Wir schützen Ihre Daten.

Wir nehmen Sicherheit ernst. Wir verpflichten uns, Ihre Daten und Ihre Privatsphäre zu schützen.

Sichere KI. Konform. Skalierbar.

ISO

ISO 27001 ist eine international anerkannte Norm, die Anforderungen für die Einrichtung, Implementierung, Aufrechterhaltung und kontinuierliche Verbesserung eines Informationssicherheitsmanagementsystems (ISMS) festlegt. Diese Norm bietet einen systematischen Ansatz für die Verwaltung sensibler Informationen und hilft Unternehmen, die Vertraulichkeit, Integrität und Verfügbarkeit ihrer Daten zu schützen.

DSGVO und KI-Gesetz

Bei Kern Al halten wir uns strikt an alle Anforderungen der allgemeinen Datenschutzverordnung (GDPR) und stellen die Einhaltung von Datenschutz, Sicherheit und der Weitergabe personenbezogener Daten sicher. Darüber hinaus halten wir uns an den AI Act und verpflichten uns zu ethischem und verantwortungsvollem Einsatz von KI, zu Transparenz und zur Einhaltung der höchsten Standards bei der Entwicklung und Bereitstellung von KI.

General Information Security Policy

Protect Kern AI’s informational and IT assets (including but not limited to all computers, mobile devices, networking equipment, software and sensitive data) against all internal, external, deliberate or accidental threats and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems;

Ensure information will be protected against any unauthorized access. Users shall only have access to resources that they have been specifically authorized to access. The allocation of privileges shall be strictly controlled and reviewed regularly.

Protect CONFIDENTIALITY of information. When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties;

Ensure INTEGRITY of information. Integrity of information refers to protecting information from being modified by unauthorized parties;

Maintain AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.

Comply with and, wherever possible, exceed, national legislative and regulatory requirements, standards and best practices;

Develop, Maintain and Test business continuity plans to ensure we stay on course despite all obstacles that we may come across. It is about “keeping calm and carrying on!”;

Raise awareness of information security by making information security training available for all Employees. Security awareness and targeted training shall be conducted consistently, security responsibilities reflected in job descriptions, and compliance with security requirements shall be expected and accepted as a part of our culture;

Ensure that no action will be taken against any employee who discloses an information security concern through reporting or in direct contact with the Information Security Management Leader, unless such disclosure indicates, beyond any reasonable doubt, an illegal act, gross negligence, or a repetitive deliberate or willful disregard for regulations or procedures;

Report all actual or suspected information security breaches security@kern.ai.

„Die Sicherheit der Daten unserer Kunden hat für uns oberste Priorität. Wir bauen nicht nur auf einer sicheren Infrastruktur auf, sondern stellen auch sicher, dass jeder bei Kern AI die Sicherheit also oberste Priorität hat.“Ensuring that our customers’ data is secure is our top priority. We not only build on top of secure infrastructure, but also make sure that everybody at Kern lives and breathes security.”

- Henrik Wenck, COO Kern AI