Logo Rulebooks
HomePlatform
Solutions
Org Chart Creator

Zowel eenvoudige als complexe charts

SOON

UBO Editor

Workflow voor al uw KYC-verzoeken

SOON

Extract Service

Snel uittreksels opvragen in >50 landen

SOON

TarievenOns verhaal
Flag NL
Flag NL
Dutch
Flag EN
English
Inloggen
Plan demo

Neem contact op

We horen graag van u!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Legal Terms overview
User Terms
General Terms and Conditions

Security Terms

Rulebooks will never use the data for purposes other than your legal operations practice, and we are determined to make sure nobody else ever will. All customer data that requires storage is located in the Google data center in Europe, with the highest security and operational reliability levels. When data-sharing occurs with applications or tools that enhance our product, this happens in compliance with the EU Data Protection Act. That means that the shared information is limited and does not expose sensitive personal data.  

‍Privacy Statement

We treat all data in our application carefully, securely, and confidentially. Data processing is done exclusively by existing guidelines of existing laws and regulations. Using our application, one agrees to use his or her data as described in our privacy statement.

‍General Data Protection Regulation

The new General Data Protection Regulation (GDPR) went live on May 25th, 2018. This has implications for Rulebooks and its services. Since the 1st of February, we have employed a compliance and risk officer dedicated to rolling out this project. Of course, the compliance officer is registered at the Dutch Data Protection Authority and will inform all those involved as accurately as possible. 

‍Application terms of use

We are committed to handling all data in our application carefully, safely, and confidentially. We process data exclusively by existing guidelines, restricted exclusively to the legal operations practice. When using our application, one agrees to use his or her data as outlined in our privacy policy.

‍Subprocessors

Rulebooks use the services of other companies. Think about data centers, product development systems, and support solutions. In legal terms, these parties are called subprocessors. You can find a list of all our subprocessors at https://rulebooks.ai.

‍How do we secure your data?

Rulebooks have taken measures to make Rulebooks both secure and convenient for our partners and users. We use several application, infrastructure, and user monitoring tools that alert our operations team to act in critical situations. For the complete picture, the Rulebooks IT whitepaper explains the efforts and policies that help secure our data.

‍Infrastructure

Data traffic to our servers is controlled 24/7 from a central control room. Within 30 minutes, Rulebooks will respond to unauthorized attempts to access the web service, irregular traffic, or other attempts to subvert Rulebooks. The Rulebooks infrastructure is protected by a Firewall managed by hosting partners that continuously identify potential threats. Each server is accessible from the Internet (web servers) and protected by an extra Operating System Firewall. 

‍SSL encryption

The client/Server communication is done with HTTPS, which guarantees data integrity and prevents data tampering. The Rulebooks certificate uses 2048-bit encryption. The HTTPS transport layers use a standard TLS without fallback to SSLv2/SSlv3, which are disabled for security reasons. Internet users can recognize the SSL-secured status by the lock icon before the website URL and Extended Validation SSL-secured websites by the green address bar.

‍User Authentication

Rulebooks offers a range of policies for password requirements, including options for periodical password resets and pin codes. Furthermore, Two-factor authentication provides an optional second authentication level. Rulebooks does not store users' passwords in the database, but instead, a salted hash of the password. This prevents password stealing even with database access.

‍IP validation

Every user has a whitelist with approved IP addresses to access the system. When users access the system from a new IP address, an email is sent to verify the new IP. It is also possible to restrict access to Rulebooks to a list of IPs or IP ranges. This measure helps to prevent third parties from entering Rulebooks accounts from alien locations and devices.

‍Who verifies our quality?

Rulebooks consults external parties to verify our operational excellence, procedures, and methodologies. Rulebooks maintains compliance certifications that provide independent verification of our quality.

‍ISAE 3402 Type II

Rulebooks has produced an ISAE 3402 report. One of the purposes of this ISAE 3402 Type II report is to provide Rulebooks customers with information to understand the design and implementation of controls implemented by Rulebooks, which are relevant to the control of the user organization’s internal processes for auditing their financial statements. Find out more information about the report right here.

‍What policies do we deploy?

A number of legal documents is important to both us at Rulebooks and our customers, our prospects, and users of our application. To make it easy to find the information you’re looking for, we’ve assembled them under one roof and provided a quick rundown of the individual regulations.

‍Data Processing Agreement

A processor agreement concerns an agreement about confidentiality, security, privacy, data elimination, and other obligations. We have included this in our general terms and conditions if you are a (new) customer looking for our standard processor agreement. You agree to these conditions when you subscribe for a Free Trial and again when you give the order confirmation.

‍Responsible Disclosure Policy

In the unfortunate event that a user or hacker identifies a vulnerability in our product, the Responsible Disclosure Policy provides instructions that ensure that information about the weakness will be handled confidentially and investigated with high priority. Find out more about this policy right here.

‍How can we work even safer?

To be an online software means that online crime is a risk to our service. Cybercriminals may attempt to obtain sensitive information by accessing individual accounts or using our names and image. We believe that shared knowledge is the most forceful weapon against this form of crime. Therefore, we aim to provide all our users and partners with clear knowledge and instructions on dealing with possible attempts at online crime.

‍Phishing and malicious emails

Phishing is a deceptive form of online fraud. For example, criminals send out misleading emails or messages appearing to come from Rulebooks or another trusted sender to acquire confidential information. However, Rulebooks will never request sensitive information, So do not leave your data under any circumstance. Furthermore, a phishing mail might request the login credentials of your Rulebooks account. Make sure to fill in this login information only within a Rulebooks domain with recognizable SSL encryption. Additionally, the government website provides valuable information on identifying phishing emails.

‍

HomePlatformTarievenOns verhaalContact
© 2025 Rulebooks. Alle rechten voorbehouden.
Algemene voorwaarden
Door op "Alle cookies accepteren" te klikken, stemt u in met het opslaan van cookies op uw apparaat om de navigatie op de site te verbeteren, het gebruik van de site te analyseren en te helpen bij onze marketinginspanningen. Bekijk onze privacybeleid voor meer informatie.
VoorkeurenAfwijzenAccepteren
Privacyvoorkeuren
Wanneer u websites bezoekt, kunnen zij gegevens in uw browser opslaan of ophalen. Deze informatie is vaak noodzakelijk voor de basisfunctionaliteit van de website. De informatie kan worden gebruikt voor marketing, analyse en personalisering van de site, zoals het opslaan van uw voorkeuren. Privacy is belangrijk voor ons, dus u hebt de mogelijkheid om bepaalde soorten opslag uit te schakelen. Het blokkeren van categorieën kan uw ervaring op de website beïnvloeden.
Alles afwijzenAlles accepteren
Voorkeuren per categorie beheren
Essentieel
Altijd actief
Deze items zijn nodig om de basisfuncties van de website mogelijk te maken. Ze omvatten geen tracking cookies.
Marketing
Deze items omvatten tracking-cookies en worden gebruikt om advertenties aan te bieden die relevanter zijn voor u en uw interesses. Ze kunnen ook worden gebruikt om het aantal keren dat u een advertentie te zien krijgt te beperken en de doeltreffendheid van reclamecampagnes te meten. Advertentienetwerken plaatsen deze alleen met toestemming van de websitebeheerder.
Personaliseren
Deze items omvatten tracking cookies en stellen de website in staat om keuzes die u maakt te onthouden (zoals uw gebruikersnaam, taal, of de regio waar u zich bevindt) en verbeterde, meer persoonlijke functies te bieden. Een website kan u bijvoorbeeld voorzien van lokale weerberichten of verkeersinformatie door gegevens over uw huidige locatie op te slaan.
Analytics
Deze items omvatten tracking cookies en helpen de websitebeheerder te begrijpen hoe zijn website presteert, hoe bezoekers met de site omgaan en of er technische problemen zijn. Dit opslagtype verzamelt geen informatie die een bezoeker identificeert, maar wel uw geanonimiseerde IP-adres.
Bevestig mijn voorkeuren en sluit venster