Your data
Your information is protected via Secure Socked Layer (SSL) technology using both server authentication and data encryption. Wunderdata does not share, sell, rent, or trade data with third parties. You are data owner: only authenticated users from your organization will be able to access the data after entering a secure password.

Physical security
Our data centers are protected 24/7 with electronic access control systems, video surveillance and alarm systems.

Virtual Security
We keep virtual intruders out by transferring critical data via SSL and SSH protocols, firewalls and e-mail encryption.

100% conform with German data security laws
Our servers are located in Germany and meet stringent German and European privacy laws.

This TOMs are in compliance with German §9 Federal Data Protection Law (Bundesdatenschutzgesetz).

1. Admission control
• Access to computers / systems only with passwords with high safety standards (minimum length , regular change , etc.)

2. Transmission control
• All employees are obliged to maintain data secrecy according to § 5 Federal Data Protection Law (Bundesdatenschutzgesetz)
• Deletion of personal data after completion of the job in compliance with the data privacy law
• Data transfer through SSL and SSH protocols
• Firewalls according to the prior art
• Email encryption

3. Input control
• Important data can only be entered by the customer
• Every change in data is logged

4. Order supervision
• All employees will be trained at regular intervals in data protection law
• The terms and conditions include detailed information on the nature and extent of the processing and use of personal data
• Contracts are based in compliance with the requirements of § 11 Federal Data Protection Act (Bundesdatenschutzgesetz)
• Right of control by the contracting customer

5. Availability control
• Uninterruptible power supply
• RAID (disk mirroring)

6. Principle of separation
• Separation of production and test systems
• Separate folder structures for each customer
• Separate databases
• Separate database rights
• Logical client separation (ACL, ETL, etc.)

For more information please mail us at

Ready to securely data drive your business?