Logo Rulebooks
HomePlatform
Solutions
Org Chart Creator

Zowel eenvoudige als complexe charts

SOON

UBO Editor

Workflow voor al uw KYC-verzoeken

SOON

Extract Service

Snel uittreksels opvragen in >50 landen

SOON

RatesOur Story
Flag EN
Flag NL
Dutch
Flag EN
English
login
Plan demo

Get in touch

We'd love to hear from you!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Legal Terms overview
User Terms
General Terms and Conditions

Security Terms

Rulebooks will never use the data for purposes other than your legal operations practice, and we are determined to make sure nobody else ever will. All customer data that requires storage is located in the Google data center in Europe, with the highest security and operational reliability levels. When data-sharing occurs with applications or tools that enhance our product, this happens in compliance with the EU Data Protection Act. That means that the shared information is limited and does not expose sensitive personal data.  

‍Privacy Statement

We treat all data in our application carefully, securely, and confidentially. Data processing is done exclusively by existing guidelines of existing laws and regulations. Using our application, one agrees to use his or her data as described in our privacy statement.

‍General Data Protection Regulation

The new General Data Protection Regulation (GDPR) went live on May 25th, 2018. This has implications for Rulebooks and its services. Since the 1st of February, we have employed a compliance and risk officer dedicated to rolling out this project. Of course, the compliance officer is registered at the Dutch Data Protection Authority and will inform all those involved as accurately as possible. 

‍Application terms of use

We are committed to handling all data in our application carefully, safely, and confidentially. We process data exclusively by existing guidelines, restricted exclusively to the legal operations practice. When using our application, one agrees to use his or her data as outlined in our privacy policy.

‍Subprocessors

Rulebooks use the services of other companies. Think about data centers, product development systems, and support solutions. In legal terms, these parties are called subprocessors. You can find a list of all our subprocessors at https://rulebooks.ai.

‍How do we secure your data?

Rulebooks have taken measures to make Rulebooks both secure and convenient for our partners and users. We use several application, infrastructure, and user monitoring tools that alert our operations team to act in critical situations. For the complete picture, the Rulebooks IT whitepaper explains the efforts and policies that help secure our data.

‍Infrastructure

Data traffic to our servers is controlled 24/7 from a central control room. Within 30 minutes, Rulebooks will respond to unauthorized attempts to access the web service, irregular traffic, or other attempts to subvert Rulebooks. The Rulebooks infrastructure is protected by a Firewall managed by hosting partners that continuously identify potential threats. Each server is accessible from the Internet (web servers) and protected by an extra Operating System Firewall. 

‍SSL encryption

The client/Server communication is done with HTTPS, which guarantees data integrity and prevents data tampering. The Rulebooks certificate uses 2048-bit encryption. The HTTPS transport layers use a standard TLS without fallback to SSLv2/SSlv3, which are disabled for security reasons. Internet users can recognize the SSL-secured status by the lock icon before the website URL and Extended Validation SSL-secured websites by the green address bar.

‍User Authentication

Rulebooks offers a range of policies for password requirements, including options for periodical password resets and pin codes. Furthermore, Two-factor authentication provides an optional second authentication level. Rulebooks does not store users' passwords in the database, but instead, a salted hash of the password. This prevents password stealing even with database access.

‍IP validation

Every user has a whitelist with approved IP addresses to access the system. When users access the system from a new IP address, an email is sent to verify the new IP. It is also possible to restrict access to Rulebooks to a list of IPs or IP ranges. This measure helps to prevent third parties from entering Rulebooks accounts from alien locations and devices.

‍Who verifies our quality?

Rulebooks consults external parties to verify our operational excellence, procedures, and methodologies. Rulebooks maintains compliance certifications that provide independent verification of our quality.

‍ISAE 3402 Type II

Rulebooks has produced an ISAE 3402 report. One of the purposes of this ISAE 3402 Type II report is to provide Rulebooks customers with information to understand the design and implementation of controls implemented by Rulebooks, which are relevant to the control of the user organization’s internal processes for auditing their financial statements. Find out more information about the report right here.

‍What policies do we deploy?

A number of legal documents is important to both us at Rulebooks and our customers, our prospects, and users of our application. To make it easy to find the information you’re looking for, we’ve assembled them under one roof and provided a quick rundown of the individual regulations.

‍Data Processing Agreement

A processor agreement concerns an agreement about confidentiality, security, privacy, data elimination, and other obligations. We have included this in our general terms and conditions if you are a (new) customer looking for our standard processor agreement. You agree to these conditions when you subscribe for a Free Trial and again when you give the order confirmation.

‍Responsible Disclosure Policy

In the unfortunate event that a user or hacker identifies a vulnerability in our product, the Responsible Disclosure Policy provides instructions that ensure that information about the weakness will be handled confidentially and investigated with high priority. Find out more about this policy right here.

‍How can we work even safer?

To be an online software means that online crime is a risk to our service. Cybercriminals may attempt to obtain sensitive information by accessing individual accounts or using our names and image. We believe that shared knowledge is the most forceful weapon against this form of crime. Therefore, we aim to provide all our users and partners with clear knowledge and instructions on dealing with possible attempts at online crime.

‍Phishing and malicious emails

Phishing is a deceptive form of online fraud. For example, criminals send out misleading emails or messages appearing to come from Rulebooks or another trusted sender to acquire confidential information. However, Rulebooks will never request sensitive information, So do not leave your data under any circumstance. Furthermore, a phishing mail might request the login credentials of your Rulebooks account. Make sure to fill in this login information only within a Rulebooks domain with recognizable SSL encryption. Additionally, the government website provides valuable information on identifying phishing emails.

‍

HomePlatformRatesOur StoryContact
© 2025 Rulebooks. All rights reserved.
General terms and conditions
By op “Accept all cookies” By clicking, you agree to the storage of cookies on your device to improve site navigation, analyze site use, and help with our marketing efforts. Check out our privacy policy for more information.
Preferencesrejectingaccepting
Privacy Preferences
When you visit websites, they may store or retrieve data in your browser. This information is often necessary for the basic functionality of the website. The information can be used for marketing, analysis and personalization of the site, such as storing your preferences. Privacy is important to us, so you have the option to disable certain types of storage. Blocking categories may affect your experience on the website.
Reject everythingAccept everything
Manage preferences by category
Essential
Always active
These items are necessary to enable the basic functions of the website. They do not include tracking cookies.
Marketing
These items include tracking cookies and are used to provide ads that are more relevant to you and your interests. They can also be used to limit the number of times you see an ad and measure the effectiveness of advertising campaigns. Advertising networks only place them with the permission of the website operator.
Personalize
These items include tracking cookies and allow the website to remember choices you make (such as your user name, language, or region where you are) and provide enhanced, more personal features. For example, a website can provide you with local weather reports or traffic information by storing information about your current location.
Analytics
These items include tracking cookies and help the website operator understand how their website is performing, how visitors interact with the site, and if there are any technical issues. This type of storage does not collect information that identifies a visitor, but it does collect your anonymized IP address.
Confirm my preferences and close window