{"id":601,"date":"2025-08-19T16:01:45","date_gmt":"2025-08-19T14:01:45","guid":{"rendered":"https:\/\/dudziaknetwork.com\/information-data-security\/"},"modified":"2025-08-19T18:33:42","modified_gmt":"2025-08-19T16:33:42","slug":"data-information-security","status":"publish","type":"page","link":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/","title":{"rendered":"Daten- und Informationssicherheitsrichtlinie"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; type=&#8220;vc_default&#8220; css=&#8220;.vc_custom_1724230818887{margin-bottom: -1em !important;padding-bottom: 4vmin !important;}&#8220;][vc_column css=&#8220;.vc_custom_1724230828735{margin-bottom: -3.5em !important;}&#8220;][vc_raw_html css=&#8220;&#8220;]JTNDaDIlMjBzdHlsZSUzRCUyMmZvbnQtc2l6ZSUzQSUyMDIwMCUyNSUzQiUyMGxpbmUtaGVpZ2h0JTNBJTIwMS4yJTNCJTIwY29sb3IlM0ElMjAlMjMxOTlkYmIlMjIlM0UlMEFEYXRlbi0lMjB1bmQlMjBJbmZvcm1hdGlvbnNzaWNoZXJoZWl0JTBBJTNDYnIlM0UlM0NzcGFuJTIwc3R5bGUlM0QlMjJmb250LXdlaWdodCUzQSUyMG5vcm1hbCUyMiUzRSUwQUR1ZHppYWslMjAlMjYlMjBOZXR3b3JrJTBBJTNDJTJGc3BhbiUzRSUzQyUyRmgyJTNFJTBBJTNDYnIlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; gap=&#8220;30&#8243; equal_height=&#8220;yes&#8220; content_placement=&#8220;top&#8220; bg_type=&#8220;bg_color&#8220; type=&#8220;vc_default&#8220; margin_top=&#8220;55&#8243; margin_bottom=&#8220;5&#8243; css=&#8220;.vc_custom_1653395360355{margin-bottom: -3em !important;}&#8220;][vc_column css=&#8220;.vc_custom_1602858046274{margin-top: 0px !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1755621218922{margin-top: .4em !important;}&#8220;]<\/p>\n<h3>Daten- und Informationssicherheitsrichtlinie<\/h3>\n<p>Der verantwortungsvolle Umgang mit Kommunikations- und Informationstechnologien ist ein zentraler Bestandteil unserer Arbeit, insbesondere beim Schutz sensibler Kundendaten.<\/p>\n<p>Gemeinsam mit unserem IT-Partner Heidelberg iT haben wir eine umfassende Informationssicherheitsrichtlinie entwickelt: Risiken identifiziert, bew\u00e4hrte Vorgehensweisen definiert und wirksame Schutzma\u00dfnahmen umgesetzt.<\/p>\n<p>So schaffen wir eine digitale Umgebung, die h\u00f6chste Sicherheit f\u00fcr uns und unsere Kunden gew\u00e4hrleistet.<\/p>\n<p>Wesentliche Ma\u00dfnahmen unserer Informationssicherheitsrichtlinie sind<\/p>\n<ul>\n<li>Strikte Passwortrichtlinien und Zugriffs\u00adkontrollen<\/li>\n<li>Nutzung sicherer, verschl\u00fcsselter Cloud-Plattformen<\/li>\n<li>gesch\u00fctzte WLAN-Nutzung und Einsatz von Blickschutzfolien<\/li>\n<li>Hardware-Verschl\u00fcsselung und regelm\u00e4\u00dfige Software-Updates<\/li>\n<li>Verpflichtende und regelm\u00e4\u00dfige Mitarbeiterschulungen<\/li>\n<li>Audits sowohl bei D&amp;N als auch bei unserem IT-Administrator<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; type=&#8220;vc_default&#8220; css=&#8220;.vc_custom_1724230818887{margin-bottom: -1em !important;padding-bottom: 4vmin !important;}&#8220;][vc_column css=&#8220;.vc_custom_1724230828735{margin-bottom: -3.5em !important;}&#8220;][vc_raw_html css=&#8220;&#8220;]JTNDaDIlMjBzdHlsZSUzRCUyMmZvbnQtc2l6ZSUzQSUyMDIwMCUyNSUzQiUyMGxpbmUtaGVpZ2h0JTNBJTIwMS4yJTNCJTIwY29sb3IlM0ElMjAlMjMxOTlkYmIlMjIlM0UlMEFEYXRlbi0lMjB1bmQlMjBJbmZvcm1hdGlvbnNzaWNoZXJoZWl0JTBBJTNDYnIlM0UlM0NzcGFuJTIwc3R5bGUlM0QlMjJmb250LXdlaWdodCUzQSUyMG5vcm1hbCUyMiUzRSUwQUR1ZHppYWslMjAlMjYlMjBOZXR3b3JrJTBBJTNDJTJGc3BhbiUzRSUzQyUyRmgyJTNFJTBBJTNDYnIlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; gap=&#8220;30&#8243; equal_height=&#8220;yes&#8220; content_placement=&#8220;top&#8220; bg_type=&#8220;bg_color&#8220; type=&#8220;vc_default&#8220; margin_top=&#8220;55&#8243; margin_bottom=&#8220;5&#8243; css=&#8220;.vc_custom_1653395360355{margin-bottom: -3em !important;}&#8220;][vc_column css=&#8220;.vc_custom_1602858046274{margin-top: 0px !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1755621218922{margin-top: .4em !important;}&#8220;] Daten- und Informationssicherheitsrichtlinie Der verantwortungsvolle Umgang mit Kommunikations- und Informationstechnologien ist ein zentraler Bestandteil unserer Arbeit, insbesondere beim Schutz sensibler Kundendaten. Gemeinsam mit unserem IT-Partner Heidelberg&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-601","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Daten- und Informationssicherheitsrichtlinie - Dudziak &amp; Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Daten- und Informationssicherheitsrichtlinie - Dudziak &amp; Network\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; type=&#8220;vc_default&#8220; css=&#8220;.vc_custom_1724230818887{margin-bottom: -1em !important;padding-bottom: 4vmin !important;}&#8220;][vc_column css=&#8220;.vc_custom_1724230828735{margin-bottom: -3.5em !important;}&#8220;][vc_raw_html css=&#8220;&#8220;]JTNDaDIlMjBzdHlsZSUzRCUyMmZvbnQtc2l6ZSUzQSUyMDIwMCUyNSUzQiUyMGxpbmUtaGVpZ2h0JTNBJTIwMS4yJTNCJTIwY29sb3IlM0ElMjAlMjMxOTlkYmIlMjIlM0UlMEFEYXRlbi0lMjB1bmQlMjBJbmZvcm1hdGlvbnNzaWNoZXJoZWl0JTBBJTNDYnIlM0UlM0NzcGFuJTIwc3R5bGUlM0QlMjJmb250LXdlaWdodCUzQSUyMG5vcm1hbCUyMiUzRSUwQUR1ZHppYWslMjAlMjYlMjBOZXR3b3JrJTBBJTNDJTJGc3BhbiUzRSUzQyUyRmgyJTNFJTBBJTNDYnIlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; gap=&#8220;30&#8243; equal_height=&#8220;yes&#8220; content_placement=&#8220;top&#8220; bg_type=&#8220;bg_color&#8220; type=&#8220;vc_default&#8220; margin_top=&#8220;55&#8243; margin_bottom=&#8220;5&#8243; css=&#8220;.vc_custom_1653395360355{margin-bottom: -3em !important;}&#8220;][vc_column css=&#8220;.vc_custom_1602858046274{margin-top: 0px !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1755621218922{margin-top: .4em !important;}&#8220;] Daten- und Informationssicherheitsrichtlinie Der verantwortungsvolle Umgang mit Kommunikations- und Informationstechnologien ist ein zentraler Bestandteil unserer Arbeit, insbesondere beim Schutz sensibler Kundendaten. Gemeinsam mit unserem IT-Partner Heidelberg&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Dudziak &amp; Network\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T16:33:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/\",\"url\":\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/\",\"name\":\"Daten- und Informationssicherheitsrichtlinie - Dudziak &amp; Network\",\"isPartOf\":{\"@id\":\"https:\/\/dudziaknetwork.com\/#website\"},\"datePublished\":\"2025-08-19T14:01:45+00:00\",\"dateModified\":\"2025-08-19T16:33:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dudziaknetwork.com\/de\/data-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/dudziaknetwork.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Daten- und Informationssicherheitsrichtlinie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dudziaknetwork.com\/#website\",\"url\":\"https:\/\/dudziaknetwork.com\/\",\"name\":\"Dudziak &amp; Network\",\"description\":\"Manufacturing Consulting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dudziaknetwork.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Daten- und Informationssicherheitsrichtlinie - Dudziak &amp; Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/","og_locale":"de_DE","og_type":"article","og_title":"Daten- und Informationssicherheitsrichtlinie - Dudziak &amp; Network","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; type=&#8220;vc_default&#8220; css=&#8220;.vc_custom_1724230818887{margin-bottom: -1em !important;padding-bottom: 4vmin !important;}&#8220;][vc_column css=&#8220;.vc_custom_1724230828735{margin-bottom: -3.5em !important;}&#8220;][vc_raw_html css=&#8220;&#8220;]JTNDaDIlMjBzdHlsZSUzRCUyMmZvbnQtc2l6ZSUzQSUyMDIwMCUyNSUzQiUyMGxpbmUtaGVpZ2h0JTNBJTIwMS4yJTNCJTIwY29sb3IlM0ElMjAlMjMxOTlkYmIlMjIlM0UlMEFEYXRlbi0lMjB1bmQlMjBJbmZvcm1hdGlvbnNzaWNoZXJoZWl0JTBBJTNDYnIlM0UlM0NzcGFuJTIwc3R5bGUlM0QlMjJmb250LXdlaWdodCUzQSUyMG5vcm1hbCUyMiUzRSUwQUR1ZHppYWslMjAlMjYlMjBOZXR3b3JrJTBBJTNDJTJGc3BhbiUzRSUzQyUyRmgyJTNFJTBBJTNDYnIlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; gap=&#8220;30&#8243; equal_height=&#8220;yes&#8220; content_placement=&#8220;top&#8220; bg_type=&#8220;bg_color&#8220; type=&#8220;vc_default&#8220; margin_top=&#8220;55&#8243; margin_bottom=&#8220;5&#8243; css=&#8220;.vc_custom_1653395360355{margin-bottom: -3em !important;}&#8220;][vc_column css=&#8220;.vc_custom_1602858046274{margin-top: 0px !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1755621218922{margin-top: .4em !important;}&#8220;] Daten- und Informationssicherheitsrichtlinie Der verantwortungsvolle Umgang mit Kommunikations- und Informationstechnologien ist ein zentraler Bestandteil unserer Arbeit, insbesondere beim Schutz sensibler Kundendaten. Gemeinsam mit unserem IT-Partner Heidelberg&hellip;","og_url":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/","og_site_name":"Dudziak &amp; Network","article_modified_time":"2025-08-19T16:33:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/","url":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/","name":"Daten- und Informationssicherheitsrichtlinie - Dudziak &amp; Network","isPartOf":{"@id":"https:\/\/dudziaknetwork.com\/#website"},"datePublished":"2025-08-19T14:01:45+00:00","dateModified":"2025-08-19T16:33:42+00:00","breadcrumb":{"@id":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dudziaknetwork.com\/de\/data-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dudziaknetwork.com\/de\/data-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/dudziaknetwork.com\/de\/"},{"@type":"ListItem","position":2,"name":"Daten- und Informationssicherheitsrichtlinie"}]},{"@type":"WebSite","@id":"https:\/\/dudziaknetwork.com\/#website","url":"https:\/\/dudziaknetwork.com\/","name":"Dudziak &amp; Network","description":"Manufacturing Consulting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dudziaknetwork.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/pages\/601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/comments?post=601"}],"version-history":[{"count":4,"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/pages\/601\/revisions"}],"predecessor-version":[{"id":611,"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/pages\/601\/revisions\/611"}],"wp:attachment":[{"href":"https:\/\/dudziaknetwork.com\/de\/wp-json\/wp\/v2\/media?parent=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}