specify.  The solution is ISAE 3402 audited, which is the equivalent of SOC 2. 
Do you hold a TÜV Rheinland Certified Cloud Service attestation?  No.
Are you certified by the BSI IT Grundschutz certified (Bundesamt für Sicherheit in der Informationstechnik)  No.
Do you hold a CSA Attestation – OCF Level 2?  No.
Do you hold a CS Attestation – OCF Level 1?  No.
Do you hold a EuroCloud Self Assessment Certification?  No.
Do you hold a EuroCloud Star Audit Certification?  No.
Is the solution HIPAA certified?  No.
Is the solution MIFID II certified? (taping/recording in financial institutions)  No.
Is the solution PCI/DSS certified? (Processing of credit card payments)  No.
Is production personal data that is used in test environments anonymised or pseudo anonymised?  Yes, for all personal data. Production data is never used in test environments. All test data is created by jobs which means that it has types of values and categories similar to real data, but it is not actual personal data and never derives from customer data. Hence, production data is never used in development or test environments. 

Does the application protect Data Subject Rights, enabling a data subject with the right to obtain, according to the Applicable Laws, and from the data controller: Access to their data (A data subject can make a request to be informed about the type of personal data and how it’s processed). - Rectification and Deletion (A data subject has the right to ask for rectification of inaccurate data processed and request for deletion of their data), and - Objection (a data subject has the right to object to the processing of their personal Data for serious and legitimate reasons). 



Yes – All requirements are compliant. All is supported and tested regularly, documented with ISAE 3000. 
Has Data supervision or the Consumer Ombudsman forwarded inquiries or initiated proceedings regarding compliance with data protection regulation, the Data Protection Act or consumer law?  No, the data processor has not been subject of this. 

Human Resource Security

Enreach Campaigns shall describe 1. how the staff is background screened 2. how staff is regularly trained in information and IT security 3. what confidentiality clauses (NDA) that are agreed between Enreach Campaigns’ and its staff (including external employees).  We have defined a number of procedures that ensure security before, during and, if applicable, after employment. Procedures concerning processes before a potential employment ensure that potential employees are screened and that relevant matters are checked within the framework of current legislation. All employees must adhere to a number of conditions regarding confidentiality regarding their own, Enreach Campaigns, and customers’ matters. This is described in each employee’s employment contract. During employment it is ensured in cooperation between the employee, day-to-day leader, and the information security coordinator that the employee is kept up-to-date with, and complies with aspects regarding, information security. We have procedures that ensure that employees at termination of employment cannot cause damage to Enreach Campaigns or the system Outbound by Enreach and Flows by Enreach, by means of instantly removing rights to business systems and checking this. In addition, a number of sanctions have been defined, in case information security is breached or disregarded. 
Are all operational staff (including from any subcontractors) with access to PID (even during support incidents etc.) EU citizens working from the EU? If not, please specify where they're from.  No. We have our own staff in Ukraine (offshore dev team) and one developer in Thailand. These are staff only working for Enreach Campaigns (no other customers), and our compliance consultants as well as auditors have assessed that this is equivalent to having staff travelling abroad and working from there, hence compliant with not transferring data to any non-EU countries. These employees only access data stored in our usual locations through VPN, i.e. no data is hosted locally at this staff. 
Is a check is carried out on the data processor's employees in connection with employment in scope, e.g., references from past employments, criminal record, or exam certificates?  Yes, this is secured by the data processor (audited by IT auditor). 
Do employees sign a confidentiality agreement, and introduced to information security policy and procedures regarding data processing and other relevant information in connection with the employee's treatment of personal data?  Yes, this is secured by the data processor (audited by IT auditor). 

Security screening 

Does Enreach Campaigns conduct a pre-employment screening performed on all candidates before employment?

Yes.

Terms and conditions 

Do employees of Enreach Campaigns and its subcontractors agree to and sign the terms and conditions of their contract, including a Non-Disclosure Agreement (NDA), which shall state their and the organisation’s responsibilities for information security during and after employment?

Yes.

Information during employment 

Are all personnel of Enreach Campaigns informed about the roles and responsibilities regarding security? Any changes in roles or responsibilities shall be made known to all personnel where relevant. 

Yes.

Awareness and education 

Does Enreach Campaigns have an awareness program for security established? All personnel shall undergo the awareness program every 3rdyear (at least), as relevant for their job functions. 

Yes.

Process for termination or change 

Does Enreach Campaigns have a procedure for change and termination of employment that details the security related responsibilities, and is the process communicated?

Yes.

Incident Management & Business Continuity 

Enreach Campaigns shall describe how information and IT security incidents are managed (e.g. discovered, reported and further managed). 

The information security committee has defined procedures for information security incidents and events, which are embedded in Enreach Campaigns and which the management is responsible for being observed.

We define information security incidents as:

  • The detection of successful external and unwanted intrusion in systems
  • Finding customer data (hosted in the master database for Outbound by Enreach and Flows by Enreach) online, where there is an obvious or strong suspicion that the publication of data has not occurred with the customer’s approval and intent
  • Finding data on current or former employees in Enreach Campaigns online, where publication of data has occurred without Enreach Campaigns’ involvement or intent
  • Finding other confidential business data online (according to the same directions) defined as customer contracts, revenue, or information which is classified as secret according to further definition by the information security committee.

We define information security events as:

  • Events that, if they had not been discovered, could have led to security incidents
  • Situations where unintended data or information by accident (due to human error) has been sent to other recipients than the intended, and that it is assessed that this may entail damage or serious consequences for Enreach Campaigns. 

Procedures have been defined for both, which describe for employees and managers how they should act in case of incidents and events, including (but not limited to) gathering evidence and contact with authorities, if necessary. All employees are aware of the instructions and have trained them. 

Enreach Campaigns shall describe how information and IT security incidents handling can be managed between them and the customer (e.g. responsibilities, prioritisations, information sharing, contact interfaces).  If any incidents involving the customer and their data specifically occur, Enreach Campaigns will contact the customer immediately and no later than within 24 hours. 
Enreach Campaigns shall briefly describe how they are working with business continuity planning and how to respond to serious disturbances.   We have defined the responsibility for preparing emergency plans, contingency plans, and restore plans. We have established adequate redundancy to meet the requirements for availability and the guarantees for uptime that we have agreed in contracts with our customers. All technical employees have training with the plans. Plans and procedures are regularly reviewed and after each operational issue where human action has been necessary to re-establish operations on parts of the platform. 
Enreach Campaigns shall describe how their emergency response team is working and how it can cooperate with customer emergency response teams in case of severe incidents.  If any incidents require involvement from the customer or can be escalated/speed up by the assistance of the customer, then these will be contacted immediately. 
Is the application incorporated into the organisations IT Disaster Recovery (DR) and Business Continuity (BC) plans in place to ensure application operations can survive disruption or complete loss of service? 

Yes – IT DR and BCP Plans exist and outline RTO and RPO. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001.

The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. 

Are backups routinely scheduled as per a defined backup strategy? Are backups archived to encrypted tapes which are stored in a secure off-site location?  Backups are taken daily and transferred to encrypted storage in off-site locations, i.e. a data center which is not the same data center where the specific production server is. 
Are backups archived to encrypted tapes which are stored in a secure off-site location?  No – Backups are not archived to tapes. Backups are transferred to encrypted storage in off-site locations, i.e. a data center which is not the same data center where the specific production server is. 
Are backups tested via restoration on a periodic basis to ensure application recovery targets can be met?  Yes – Backup restoration testing is performed at least on a quarterly basis. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. 

Documented operating procedures for security incident management 

Does Enreach Campaigns have a documented process for security incident management, including defined roles and responsibilities as well as procedures for detection and recording, classification, escalation, resolution and reporting?

Yes.

Notification of breach 

Will Enreach Campaigns without undue delay report all security incidents to the data controller according to defined reporting routines?  

Yes.

Reporting of weaknesses 

Will all relevant identified security weaknesses be registered and reported to the data controller according to defined reporting routines?

Yes.

Documenting lessons learned 

Will knowledge gained from solving security incidents be analysed and documented to reduce the likelihood or impact of future incidents?

Yes.

Annual summary of analysed incidents 

Can an annual summary of analysed incidents and the lessons learned be made available to the data controller upon request? 

Yes.

Operations Security

Enreach Campaigns shall provide a list of all premises, their types (e.g. offices, data centers), and their jurisdiction where customer information will be managed (so stored, processed or accessed from) by Enreach Campaigns’ staff. Enreach Campaigns shall for each of these premises describe the physical and environmental security controls in place. 

Servers are only placed in data centres provided by suppliers who have been issued, and annually can show, assurance reports at the level of ISAE 3402.

Enreach Campaigns office premises are subject to a number of procedures that secure the office as well as material and units stored at the office, regardless of servers only being placed in data centres. 

This entails, e.g., procedures aimed at employees describing security measures for offices, common areas, and similar areas. Physical locations are listed at our website: GDPR. In addition to these are Enreach Campaigns office locations in Denmark and Sweden. 

Enreach Campaigns shall describe how and to what extent the IT-services (e.g. operating system, databases, application, clients) comprising the Service(s)1. are hardened (e.g. removal of unnecessary services). 2. are patched (e.g. how the service provider keep up on security vulnerabilities, what is the policy for applying security patches). 3. has protection against malicious content.

Services are hardened, patched and protected.

Only the base of each system is installed, and any services included in base that is not needed are disabled (eg. SMTP services). All systems are patched with security updates daily, if any.

Firewalls are running on each host only allowing the necessary services to communicate on affected ports and only on a dedicated VLAN. No systems are directly reachable over WAN, central firewalls controls access to any backend service. 

The Provider shall describe how and to what extent activities (e.g. users, machines) in the IT-services (e.g. operating system, databases, application, clients) comprising the Service(s) are logged (e.g. the description shall especially cover administrative access rights) and how long the logs are stored. Enreach Campaigns shall also describe how customers can get access to the log information. 

We have operating procedures for the IT department’s most significant duties, and these procedures are subject to versioning and change management. We have defined the responsibility for ensuring that an assessment of the capacity requirements for critical IT systems is performed regularly.

Due to our size we cannot have a complete overlap on all functions, but as to the previous description we aim, by virtue of segregation of duties and thorough as well as continuous documentation and knowledge sharing, to avoid dependence on individuals.

The IT department consists primarily of developers in a “devops” constellation, where two persons are dedicated to operations, optimising servers and infrastructure, monitoring and handling operational issues, but where all have operations as the first priority in case of technical issues on the platform or information security issues.

All instances of Outbound by Enreach and Flows by Enreach are monitored by means of monitoring tools. Thereby we monitor, among other things, access to servers, CPU/memory/disk usage, similar for database servers, lag (in milliseconds) between master and slave databases, heavy SQL queries made by applications or directly by a client, and much more.

Critical levels and values are defined for all these monitoring areas. Alarms must trigger when these values are reached and must be sent to key employees either via email (for less critical alerts) or SMS (critical alerts). Historical logs and events are regularly reviewed in a structured manner to perform improvements and optimisation.

We have procedures for backup besides continuous data replication, and the usability of backups for restore is regularly checked. The development of Outbound by Enreach and Flows by Enreach, including release of changes, occurs according to Enreach Campaigns’ formalised and embedded development model. The development process is Enreach Campaigns own method derived from an agile approach to development, SCRUM, and RUP. The development takes place in sprints, but not of an eternal, specified duration, as sprints are defined according to prioritised tasks in backlog. On the basis of the classic project triangle consisting of time, scope, and resources, time is the factor that defines the objective for master releases with a release at least every 4 weeks, but we aim to make a master release every 3 weeks. Quality and marking tests as complete, however, are always to be considered more important than the desire of making more frequent releases, as a zero-bug tolerance when new code is deployed for production overrides the desire of having new functions/features released quickly to customers.

Next to master releases, hot fix releases are performed with corrections of distinct errors and significant inexpediencies. Significant errors and disclosed security weaknesses with the priority of 1 or 2 (as per the Enreach Campaigns operations procedure) must always be handled as quickly as possible, and no later than within 3 working days. Development occurs in development environments where code is branched from the main branch/”default”. These development branches are connected with the staging database, where test data is found. Test data and production data are thus completely segregated, and customers’ data must not be copied from master to staging without approval from Enreach Campaigns' head of Operations and head of Development. If this permission is granted, it can and will only comprise configuration data in order to test and develop up against true, complex data in order to ensure the quality of the development, but it must and can never comprise data on the customer’s prospects, employees or similar which are personally identifiable and can be categorised in accordance with GDPR’s articles 6, 9, and 10.


Function testing takes place in development branches (also called feature branches), after which code is merged to pre-production, on to CX branch, on to pre-release branch, on to release branch, from which code is finally deployed for production.


Integration testing with associated regression tests and happy flow testing takes place from CX branch, pre-release branch and/or release branch, where testing occurs in the master database, but on our own test data. Customers’ personally identifiable data are thus not part of tests and are not accessed or viewed by Enreach Campaigns employees in any of these test phases. Data in the master database on own accounts are created in such a way that it structurally looks like production data that customers work with, whereby data security, confidential processing, and simultaneous quality assurance are ensured and balanced.


We have procedures concerning the scope, processing, protection, and check of logging on various system types. All logins and significant user actions in Outbound by Enreach and Flows by Enreach are monitored and logged. The logging of significant user actions concerns i.e. data export, such that customer administrators have an overview over which users that access and export data.

All changes to data are registered. All significant changes to configurations are registered. These registrations are also available for customer administrators through visible logs in the user interface.The logging level also comprises employees at Enreach Campaigns, whereby it is checked that these do not access customer data without a work-related need for this. This is checked and tested in a detailed manner on the basis of spot checks.


Enreach Campaigns shall describe how and to what extent monitoring and event detection is used (e.g. to ensure that breaches does not occur). 

All instances of Outbound by Enreach and Flows by Enreach are monitored by means of monitoring tools. Thereby we monitor, among other things, access to servers, CPU/memory/disk usage, similar for database servers, lag (in milliseconds) between master and slave databases, heavy SQL queries made by applications or directly by a client, and much more.

Critical levels and values are defined for all these monitoring areas. Alarms must trigger when these values are reached and must be sent to key employees either via email (for less critical alerts) or SMS (critical alerts). Historical logs and events are regularly reviewed in a structured manner to perform improvements and optimisation. We have procedures for backup besides continuous data replication, and the usability of backups for restore is regularly checked. 

Enreach Campaigns shall describe how security vulnerabilities will be identified and managed after identification. Related to this Enreach Campaigns shall describe the routines and approach related to regular security penetration testing.  Independent third parties carry out penetration tests at application and network level as per our ISMS. 
Enreach Campaigns shall describe what information and IT security controls (e.g. intrusion prevention system, firewalls, encryption) it has in place in order to protect the infrastructure and how these information and IT security controls are monitored. 

We have procedures for network management and monitoring, including maintenance of network and network equipment. Traffic on all connections and interfaces are monitored in relation to data volume over periods of time. Alarms have been set up that are triggered and sent to technical personnel in case of abnormalities (traffic spikes, significant delays between master databases and slave databases, and much else).

Regarding tele connections, the amount of provider channels, the amount of server channels (Freeswitch channels), and amount of ongoing calls, amongst other things, are monitored, and max values for periods of time are logged. This ensures ongoing, correct capacity management as well as a precaution against misuse. In addition, as an extra layer of security against misuse we cooperate with fraud detection departments at all telecom operators that we use as sub-suppliers.

Exchange of information solely occurs by means of secure connections. If this occurs via the public Internet, data is encrypted (in principle by means of HTTPS). Systems that can communicate on internal connections (on internal IP address behind firewall – and between data centres via fibre connection, through which servers on various locations also can reach each other on internal IP address) use this method for data exchange via LAN. 

Is the application subject to periodic patching, with critical and security related patches tested and deployed no later than one month after release?  Yes – Patches are applied on an ad hoc basis. All patches and updates are monitored and installed on time. Specifically, operational ownership for this is defined in our ISMS, and the head of operations follows updates on security updates and patches which need to be addressed and installed without undue delay. 
Does the data centre hosting the application system employ a combination of both logical and physical security controls to prevent unauthorised access to sensitive resources?  Yes. Data is hosted only in professional data centers, which can document compliance and security measures via ISAE 3402, SOC 2 or equivalent. 
Are application source code and libraries restricted on a least privileged basis and monitored to mitigate the threat of unauthorised access or modification of expected application functionality?  Yes. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. 
Is the application registered with a reputable time source that performs routine synchronisation operations to maintain an accurate time?  Yes. NTP is used for all servers throughout the network. 
Does Enreach Campaigns keep up to date with best practices, new threats, cybersecurity attacks and vulnerabilities regarding its services and its suppliers' services (i.e. subcontractors).  Yes. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. Please refer to our website for more information: GDPR.
Does Enreach Campaigns carry out background checks on all applicants in accordance with relevant regulations and ethical requirements, and should be proportionate to information made available to them.  Yes. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. Please refer to our website for more information: GDPR.
Does Enreach Campaigns communicate responsibility for information security and obligations that remain in force after termination or change regarding the Supplier's employees?  Yes. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. Please refer to our website for more information: GDPR.
Does Enreach Campaigns ensure that users are only given access to networks and network services for which they have been specifically authorised?  Yes. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. Please refer to our website for more information: GDPR.
Does Enreach Campaigns have in place detection, preventive and restorative security measures to protect against malware?  Yes. This is assured through Enreach Campaigns' ISMS (Information Security Management System) based on ISO27001. The ISMS consists of policies, procedures and controls. We are subject to annual audit on this and obtain audit reports based on the ISAE 3000 and ISAE 3402 standards. Please refer to our website for more information: GDPR.

How does the supplier ensure that operating procedures are documented and maintained, and do these include the following?:

  • Malware protection 
  • Change management 
  • Capacity management 
  • Environmental separation.

How has the supplier implemented security measures in relation to the following:

  • Malware protection
  • Backup 
  • Logging and monitoring
  • control of operating software Management of technical vulnerability managers.
In accordance with our ISMS based on ISO27001. Procedures for this defined purpose. All documentation presented to the IT auditor. Further information in the control descriptions in our ISAE 3402 and -3000 declarations available on our website: GDPR.
How does the supplier protect its networks?  Multi-layered firewalls, monitoring of all traffic, multiple levels of alerts and alarms via Zabbix and others, databases only accessible via VPN, etc. 
How has the supplier prepared contingency plans that define how systems or services are re-established in a timely manner, and are these tested annually or in case of major changes?  Sub-elements are tested monthly (failover between servers for various sub-components), and the entire plan is tested at least annually. 
How does the supplier ensure that it is regularly examined whether systems and services meet security requirements as well as the effectiveness and ability of security requirements to ensure ongoing confidentiality, integrity, availability and robustness of systems and services?  Penetration and security tests are conducted by independent third parties at least annually.
Does the data processor know of any breach of personal data security? If so, will the data controller without undue delay and no later than 12 hours be informed that there is a breach of the personal data security of the data processor or a sub data processor?  Yes, this is secured by the data processor (audited by IT auditor). There have been no breaches personal data security, but the data processor has procedures that ensure the customer will be informed in the event that a breakage should occur. 

Documentation of changes 

Are all changes to the production environment, including the underlying infrastructure, documented according to formal change management procedures? The documentation shall cover all the steps performed as part of the change management procedure, including test results, approvals and decisions. 

Yes.

Changes in production environment 

Does Enreach Campaigns have a policy in which changes in the production environment shall only permitted by authorised personnel in accordance with the change management procedure?

Yes.

Division of environments 

Are development, testing and production environment separated from each other?

Yes.

Installation of changes in production environment 

Does Enreach Campaigns have a policy in which developers shall not be able to apply their own changes in the production environment? Before promoting a change to the production environment it shall be tested, approved and validated. 

Yes.

Malware protection 

Do all systems and assets shall have malware protection (e.g. web content filtering, mail protection, antivirus, firewall)? The malware protection shall update signatures on a continuous basis. 

Yes.

Backup 

Does Enreach Campaigns ensure adequate backups of system images, software, and information, and performs annual tests of these? The test results shall be documented.

Yes.

Backup Security 

Does the backup of information have a level of physical, logical and environmental protection equivalent to that of the main site? The controls applied to storage media at the main site shall be extended to cover the backup site. 

Yes.

Logging of events 

Does Enreach Campaigns maintain security and event logs, with establish procedures and capacity for event monitoring. 

Yes.

Access to logs 

Is it possible to, upon request, obtain access to log files and to transfer logs to the data controller? 

Yes.

Protection of log information 

Are logs protected against tampering, overwriting, and unauthorised access?

Yes.

Procedures for installation of new software 

Does Enreach Campaigns have documented procedures for installation of new software and new versions of existing software in any production environment? 

Yes.

Procedures for managing technical vulnerabilities 

Does Enreach Campaigns have a documented process for managing technical vulnerabilities?

Yes.

Patching 

Are patches tested and evaluated before they are installed to ensure they are effective and do not result in side effects? If no patch is available or if patching is not possible, compensating controls shall be considered. 

Yes.

System hardening 

Does Enreach Campaigns have a documented procedure for equipment and system hardening? The procedure shall define roles and responsibilities as well as specific instructions for hardening of operating systems, databases, applications, network components and virtual environments. 

Yes.

Provider's Service Description

Briefly describe Enreach Campaign's Service(s) and its function. 

The service provided is a telemarketing system, for sales to contact existing and potential customers. Enreach Campaigns does not manage any data or information for customers.

All data and information in the system is uploaded and managed by the customer.

Enreach Campaigns is a data processor acting on instructions provided by the customer as a data controller only. Our services are co-located across Danish data centers and AWS in Dublin and Frankfurt. 

Following Enreach Campaigns’ choice of Frankfurt and Dublin, the hosted data is not being transferred to outside EU. Enreach Campaigns has obtained written confirmation from AWS that this is the case.


Physical servers are hosted in our racks in data centers in Denmark, and virtual servers are hosted in the AWS data centers in Frankfurt, Germany, and Dublin, Ireland.

Production data is hosted in EU-based data centers only, and the hosted data is not being transferred to outside EU.

The overall architecture and security setup is illustrated on our website: GDPR. No 3rd parties have access to any information. The sub data processors used are for hosting and housing only, and these 3rd parties do not have access to data. Data is encrypted during rest and transit, and further and full information is available in the audit reports (based on ISAE3402 and ISAE3000) which can be found at our website: GDPR.


Risk Management

Describe how Enreach Campaigns ensures that adequate information and IT security controls are defined and implemented. The description shall also include potential 3rd parties. 

Risk management in Enreach Campaign’s A/S is done for all areas connected with delivering the product and serviceEnreach Campaigns. Risk analysis, assessment, and management are based on ISO 27005, and are based on impact analyses and vulnerability analyses at service level. Service is understood as business systems supporting the delivery of Enreach Campaigns as well as Enreach Campaigns in itself as a customer system.


Above all is our top-level information security policy, which is signed by Enreach Campaigns’ CEO and which sets the framework for the information security work. This is valid for all employees and close cooperative partners (such as consultants).

The framework for the information security code of practice is ISO 27001, and the code of practice is classified according to the following control areas:


  • Information security management and security policy
  • Organisation of information security
  • Human resource security
  • Asset management
  • Access control
  • Cryptography
  • Physical and environmental security
  • Operations security
  • Communications security
  • System acquisition, development and maintenance
  • Supplier relationships
  • Information security incident management
  • Information security aspects of business continuity management
  • Compliance.


Security Policy & Procedures

Describe the framework and set of information and IT security policies and procedures that Enreach Campaigns holds. Enreach Campaigns shall list all common standards that will be covered by the established framework. Enreach Campaigns shall provide scope and evidence if it is certified according to those common standards (e.g. ISO/IEC27001). The evidence shall include scope statement and the statement of applicability, including potential deviations (e.g. services or locations not included). 

The framework for the information security code of practice is ISO 27001, and the code of practice is classified according to the following control areas:

  • Information security management and security policy
  • Organisation of information security
  • Human resource security
  • Asset management
  • Access control
  • Cryptography
  • Physical and environmental security
  • Operations security
  • Communications security
  • System acquisition, development and maintenance
  • Supplier relationships
  • Information security incident management
  • Information security aspects of business continuity management
  • Compliance.

Enreach Campaigns shall briefly describe their information and IT security organisation. 

This includes, but is not limited to the following:

Segregation of duties - We have a clear and well-defined organisation with segregation of duties, which entails that dependency on key persons is reduced as much as possible. In addition, segregation of duties has been introduced to areas where there is a risk of the occurrence of misuse of the company’s data and information.

Contact with authorities - We have defined responsibility for contact with public authorities regarding topics pertaining to the area of information security.

Project management - We have defined the responsibility for Enreach Campaigns’ project management model managing information security in all phases in an adequate manner, such that projects do not impact Enreach Campaigns’ overall risk exposure to a negative degree. Information security is considered in all projects, regardless of their size. 

1.Does the platform support a change log to identify who exactly made changes to any data? 2.Does the platform support a log file to identify who has accessed which types of data? 

1. Yes

2. Partially. All actions on our platform are logged, but for overview and simplicity purposes, not all data is made available to users in the GUI. Hence, depending on the level of request, the customer may need to reach out to Enreach Campaigns support team for further/full details, but in that case, it can be provided upon request. 

Is there a password policy in place that ensures that nobody can know the password of any other individual, even for initial passwords or at least with the feature that users MUST always change their password when they log into the platform for the first time?  Yes, for Outbound, all requirements are supported here. For Flows, requirements are partially but not fully supported. 
What inspections are carried out on sub-processors?  Obtaining declarations at the level of ISAE 3402, SOC 2 or equivalent. Meetings with interviews on technical and organisational measures. Documentation of this provided to the auditor in connection with the submission of ISAE 3000. 
How does the supplier ensure ownership of critical assets and update of documentation for them?  All in Control Manager which supports our unified ISMS. Assets and services defined with business owners and technical owners. This and procedures for this are communicated to everyone in Enreach Campaigns. 
What secure log-on procedures has the supplier implemented to minimise the possibility of unauthorised access to systems and applications?  Strict password policy, MFA, and VPN. 
Is the application positioned behind a Web Application Firewall (WAF) that is capable of preventing attacks?  Yes.
Is access to personal data isolated to users with a work-related need for this, and is there for them systems and databases used for processing of personal data, established system monitoring with alarming? Describe what the monitoring includes. 

Yes, this is secured at data processor (audited by IT auditor).

System accesses are revalued and checked every 3 months cf. ISMS. Data processor has ongoing controls that check and ensure conformity between employees' access to data and instructions from the customer.

Is an assessment of whether the IT security policy should updated carried out continuously and at least once a year?  Yes, this is secured by the data processor (audited by IT auditor). 
Has the data processor ensured that the information security policy are not in conflict with those entered into data processing agreements?  Yes, this is secured by the data processor (audited by IT auditor). 
Which sub-data processors does Enreach use? The list can be found on our website: Sub-data processors.

Documented framework for security & resilience 

Does Enreach Campaigns have a documented security framework (ISMS), including a security policy that is approved by management, published and communicated to all employees and relevant external parties?

Yes.

Documentation of security roles and responsibilities 

Have all security roles and responsibilities been defined, documented and allocated within Enreach Campaigns? Has Enreach Campaigns appointed a person responsible for security with the services delivered to the data controller in scope?

Yes.

Segregation of duties 

Have conflicting roles and responsibilities been segregated to reduce risk for unauthorised or unintentional modification or misuse of the data controller's assets?

Yes.

Security in project management 

Is security addressed in all stages of project management, regardless of the type of project? Are all projects staffed with sufficient security resources to implement appropriate information security controls and meet the security objectives?

Yes.

Mobile device policy 

Are security measures for the use of mobile devices in Enreach Campaigns defined, documented and implemented?

Yes

System Acquisition, Development & Maintenance

Enreach Campaigns shall describe how information and IT security is managed (e.g. ensured) in system acquisition and development, maintenance and disposal phase.  

We have procedures that ensure secure change management in business supporting systems.

The procedures prescribe that change logs are obtained and evaluated, and that changes are tested before they are released. As all significant internal work processes are documented, the process documentation is updated where necessary, in connection with changes. 

Enreach Campaigns shall briefly describe what practices and standards they are using for software development. 

The development of Outbound by Enreach and Flows by Enreach, including release of changes, occurs according to Enreach Campaigns’ formalised and embedded development model.

The development process is Enreach Campaigns’ own method derived from an agile approach to development, SCRUM, and RUP. The development takes place in sprints, but not of an eternal, specified duration, as sprints are defined according to prioritised tasks in backlog. 

On the basis of the classic project triangle consisting of time, scope, and resources, time is the factor that defines the objective for master releases with a release at least every 4 weeks, but we aim to make a master release every 3 weeks. Quality and marking tests as complete, however, are always to be considered more important than the desire of making more frequent releases, as a zero-bug tolerance when new code is deployed for production overrides the desire of having new functions/features released quickly to customers.

Next to master releases, hot fix releases are performed with corrections of distinct errors and significant inexpediencies. Significant errors and disclosed security weaknesses with the priority of 1 or 2 (cf. Enreach Campaigns operations procedure) must always be handled as quickly as possible, and no later than within 3 working days.

Development occurs in development environments where code is branched from the main branch/”default”. These development branches are connected with the staging database, where test data is found.

Test data and production data are thus completely segregated, and customers’ data must not be copied from master to staging without approval from Enreach Campaigns’ Head of Development and Head of Operations. If this permission is granted, it can and will only comprise configuration data in order to test and develop up against true, complex data in order to ensure the quality of the development, but it must and can never comprise data on the customer’s prospects, employees or similar which are personally identifiable and can be categorised in accordance with GDPR’s articles 6, 9, and 10.

Function testing takes place in development branches (also called feature branches), after which code is merged to pre-production, on to CX branch, on to pre-release branch, on to release branch, from which code is finally deployed for production.Integration testing with associated regression tests and happy flow testing takes place from CX branch, pre-release branch and/or release branch, where testing occurs in the master database, but on our own test data. Customers’ personally identifiable data are thus not part of tests and are not accessed or viewed by Enreach Campaigns employees in any of these test phases. Data in the master database on own accounts are created in such a way that it structurally looks like production data that customers work with, whereby data security, confidential processing, and simultaneous quality assurance are ensured and balanced. 

Enreach Campaigns shall describe how test data is selected and managed and if it in any cases are derived from production data.  Development branches are connected with the staging database, where test data is found. Test data and production data are thus completely segregated. 

Security requirements for systems 

Are security requirements for new systems or enhancements established and approved before development is initiated?  

Yes.

Security & privacy by design 

Are security and privacy requirements integrated in the design of information systems?

Yes.

Secure development policy 

Is development performed according to a documented procedure for secure development?

Yes.

Secure architecture 

Are secure architecture principles established, documented, maintained and applied in all architecture layers?

Yes.

Secure development environment 

Are development, test, acceptance and training environments appropriately protected and secured, similar to the corresponding production environment? 

Yes.

System security testing 

Within every development cycle, do the developed systems or programs undergo security reviewing or testing before they are put into production? 

Yes.

Acceptance testing 

Does Enreach Campaigns have a policy in that in order to verify that systems comply with information security requirements, the technical solution, the documentation and the associated procedures shall be reviewed according to a documented procedure? The review shall include formal acceptance testing and the result shall be documented. 

Yes.

Protection of test data 

Is test data classified (based to sensitivity) and handled according to documented procedures that include requirements on isolated test environments and procedures for removal of test data after completion?

Yes.

Use of test data

Does Enreach Campaigns have a policy in which the data controllers' data shall not be used for testing, unless explicitly approved by the data controller? In which case all requirements and conditions expressed by the data controller on such testing as well as relevant requirements provided must be fulfilled.

Yes.

Access Control

Access control policy 

Does Enreach Campaigns have an updated and documented access control policy applicable for the asset(s) in scope of the service delivered to the data controller, including assignment of business roles to system roles as well as a description of how access rights are managed?

Yes.

Formal policy on the use of network services 

Is access to networks and network services restricted in accordance with the access control policy?

Yes.

Least privilege principle 

Does the provision of access to information follow the principle of least privileges, i.e. users and system components only possess the minimal privileges and access rights they need in order to fulfil their defined function?

Yes.

Change of default passwords 

Are default passwords to networks and network services changed before any users are allowed to connect to them?

Yes.

Process for unauthorised devices 

Is a documented description regarding how to identify and handle devices that have been connected without approval established, and are such unauthorised devices automatically identified?

Yes.

Unique user ID's 

Do employees of Enreach Campaigns have a unique user account (ID), and shared IDs (function or service user accounts) only allowed when unique user accounts cannot be used for business or operational reasons? Exceptions shall be managed, documented and approved. 

Yes.

User access provisioning 

Does Enreach Campaigns have a documented access provisioning process, including a description of how access rights are granted and revoked?

Yes.

Authorisation of privileged access rights 

Are privileged user access rights restricted and kept to a minimum? Is there a formal process for management approval of privileged access rights before activation?

Yes.

Separation of privileged access rights 

Are administrative accounts separated from regular accounts?

Yes.

Verification of privileged access rights 

Are high privileged user accounts verified every 6th month according to a formal process?

Yes.

Logging of privileged user account activity 

Are activities performed with high privileges logged and traceable?

Yes.

Management of secret authentication information of users 

Is secret authentication information (e.g. password) protected with controls (i.e. using salted hashes for storing passwords, strong encryption or similar measures) to ensure confidentiality?

Yes.

Distribution of passwords 

When distributing new passwords to a user, is the identity of the user established, according to a documented procedure, before the password is distributed? Is the password unique and a password change mandatory at the first login?

Yes.

Annual review of user access rights 

Are user accounts reviewed annually according to a formal process, and is the review documented? 

Yes.

Removal or adjustment of access rights 

Are access rights of all employees and external users to information and information processing facilities disabled upon termination of their employment, contractor agreement, or adjusted upon change? Users shall not automatically regain old access rights upon account reactivation.  

Yes.

Failed Logon 

Are accounts disabled/locked for a specified period of time after repeated unsuccessful login attempts? 

Yes.

Logon security 

Does Enreach Campaigns have a policy wherein passwords shall not be transmitted in clear text over the network? Furthermore passwords shall not be distributed together with the account information in the same delivery. 

Yes.

Password minimum requirements 

Are minimum requirements for authentication defined, approved and implemented?

Yes.
What access does the Service Provider have to the data (e.g. database)?

For general app and data access, the following applies.

The customer itself controls what data to upload and how long time to store data for. The service needs, as a minimum, just telephone number to be able to dispatch outbound calls. Other data can be uploaded as the customer needs and wants (all done by the customer itself). Data is deleted from Outbound by Enreach according to deletion rules set up/configured by the customer itself.

For the service provider’s (Enreach’s) ability to access, the following applies, also in line with Detail Provider employee access controls (Read more under Provider Design and Isolation).

Staff at the provider of Outbound/Flows by Enreach are generally restricted access to systems and services, following the least and minimum access principle. See the audit reports (latest ISAE3402 audit report published on our website: Audits. Nobody outside the core IT Architectural Team have OS access. The commercial Support department can, upon permission granted by the customer itself, access the customer’s app account for service purposes.

How is user and/or customer authentication done? (SAML/SSO, CASB, standalone, etc.) Instancename, username, password and (recommended) 2FA via SMS or e-mail code.
How is admin authentication done, CSP employee access limited, etc.? The customer itself create relevant users, roles and control permissions.
Other info See further info about the platform, security, compliance and related topics on our website as well as in the latest ISAE3402 audit report published on our website: Audits.

Physical and Environmental Security

Requirements on physical protection 

Does Enreach Campaigns have defined and documented requirements for physical perimeter protection to areas that contain systems and/or process information of data controllers? The level of physical protection shall be based on the classification of the system and/or information processed at the premises. The requirements shall include specifications for mechanical protection, technical protection and surveillance. The specification shall at least include requirements on doors, locks, alarms, windows, walls, ceiling and floor. 

Yes.

Physical access provisioning 

Has Enreach Campaigns implemented physical entry controls for offices, production sites, data centres and any other locations?

Yes.

Secure storage of physical access 

Are physical keys and cards as well as codes that grant access to physical areas stored in a manner that prevents unauthorised persons from gaining access? Theft, loss or misuse of keys, cards or codes shall be managed as a security incident. 

Yes.

Identification of visitors 

Does Enreach Campaigns have a procedure for managing visitors access to the physical premises? 

Yes.

Protection against natural disasters and accidents 

Does Enreach Campaigns have a defined and documented procedure for physical protection related to management of natural disasters and accidents? The level of physical protection shall be based on the classification of the information processed at the premises and a risk assessment covering the likelihood and impact of natural disasters and accidents 

Yes.

Environmental conditions in the server room  

Are environmental conditions in the data centre adequately protected, monitored and regularly inspected?  

Yes.

Clear desk policy 

Does Enreach Campaigns have a clean desk policy implemented for all information processing facilities? The policy shall at least cover handling of papers and removable storage media. 

Yes.

Communications Security

Requirements for network security 

Are security mechanisms, service levels and management requirements of all network services identified and included in network service agreements, whether these services are provided in-house or outsourced?

Yes.

Network segmentation 

Does Enreach Campaigns have a documented zone model (model for physical and logical segmentation of networks) containing security requirements for handling of information within network zones as well as regarding transfer between zones?

Yes.

Agreements on information transfer 

Does Enreach Campaigns have a policy in which secure information exchange procedures are agreed upon between the data controller and the supplier before any information exchange takes place? The procedures shall include the signing of a non-disclosure agreement (NDA) and formal approval from both parties before information exchange is initiated. 

Yes.

Secured electronic messaging 

Is all information involved in electronic messaging appropriately protected (e.g. from unauthorised disclosure, unauthorised alteration, unauthorised message duplication, unauthorised destruction etc.)? The usage of electronic messaging platforms shall be properly protected.  

Yes.

Supplier Relationships

Use of sub-contractors 

When contracting sub-providers, does Enreach Campaigns ensure that the security controls agreed with the data controller are propagated throughout the supply chain? If the supplier sub-contracts parts of the service delivery under the agreement, all Security Controls agreed with the data controller shall be included and agreed with the subcontractor. The agreement with the sub-contractor shall be signed before the subcontractor or any of its personnel can access the data controller's systems and/or information. 

Yes.

Right to audit 

Does the data controller have the right to audit Enreach Campaigns in respect to the agreed requirements and delivered service? The data controller shall have the right to assign an independent third party auditor for this, or Enreach Campaigns shall provide third party audit report covering the services delivered to the data controller in scope.

Yes.

Changes to supplier services 

Will Enreach Campaigns inform the data controller's contract owner without undue delay of all changes that may influence the fulfilment of the information security controls agreed upon within the services delivered?

Yes.

Locations

Where is it running? The service is co-located across AWS (primarily Frankfurt, secondarily Dublin, i.e. EU only) and Copenhagen, Denmark.
Where is the hosting clouds/services (e.g. AWS)? AWS (primarily Frankfurt, secondarily Dublin, i.e. EU only) and two hosting centers around Copenhagen, Denmark: InterXion and Global Connect.
Where is the hosting locations (e.g. US-East)? In EU only (Frankfurt/Dublin for AWS, and Copenhagen for physical hosting/housing).
Services used (e.g. compute/EC2, Storage/S3, Database/RDS etc.)? Windows webservers, EC2, MySQL databases, S3storage (recorded conversations + attachments to e-mails if those are used),Linux/Freeswitch/Kamailio for telephony (SIP, WebRTC)

HA, DR, Redundancy

How is high availability assured? Data replicated to slave instances in real time. Databases separates across different availability zones on the AWS sites. Failover servers in place for all production servers, with automated failover for most assets managed by KeepAlived. See further info about the platform, security, compliance and related topics on our website as well as in the latest ISAE3402 audit report published: Audits.
Is data replicated, moved, or stored in multiple locations? Only within the service itself and within sites mentioned in previous answers. Data is replicated from AWS to physical servers in private racks in InterXion and Global Connect, both Copenhagen area, Denmark
Are you compliant with regional regulatory requirements? (e.g. GDPR, national)

Yes, full compliance assured and audited within.

See latest ISAE3000 (scope: GDPR) report on our website: Audits.

Is there DR or site/region failover? Data replicated to slave instances in real time. Databases separates across different availability zones on the AWS sites. Failover servers in place for all production servers, with automated failover for most assets managed by KeepAlived. See further info about the platform, security, compliance and related topics on our website as well as in the latest ISAE3402 audit report: Audit.
How is failover customer or service managed?

Data replicated to slave instances in real time. Databases separates across different availability zones on the AWS sites. Failover servers in place for all production servers, with automated failover for most assets managed by KeepAlived. See further info about the platform, security, compliance and related topics on our as well as in the latest ISAE3402 audit report: Audit.


HA and failover is managed and assured by the service (Outbound by Enreach). Thecustomer is not involved in failover scenarios and/or recovery scenarios.

Can data be exported or retained, or locked-in? This is solely controlled by the customer themselves. Data is NOT automatically sentanywhere else. The customer is, as a data controller, fully in charge of all data and data flows. The customer CAN, if relevant and wanted, export data via API or use HTTP triggers to make calls to external webservices to send data. But this is, like anything else, solely controlled and set up by the customer.

Provider Design and Isolation


How is the isolation between tenants and tenant data? Data is completely separated across tenants. The databases themselves are multitenant for HA and ideal service management, but keys on all tables completely restrict data to the tenant itself. When fetching data from the database, an additional security layer besides the UI API, is the database layer Linq2db, which assures that even if wrong parameters are entered and asked for, it is physically not possible to return data for other tenants thanthe individual tenant itself. As part of the ISMS, an annual penetration testing is conducted by an independent third party aiming to, amongst others, request data across tenants, which no successful attempts have ever been madeon. For further details on these topics see latest ISAE3402 audit report: Audit.

How is resource isolation identified?

  • Single-tenant dedicated PHYSICAL
  • Single-tenant dedicated LOGICAL (e.g. Multi-tenant on shared physical)
  • Multi-tenant shared LOGICAL resources (e.g. app instance handles many customers, only the app has to be exploited to see across data)
Data is completely separated across tenants. The databases themselves are multitenant for HA and ideal service management, but keys on all tables completely restrict data to the tenant itself. When fetching data from the database, an additional security layer besides the UI API, is the database layer Linq2db, which assures that even if wrong parameters are entered and asked for, it is physically not possible to return data for other tenants thanthe individual tenant itself. As part of the ISMS, an annual penetration testing is conducted by an independent third party aiming to, amongst others, request data across tenants, which no successful attempts have ever been madeon. For further details on these topics see latest ISAE3402 audit report: Audit.

How does the detail Provider employee access controls work?

  • Physical and logical (e.g. can they login to our OS or app instance?)
Staff at the provider of Outbound/Flows by Enreach are generally restricted access to systems and services, following the least and minimum access principle. See the audit reports for further details on this topic. Nobody outside the core IT Architectural Team have OS access. The commercial Support department can, upon permission granted by the customer itself, access the customer’s app account for service purposes.
What could be compromised for an attacker or other tenant to view our data? Data is completely separated across tenants. The databases themselves are multitenant for HA and ideal service management, but keys on all tables completely restrict data to the tenant itself. When fetching data from the database, an additional security layer besides the UI API, is the database layer Linq2db, which assures that even if wrong parameters are entered and asked for, it is physically not possible to return data for other tenants thanthe individual tenant itself. As part of the ISMS, an annual penetration testing is conducted by an independent third party aiming to, amongst others, request data across tenants, which no successful attempts have ever been madeon. For further details on these topics see latest ISAE3402 audit report. Audit.

Service Metrics, Logging, Monitoring, Incidents

How does monitoring the service performance or availability, any activity logging work? Logging and alerting at multiple levels implemented using Prometheus and Zabbix. Forfurther details on these topics see latest ISAE3402 audit report. Audit.
Can we export logs to Equifax? Lead history (calls, activities) can be exported via API.
How will provider monitoring capabilities detect unauthorizedactivity (e.g. port scanning, other tenant app attacks), etc.? Logging and alerting at multiple levels implemented using Prometheus and Zabbix. For further details on these topics see latest ISAE3402 audit report. Audit.

Provider and Service accreditations

Where is the general IT audits: SOC, ISO, etc. located? See further info about the platform, security, compliance and related topics on our website as well as in the latest ISAE3402 and ISAE3000 audit reports: Audit.
Where to find the Cloud specific: CSA Star, ISO 27017-18, etc.? See further info about the platform, security, compliance and related topics on our website as well as in the latest ISAE3402 and ISAE3000 audit reports: Audit.

Still need help? Contact Us Contact Us