preeco | whistleblower
Reporting, Data Security, and Deadlines
Complete documentation for accountability requirements and audit readiness – with the highest security standards and automatic deadline monitoring.
REPORTING & EXPORT
Professional Exports for Every Need
Export individual reports as PDF, DOCX, or ZIP with all attachments – professionally formatted with initial report, communication, risk assessment, and checklists. For statistical analysis, filterable XLSX overviews are available.
- Export individual reports as PDF, DOCX, or ZIP
- All attachments included in ZIP export
- Filterable overview tables as XLSX for analysis
- Ideal for authority requests and internal audits
DEADLINE MONITORING & GDPR
Automatic Deadline Monitoring and GDPR-Compliant Deletion
The system automatically monitors legal deadlines: 7 days for the acknowledgment of receipt and 3 months for feedback. Dashboard notifications warn in advance, and completed reports are automatically marked for deletion after a configurable period.
- 7-day and 3-month deadlines per HinSchG automatically monitored
- Dashboard early warning before approaching deadlines
- Automatic deletion scheduling after configurable period
- Final review possible before permanent deletion
DATA SECURITY
Encryption and Secure Hosting
All data transmissions are SSL/TLS encrypted. Report contents and communication are additionally stored with AES encryption in the database. Cloud and Private Cloud are hosted in ISO 27001 certified data centers in Germany.
- End-to-end SSL/TLS encryption of all transmissions
- AES encryption of sensitive data in the database
- Hosting in ISO 27001 certified data centers in Germany
- Daily backups with off-site storage
ACCESS CONTROL & ANONYMITY
Two-Factor Authentication and Technical Anonymity
Two-factor authentication protects the administration area from unauthorized access. At the same time, the system does not log any access data that could reveal the identity of whistleblowers – technically guaranteed anonymity.
- Two-factor authentication with common authenticator apps
- 2FA can be configured as mandatory for all users
- No storage of IP addresses or tracking mechanisms
- Technically guaranteed anonymity for whistleblowers