🔒Security & Privacy

At Root3, we take the security of your apps and systems very seriously. Our service includes multiple security and privacy features to ensure that your systems are always running the latest, most secure versions of apps while ensuring user privacy.

We have strict access controls in place to ensure that only authorized personnel have access to your data. Our employees are required to sign confidentiality agreements and are trained on data protection and security best practices.

We regularly audit and test our systems to identify and address vulnerabilities and we continuously monitor our systems for any suspicious activity.

We will not share, sell or rent your personal information to any third parties without your explicit consent. We will only use your personal information for the purposes for which it was collected and to communicate with you about our products and services. All sub-processors are included on this page and how we use those services.

We encourage our customers to contact us with any questions or concerns about security or privacy. If you believe that your data has been compromised, please contact us immediately.

For more information please refer to our website.

App Integrity

One of our main security features is the Developer Team ID check. This feature checks that the Developer ID of an app matches the expected Developer ID known to Root3 before it is installed, minimizing the risk of a compromised app. This ensures that only safe and reliable applications are installed on your systems from known developers.

Some apps in the App Catalog are not signed with a Developer Team ID. For these exceptions the App Catalog is not able to verify the integrity of the app. Use at your own risk and contact the developer if this is important to you.

Datacenter

The App Catalog is hosted in an EU datacenter, ensuring that all data is stored and processed in compliance with European data protection regulations. We use state-of-the-art security measures, including encryption, firewalls, and intrusion detection systems, to protect your data against unauthorized access and breaches.

Certifications

  • ISO 9001 certified

  • ISO 27001 certified

Sub-processors

Root3 limits the sharing of data through its sub-processors. Cloud services or other suppliers need to meet our standards for privacy and security as defined in our quality management system and information security management system. A list of sub-processors, description and how we use those for the App Catalog is shown below:

Last updated