& GDPR : The european obligation to protect its customer databases

The new European regulation on the protection of personal data (GDPR) has tightened its rules applicable on May 25, 2018.
It has become mandatory to use piracy with the tools of protection of personal data. In addition, the company must report piracy to the data protection authority and the data subjects (affected customers) within 72 hours. And, it is mandatory to keep available to Internet users a clear text explaining the policy of securing data.

datasafer is also used to monitor competition

To demonstrate that a third party has fraudulently used your database, a simple way for the company will be to trap the content. This involves inserting directly into your databases a series of traps emails. An email trap is a fake address that will be controlled by the base owner. This system makes it possible to instantly detect a violation, an undeclared or non-conforming use during any operation (rental, monetization or loyalty). If a trap address receives an email from another sender, this leads to the conclusion that a misuse of data has occurred and that someone has a significant desire to fraudulently use your data.


However, proof of fraudulent use must be provided. It is necessary to prepare well beforehand the deposit of trap addresses. Without legal precaution, it is extremely difficult, if not impossible, to win legal action. It suffices to have a judicial officer record the insertion of trap addresses in the database. This offers all the legal guarantees, the minutes in support, which will allow you to return against the theft of data at the source or following the transmission of your emails to a third party company which would use your data outside the frame contractually establishes beforehand.

Security Trap emails to secure email marketing activities. is your new home for monitoring and securing email marketing activities, with all the tools you need to centralize and monitor email marketing activities from a single place. Emails injected into your database are certified and monitored continuously and in real time, without human intervention on your part and no time limit. will monitor and secure your database in a logical protection against theft.

Legal action with support of certified evidence in case of theft or proven use of your database.

  • Use our Security Trap emails to secure your databases.

  • 15, 150, 250 and more Security Trap emails managed in one and easy-to-manage stream.

  • Centralize all your Gmail, Hotmail, POP3 trap emails from a single place.

  • Be automaticaly informed about any breach of security usage.

Main Features

screen1_20135619485_r_thumb.png   screen5_201356194844_r_thumb.png   screen2_201356194932_r_thumb.png

Email marketing is becoming strategic.
Be sure of the integrity of your database.
Be automaticaly informed of any breach.
50, 80, 130 and more Security Trap emails managed in one easy-to-manage stream.
More than 100 domain names. Gmail, Hotmail and POP3 integration to create the Trap Emails that will be injected in your database. 


Today, while email marketing is becoming more strategic, organizations tend to lose sight that email databases are facing more leaks. This is both due to the democratization of piracy and the provision of software tools accessible in two clicks as well as to the greater availability of data which enables easier data copy :
  • Today email databases face more leaks.

  • The greater availability of data enables easier data copy.

  • Several business partners have access to your database.

  • Parts of your database can be copied. ( USB key)

With we provide our customers with real-time information about any breach of security and we also provide them all technical informations that will be used to prove it.


In case of any breach of security with our legal partners, under of Belgian and European law, we will help you to organize any legal actions to recover your rights.

REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL  on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) 



     Fr :

The 2010 Verizon Business Risk Team in the Data Breach Investigations Report has founded that users reported "internal" are responsible for 48% of data theft, an increase of 26% compared to 2009. More informations here :  Data Breach Investigations Report (2010).