This chapter covers the various concrete actions addressed to United Internet customers. These range from digital security and consumer protection through enabling digital participation down to customer service and facilitating fact-based opinion-forming.
As a data processing company, United Internet has a high level of social responsibility when it comes to protecting the data transferred to it and hence safeguarding customers from detrimental effects. Customer trust in the information security measures taken is the bedrock for them being prepared to entrust United Internet with their information in the form of digital data such as photos, documents, and e-mails.
United Internet’s goal is to protect customer information against unauthorized access and misuse. The individual segments’ security strategies aim to achieve the protective goals of data confidentiality, availability, and integrity throughout the Group. Security management in the segments is based on highly targeted technical and organizational measures. These are derived from the security guideline requirements, which in turn are based on a variety of criteria. Sources include international standards, and especially ISO 27001, but also legislation such as the TKG, the European NIS2 Directive, or the German BSI Act (BSI-Gesetz – BSIG).
The measures taken to protect the product landscape against unauthorized access and misuse are constantly upgraded. United Internet’s information security management system (ISMS) is based on international standards such as ISO 27001, the BSI IT-Grundschutz compendium from Germany’s Federal Office for Information Security (BSI), and BSI C5.
Building on these standards, United Internet assesses whether an appropriate, risk-based, effective approach to information security challenges exists – from security management down to implementation of the security requirements in the operating security units. In addition, planning and achieving information security objectives is a key part of implementing and maintaining the ISMS.
All of the segments have an ISMS. In line with the individual segments’ business strategies, the ISMS in the Consumer Access, Consumer Applications, and Business Applications segments is managed by United Internet’s Group Information Security Officer (GISO) and the Segment Information Security Officers (SISOs). In the case of the Business Access segment, this task is performed by the Head of Information Security Management. A guidelines management policy is also used. The SISOs are responsible for information security risk management. In addition, they develop security instructions and employee training courses, and are responsible for communication with public authorities, e.g., in the case of reportable security incidents.
The Technical Security & Abuse Management department is responsible for providing advice on security architectures and applications, systems, and network security. It trains employees how to ensure secure development and operations, performs security tests, and deals with potential security incidents together with other departments. The department also develops and operates systems that are used in abuse management processes. These processes ensure that support is provided to customers in security incidents for which they themselves are responsible, helping them to use United Internet’s products securely again.
The SISOs perform segment-specific Telecommunications Security Officer roles, e.g., under the TKG. They report regularly to the Chief Technology Officers for their segments. Reporting covers the information security risk portfolio, any relevant security incidents that have occurred, the specific measures taken, the results of security audits, and key security trends. Internal security architecture experts support the GISO and the SISOs in designing and implementing comprehensive, cross-segment security improvements. Senior management at the Business Access Segment is ultimately responsible for information security there. It commissions the Head of Information Security Management and his department, plus the organizations supporting them, to operate and continuously improve the ISMS. In this way, United Internet establishes structured, targeted security management.
In the Business Access segment, United Internet has organized information security in keeping with the Three-Lines-of-Defense (TLoD) model. Information Security Management represents the second line of defense under this model. Among other things, the department develops and resolves policies and work instructions that serve as the basis for operational security measures, requirements, and activities. These are then implemented by the staff responsible in the various departments, the first line of defense. A Security Operations Center works 24 x 7 to identify, target, and remedy security attacks. The Head of Information Security is also the Business Access Segment’s Telecommunications Security Officer under the TKG and reports regularly to the management board.
The BSI has detected an ongoing high threat level in cyberspace. In addition to offering telecommunications technology, United Internet uses information technology to provide services relating to business processes whose availability and proper functioning could be endangered by threats from the internet or from internal sources. In addition to availability risk, there is a risk that hack attacks could, for example, lead to result in customer data being read, deleted, or misused. Potential threats from the internet represent one of the largest risk clusters facing United Internet, measured in terms of their impact. Vulnerabilities could have far-reaching consequences for customers. United Internet has taken the technical and organizational security measures described below, among others, to contain such risks. No sanctions in the form of fines were imposed on United Internet in the 2024 fiscal year for security violations or other security-related incidents.
All business segments have defined standardized processes for handling security incidents in compliance with standards such as ISO 27001. Once a significant incident is detected, a trained incident manager takes responsibility for its resolution. Where necessary, he or she also consults the Security Team or external consultants.
When integrating acquired companies, United Internet reviews the existing technical and organizational information security measures both before the combination and at key points in the subsequent integration process. 1 A maturity analysis based on international standards is used for this. The level of maturity established in this way is supplemented by a risk assessment complete with recommended actions. A range of integration measures are then resolved and implemented, depending on the results and the business strategy. The segments’ security organizations assess the maturity level and the measures to be taken, and determine whether it makes sense to integrate the acquired company with United Internet’s ISMS. The goal is to establish and maintain an appropriate, Group-wide security standard.
1 This process does not apply to the Business Access Segment.
United Internet ensures that personal data is protected, and checks the admissibility of processing personal data, in line with the European GDPR and the national regulations applicable in the countries in which it operates. This is not merely a compliance requirement but is also in United Internet’s own interests. This is because the lawful, secure, and responsible handling of personal data, especially in relation to internet use, is always in the public eye. In particular, United Internet’s customers trust it with the data for their roughly 29 million fee-based customer contracts and roughly 39 million ad-financed free accounts worldwide. That is why guaranteeing strict security and systematically protecting customer data are part of the Company’s DNA. Data privacy and information security at United Internet are aligned in all cases with the current requirements of, and strict standards applicable to, data protection in Europe and Germany.
Protecting personal data is a core part of United Internet’s core philosophy, enabling it both to meet its own standards and to enable customers to decide for themselves what happens to their data. At the same time, this protection is one of the foundations of the Company’s business. United Internet explicitly acknowledges that data privacy is an inalienable basic right and has established processes designed to ensure that data privacy rights are taken into account at all times in its day-to-day business. Infringements of data privacy rules can be caused by human error or technical vulnerabilities, among other things. Such incidents could lead to United Internet losing its customers’ trust.
In line with this, the goal of United Internet’s data privacy actions is to ensure compliance with data privacy requirements throughout the Group, and to embed this in its systems, processes, and products. In practice, this means tracking developments at the legislative level, in case law, and in supervisory practice, plus monitoring technological risks and threat scenarios, and continuously adapting the data privacy management system on this basis. The segments have created their own individual data privacy organizations, guidelines, and processes for this. They have established their own data privacy units and appointed data protection officers. Other data protection roles have been established where they are needed to implement the data privacy goals, bearing in mind the individual segment involved, its size, and the risks involved.
United Internet uses the following tools to ensure compliance with data privacy requirements in the Group:
United Internet supports youth protection and educating children and young people on how to behave on the internet. The internet is a key part of children and young people’s everyday lives and is used for communication, researching lessons, and entertainment alike. However, in many cases they are not media-literate or experienced enough to deal with unfamiliar life issues or inappropriate content that they discover there. This means that they have difficulty in assessing risks and therefore cannot adequately protect themselves. Developmentally appropriate actions and education on possible dangers and risks are therefore needed. This is the only way in which United Internet can guarantee adequate protection for children and young people and hence enable them to navigate the internet safely and in an age-appropriate manner.
United Internet ensures that both its own products and services and its partner offerings comply with the legal requirements for youth protection. Internal reviews are performed during product development and product launches, and any necessary modifications are made. This enables United Internet to ensure that children and young people are not confronted with inappropriate content. In addition, care is taken to ensure compliance with youth protection legislation for both advertising and editorial content. United Internet finds the right balance between providing a comprehensive range of information and protecting children and young people by, for example, managing the way in which information is presented and the times at which it is transmitted.
The segments have appointed youth protection officers who act as contacts for youth protection issues and advise the various departments and functions internally. They also act as the central contacts for external stakeholders, liaise regularly with other youth protection officers, and represent United Internet in its dealings with associations and supervisory authorities. An additional youth protection officer was appointed during fiscal year 2024 and the officers’ responsibilities focused on one segment each, to the extent that this topic is relevant for the business model concerned. In addition, youth protection e-mail mailboxes have been set up for United Internet’s portals; the details are given in the legal notices and youth protection sections of the sites concerned. These mailboxes allow people outside the organization to contact the youth protection officers with questions or complaints.
Above and beyond this contact information, the portals’ youth protection sections 1 provide information and tips and tricks designed to educate children, young people, and their parents, and to improve their media literacy. The material provided includes links to youth protection programs and information about counseling services and contacts for specific topics and problems associated with internet usage.
The Consumer Applications Segment ensures that the advertising environments on the WEB.DE and GMX portals are serious and trustworthy, in particular by implementing youth protection measures such as not targeting minors. Advertising for alcohol, tobacco, and erotica is highly restricted. Guidelines forbid advertising that is aimed against equality or diversity. Advertising defaming social groups, that contains unconstitutional, subversive, sexist, or racist material, or that glorifies violence or war is also prohibited.
1 The Consumer Access Segment does not have a youth protection section but it does have a youth protection officer.
Links
Downloads