top of page

Trust Center

Your Trust, Our Priority

Last update: November 2024

1. Subscribe to Our Newsletter

Stay Informed with Our Safety and Compliance Newsletter

 

We value the transparency and safety of our users at Emerit Science. To keep you constantly informed of the latest security measures implemented and the compliance reports obtained, we invite you to subscribe to our dedicated newsletter. By subscribing, you will receive regular updates on the improvements to our Charlie platform, details on our data protection initiatives, as well as in-depth analysis of our security audits and certifications.

 

This newsletter is designed to give you a clear and up-to-date view of our commitment to security and privacy, thus strengthening your trust in our solutions. Don't miss any essential information and be the first to discover how we continue to secure your data and meet the strictest industry standards. Register today and actively participate in our approach to continuous protection and innovation.

Subscribe to our Newsletter

2. Overview

Welcome to the Emerit Science Trust Center
 
At Emerit Science, the security and confidentiality of your data are at the heart of our priorities. Our Trust Center is designed to give you complete transparency on the measures we implement to protect your information and ensure the reliability of our Charlie platform, our AI conversational assistant dedicated to life sciences.
 
In this Trust Center, you will find detailed information about our security certifications, our data protection policies, as well as the rigorous practices we follow to ensure compliance with the strictest regulations, such as the GDPR. We strongly believe that trust is built through transparency and responsibility, which is why we openly share our security procedures, regular audits and data protection initiatives.
 
Whether you're a researcher, a healthcare professional, or an industry partner, this Trust Center helps you understand how Charlie secures your data, optimizes your research, and respects your privacy. Explore our dedicated sections to learn more about our commitments, certifications, and the advanced technologies we use to ensure a secure and reliable user experience. At Emerit Science, we are committed to providing innovative solutions while protecting what matters most to you: your data and your trust.

3. Conformity

Drapeau de l'union Européenne

GDPR

 

At Emerit Science, we are fully committed to complying with the General Data Protection Regulation (GDPR), a European regulation aimed at protecting the personal data of our users. Whether you are a resident of the European Union or not, if you use our Charlie platform, your data is processed in accordance with the strict requirements of the GDPR. We ensure transparent collection of information, obtaining your explicit consent before any data processing and clearly informing you of how your data is used.

 

User Rights and Data Security

 

The GDPR strengthens your data protection rights, and Emerit Science ensures that you can fully exercise these rights. You have the right to access your data, rectify it, request its deletion, and limit its processing. Our Charlie platform incorporates advanced security measures, such as data encryption and rigorous access controls, to ensure the confidentiality and integrity of your personal information. In addition, we have appointed a dedicated Data Protection Officer (DPO), responsible for supervising our compliance with the GDPR and answering all your questions about the protection of your data.

 

Commitment to Data Protection

 

Adopting a proactive approach to data protection is at the heart of our philosophy. By integrating the principles of privacy by design and privacy by default, we ensure that the protection of your data is integrated from the design of our systems and maintained by default. Emerit Science regularly conducts internal audits and risk assessments to identify and mitigate potential vulnerabilities. In the event of a security incident, we have robust incident management protocols to respond quickly and effectively, thus minimizing any impact on your personal data.

4. They trust us

Genopole

GMT-Science

Artemisia

4P-Pharma

Here are the links to the Emerit Science documentary database.

Privacy Policy

General Conditions of Use

5. Documents

6. Security Categories

This set states the different security techniques used.

 

6.1 Data encryption

 

To ensure the confidentiality and integrity of your data, we use cutting-edge encryption standards such as TLS 1.3 for communications and AES-256 for secure information storage.

 

6.2 Access management and authentication

 

We have implemented strict role-based access controls (RBAC) to ensure that only authorized persons can access sensitive information. Multi-factor authentication (MFA) is required for all administrator users.

 

6.3 Secure data storage

 

The data is hosted in ISO 27001 and SOC 2 certified data centers, offering a highly secure and resilient infrastructure. We perform regular backups and recovery tests to ensure the continuous availability of your information.

 

6.4 Surveillance and detection of threats

 

Charlie benefits from continuous 24/7 monitoring thanks to intrusion detection and security event management systems. Our security team reacts quickly to any suspicious activity to prevent potential incidents.

 

6.5 Security Policies and Training

 

We have established strict security policies covering all aspects of information management and data protection. All of our employees follow regular training programs to maintain a safety culture within the company.

 

6.6 Incident management and continuity plans

 

We have established procedures for the management of security incidents, including detection, analysis, response and recovery. A business continuity plan is in place to minimize interruptions and ensure the resilience of our platform.

 

6.7 Audits and regular compliance

 

We conduct regular safety audits with external auditors to ensure our compliance with industrial and regulatory standards. These audits make it possible to identify and correct vulnerabilities, thus ensuring continuous security.

bottom of page