PrintWayy Products and Operation Safety

See how we contribute to the security of Outsourcing operations.

 

Data Center and PrintWayy development environments

PrintWayy works according to the most advanced data security standards. The servers are located in cloud, high security processing centers.
All security protocols in our datacenter are based on the latest
available technologies, such as firewalls, antivirus, anti-malware and other logical and physical access controls.

PrintWayy uses the servers in two private clouds, Microsoft Azure, and IBM Cloud which together build PrintWayy's most secure cloud ecosystem.

The Microsoft Azure cloud, is the number one in the world with the most certifications and audits performed, focusing on data security, storage quality, reliability, privacy, and availability.

The Azure environment is fully adapted to the most diverse data protection, security and privacy legislation and certifications, such as the European Union's data protection legislation, GDPR, and the Brazilian data protection legislation, LGPD.

The IBM Cloud, in addition to all Microsoft certifications, also has regional and market certifications, which can be viewed here.
It is the only private cloud provider in the world that holds 140-2 Level 4, the highest level of government security certification.

PrintWayy Goals with Private Cloud Data Centers

  • Ensuring the security of Data Centers.
  • Confidentiality.
  • Client integrity.
  • Quality when storing the
    quality when storing the data.
  • High availability.
  • Take away the need for the PrintWayy customer to have an
    additional structure.
  • Take the cost out of the PrintWayy customer's
    licensing and security costs.
  • Privacy guarantee.
  • The certainty of PrintWayy's digital product development in environments with more than 100 renowned security certifications

How can PrintWayy keep your environment and that of your customers or users secure?

PrintWayy has policies, standards and procedures for information security, fully based on ISO 27001 and ISO 31001, as well as governance and data security practices.

All Playyers, as we call our employees, are aware of the importance of secure data, and this is ensured with quarterly workshops on data security, and also through a confidentiality agreement signed in the act of hiring each Playyer, these practices adopted are also evaluated and monitored constantly by CGSI(Information Security Management Committee) of PrintWayy.

In addition to various security protocols established as good governance practices, all our equipment has antivirus, firewalls, encrypted access passwords, adoption of the Windows Cryptography system, BitLocker, which encrypts HD partitions, protecting computer documents and files against unauthorised access, Cryptography on servers, physical and logical access restriction, and also the adoption of formalised corporate governance, with incident and claim management procedures.

Policies and terms of use of PrintWayy and its products

Corporate Website Privacy and Marketing Policy
Cookie Policy
Solutions Privacy Policy
Solutions Terms of Use
API Terms of Use

PrintWayy is already in compliance with law no. 13.709/2018, General Data Protection Law (LGPD), and to make this possible, we have strengthened our security structures, created new structures and layers, created a corporate governance of data and security, updated our policies and also our terms of use.

In addition, we reinforce with our providers, employees and suppliers the commitment to data privacy at all exercise ends of the business.

Technological safety of products

With a focus on the technological updating of its products, PrintWayy seeks to maintain the direction of its implementations on fronts that increasingly understand the needs of the providers of Outsourcing Services and their customers.

To ensure the quality and security of monitoring print assets, their supplies, counters and other data, PrintWayy uses robust encryption methods to transport information over the network in its communication protocols.

Our encryption is done end-to-end, i.e. .plog, or.dlog files are encrypted at their origin, in environments where PrintWayy clients are installed, and decrypted only at their destination, when each file is processed at PrintWayy's Data Center on Microsoft Azure, or IBM Cloud.

PrintWayy does not capture any sensitive data, images or print files itself, only the print metadata, which is quantitative data such as counters, supplies status, device operating status, machine names, print types and basic information about its executors such as who, when and where printed (The latter only for accounting/billing solution).

This data goes through processing and is allocated to various parts of the system, providing data intelligence to facilitate the routine of print outsourcing providers.

Do you have any questions?
Contact us at suporte@printwayy.com.

 

DPO PrintWayy: Mr. Pedro Mariano.