Cloud security for your cemetery.

Your data, secure.

Nothing is more important to us than the security of your data. That’s why our secure, cloud-based solution has been designed to ensure that your legacy is protected - now and always.

Data encryption.

We have a wealth of experience in data migration from a wide range of deathcare administration systems. When your data is in transit, we use SSL/TLS with a minimum of 128-bit AES encryption to ensure its absolute security.

 

Industry-leading protection.

We use Microsoft Azure - trusted by more than 95% of Fortune 500 companies as their cloud security provider. Azure has the most comprehensive set of compliance offerings of any cloud service provider, meaning we can take advantage of the most global regions of any public cloud. 

Ensure compliance with data residency requirements and reduce the risk of intellectual property legal action with comprehensive IP protection.
Learn more about Azure security measures.

 

Safe storage.

With PlotBox, your data is regularly backed up and stored securely across multiple data centers to protect against loss or corruption. Record scans and images are also stored on durable and highly available storage with a minimum of three copies.

Quite simply, the most sophisticated and secure way of storing your data.

 

Security testing.

With evolving threats and technologies, we continually test and monitor PlotBox, including all of our cloud infrastructure to identify potential security vulnerabilities ensuring we’re always one step ahead.

GDPR

Read our full policy here

 

Data consent.

The conditions for consent have been strengthened, and companies are no longer able to use long illegible terms and conditions full of legalese.

The request for consent must be given in an intelligible and easily accessible form, with the purpose of data processing attached to that consent. Consent must be clear and distinguishable from other matters and provided in an intelligible and easily accessible form, using clear and plain language. It must be as easy to withdraw consent as it is to give it.

 

Data subject rights.

Breach Notification Under the GDPR, breach notifications is now mandatory in all member states where a data breach is likely to “result in a risk for the rights and freedoms of individuals”. This must be done within 72 hours of first having become aware of the breach.

Data processors are also required to notify their customers, the controllers, “without undue delay” after first becoming aware of a data breach.

 

Right to access.

Part of the expanded rights of data subjects outlined by the GDPR is the right for data subjects to obtain confirmation from the data controller as to whether or not personal data concerning them is being processed, where and for what purpose.

Further, the controller shall provide a copy of the personal data, free of charge, in an electronic format. This change is a dramatic shift to data transparency and empowerment of data subjects

.

Right to be forgotten.

Also known as Data Erasure, the right to be forgotten entitles the data subject to have the data controller erase his/her personal data, cease further dissemination of the data, and potentially have third parties halt processing of the data.

The conditions for erasure, as outlined in article 17, include the data no longer being relevant to original purposes for processing, or a data subject withdrawing consent. It should also be noted that this right requires controllers to compare the subjects’ rights to “the public interest in the availability of the data” when considering such requests.

 

Data portability.

GDPR introduces data portability – the right for a data subject to receive the personal data concerning them – which they have previously provided in a ‘commonly used and machine-readable format' and have the right to transmit that data to another controller.

 

Privacy by design.

Privacy by design as a concept has existed for years, but it is only just becoming part of a legal requirement with the GDPR. At its core, privacy by design calls for the inclusion of data protection from the onset of the designing of systems, rather than an addition. More specifically, ‘The controller shall… implement appropriate technical and organizational measures… in an effective way… in order to meet the requirements of this Regulation and protect the rights of data subjects’.

Article 23 calls for controllers to hold and process only the data absolutely necessary for the completion of its duties (data minimization), as well as limiting the access to personal data to those needing to act out the processing.

 

Data protection officers.

Under GDPR it is not necessary to submit notifications/registrations to each local DPA of data processing activities, nor is it a requirement to notify/obtain approval for transfers based on the Model Contract Clauses (MCCs). 

Instead, there are internal record-keeping requirements, as further explained below, and DPO appointment is mandatory only for those controllers and processors whose core activities consist of processing operations that require regular and systematic monitoring of data subjects on a large scale or of special categories of data or data relating to criminal convictions and offenses. Importantly, the Data Protection Officer:

Must be appointed on the basis of professional qualities and, in particular, expert knowledge of data protection law and practices:

  • May be a staff member or an external service provider
  • Contact details must be provided to the relevant DPA
  • Must be provided with appropriate resources to carry out their tasks and maintain their expert knowledge
  • Must report directly to the highest level of management
  • Must not carry out any other tasks that could result in a conflict of interest.

    Source: https://gdpr-info.eu/