{"version":"1.0","provider_name":"QUU Legal","provider_url":"https:\/\/quu.ee\/en\/","title":"Information Security Audit and Compliance Assessment - QUU Legal","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"OuJ8vvvRKs\"><a href=\"https:\/\/quu.ee\/en\/information-security\/information-security-audit-and-compliance-assessment\/\">Information Security Audit and Compliance Assessment<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/quu.ee\/en\/information-security\/information-security-audit-and-compliance-assessment\/embed\/#?secret=OuJ8vvvRKs\" width=\"600\" height=\"338\" title=\"&#8220;Information Security Audit and Compliance Assessment&#8221; &#8212; QUU Legal\" data-secret=\"OuJ8vvvRKs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/quu.ee\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Information Security Service Information Security Audit and Compliance Assessment An audit is not merely a technical check, but a practical tool for making further decisions. During the audit, we review information security together with business processes, contracts, data protection and management decisions. Where necessary, we assess compliance with specific frameworks (e.g. E-ITS, ISO\/IEC 27001 principles). [&hellip;]"}