Productivity
WEDO as a Task Organizer: Plan, Prioritize, and Track Like a Pro
Plan, prioritize, and track tasks with WEDO. Assign tasks, set due dates, reuse checklist templates, switch to Kanban view, and get real‑time updates—all in one workspace.
Mathilde Sudan
Security
WEDO Updates Its Legal Documentation to Meet New Regulatory Requirements
WEDO SA has carried out a comprehensive revision of its contractual framework to align with current legal obligations.
David Dutch
E-signatures: a complete guide to their legal value
The use of electronic signatures for reports and minutes: a complete guide to their legal value
Get the latest tips sent straight to your inbox
FADP or GDPR, which law applies to your company?
Determining compliance with the Swiss Federal Act on Data Protection (FADP) or the European Union's General Data Protection Regulation (GDPR) depends on several factors related to your company's business. Here are some guidelines to help you determine which regulations your company must comply with.
Data security and protection: how to keep control of your company's data?
The hosting of computer data and the software used in day-to-day business activities play a major role in the risks incurred. Careful selection can significantly reduce vulnerabilities and offer solid protection against these increasingly sophisticated threats.
The importance of HDS certification in the healthcare sector
Health data includes sensitive information about a person's state of health, treatments and medical history. HDS certification ensures that hosting providers implement rigorous security measures to protect this information.
Héléna Galera
Collaborate securely in the financial sector
Today, there is more public interest in the activities of the financial industry than ever before. Data protection is essential to prevent cyberattacks that can lead to data breaches, financial losses, and reputational damage.
News
2022 | Our Year in Review
From new features to milestones, relive the year 2022 with us. ✨
WEDO is SOC 2 Type II compliant
Security is an integral part of our DNA, both in our products and in our internal processes. Today, we are pleased to announce that we have received our SOC 2 Type II report, reaffirming our commitment to security and making all of our security efforts transparent to our users.