At LOOP®, we have appropriate technical and organizational measures in place to protect information and ensure a consistent level of security.
Governance & Standards
Our security framework is aligned with internationally recognized standards and is continuously reviewed and improved.
Information security is supported by defined roles, documented processes, and cross-functional collaboration. Risks and controls are regularly reviewed to maintain an appropriate level of protection.
Access & Identity
Access to systems and information is centrally managed, documented, and regularly reviewed. We use centralized identity and access management, multi-factor authentication for relevant access scenarios, and structured processes for onboarding, role changes, and offboarding.
Infrastructure & Protection
We apply a layered security approach to protect devices, systems, and networks. This includes managed endpoints, controlled network access, secure remote access, and technical safeguards designed to reduce risk and support resilient operations.
Monitoring & Response
Security-relevant activities are logged and monitored to identify unusual behavior and respond to potential threats at an early stage. Defined processes support detection, escalation, and incident response.
Secure Development
Security is embedded into how we design and build digital products. Our development approach includes secure practices, peer review, and structured handling of third-party components and dependencies.
Data Protection & Availability
We implement measures to protect data and maintain availability. This includes encrypted transmission where appropriate, backup and recovery processes, and controlled handling of sensitive information.
Physical & Organisational Security
Security extends beyond systems to our workplaces and day-to-day processes. Controlled office access, visitor management, defined security zones, internal policies, and awareness measures all contribute to protecting confidential information.
Partners & Suppliers
We consider security in the selection and management of external partners and suppliers. This includes risk-based evaluation, contractual requirements, and ongoing oversight where appropriate.
Continuous Improvement
Information security is continuously reviewed and improved to address evolving risks, technologies, and business requirements.
For security-related inquiries, please contact security@agentur-loop.com.