Privacy & Data protection

Chromozoom guarantees reliable privacy and data protection in full compliance with GDPR. We are transparent about the data we collect and store, and how your data is used. You can find a full list of Chromozoom’s activities in our Privacy Statement.

Privacy & Data protection

Encryption

Chromozoom uses industry-standard encryption to protect your sensitive data. All data transferred via our website is secured using the HTTPS protocol. Your test results are further encrypted via a cypher composed of your password and a unique key, assigned automatically through our software.

Encryption

Chromozoom uses industry-standard encryption to protect your sensitive data. All data transferred via our website is secured using the HTTPS protocol. Your test results are further encrypted via a cypher composed of your password and a unique key, assigned automatically through our software.

Anonymisation

To maintain total anonymity, your personal data is stored separately from your genetic profile. Once you create your Chromozoom account, we create a unique barcode that serves as the only form of identification throughout the testing process.

This means that no one in our team or in our laboratories can connect the person to the DNA sample being analysed, as the sample is marked solely by the unique barcode.

Anonymisation

To maintain total anonymity, your personal data is stored separately from your genetic profile. Once you create your Chromozoom account, we create a unique barcode that serves as the only form of identification throughout the testing process.

This means that no one in our team or in our laboratories can connect the person to the DNA sample being analysed, as the sample is marked solely by the unique barcode.

Privacy, anonymity, and peace of mind guaranteed.

Monitoring and protocol

We use the latest technologies to prevent and report on data breaches and network attacks. With real-time data scanning for errors and activity monitoring, our system evaluates risks and notifies network administrators about potential issues or malicious activity.

Monitoring and protocol

We use the latest technologies to prevent and report on data breaches and network attacks. With real-time data scanning for errors and activity monitoring, our system evaluates risks and notifies network administrators about potential issues or malicious activity.

Secure by design

We develop our apps from the ground up, and always with security in mind. This guarantees the highest level of privacy, reliability, integrity and data availability for our clients.

Secure by design

We develop our apps from the ground up, and always with security in mind. This guarantees the highest level of privacy, reliability, integrity and data availability for our clients.

Physical separation

We use different physical locations for collecting and processing DNA samples, with multi-tiered restrictions on access to genetic data.

In cases where we use third-party services that may need access to your personal data to carry out their work, for example courier companies, we follow a rigorous selection process, ensuring that they comply with strict data protection regulations.

Physical separation

We use different physical locations for collecting and processing DNA samples, with multi-tiered restrictions on access to genetic data.

In cases where we use third-party services that may need access to your personal data to carry out their work, for example courier companies, we follow a rigorous selection process, ensuring that they comply with strict data protection regulations.

Availability and resilience

Our apps are configured across geographically distributed data centres, minimising the risk of data breaches, technical issues or slowdowns. This ensures that data is always secure and available to our clients.

Availability and resilience

Our apps are configured across geographically distributed data centres, minimising the risk of data breaches, technical issues or slowdowns. This ensures that data is always secure and available to our clients.

Controlled access

We only allow authorised personnel access to data, based on their roles. Our security measures include multi-factor authentication, unique log-in data, and restrictions on the level of data each person can access.

Controlled access

We only allow authorised personnel access to data, based on their roles. Our security measures include multi-factor authentication, unique log-in data, and restrictions on the level of data each person can access.

No third party sharing

We do not sell, lease or share client data with third parties, not even for research purposes. Any and all personal data can be destroyed on request.

No third party sharing

We do not sell, lease or share client data with third parties, not even for research purposes. Any and all personal data can be destroyed on request.