Everything in place andprotected. Like home.
Security.
Your trust in the security of our systems, application and your data is of utmost concern to us. We dedicate significant time and resources to building the right technology solutions and safeguarding against known security vulnerabilities of cloud-based software.
This covers the physical and environmental security of servers and data centers, as well as technical security of the network, resources and systems. We work with trusted service partners to provide enterprise-level security to host and maintain our servers, data storage and related technology services.
Our partners' hosting environment and data centers include the following accreditations:
- ISO 27001
- SOC 1 & SOC 2 / SSAE 16
- PCI Level 1
- FISMA Moderate
- Sarbanes-Oxley (SOX)
Securing the application layer is a serious commitment and can be achieved, among others, through:
- Careful selection of technology frameworks
- Rigorous software development lifecycle
- Health monitoring and tracking tools
- Security mindset to architecture design
- Conducting regular vulnerability assessments
In addition to utilizing a secure hosting environment, the data itself should be protected through encryption. Personal data processed and stored on our platform is encrypted with TLS/SSL protocols when in transit and block-level storage encryption when at rest.
Compliance.
We have always held strong believes that personal data should be kept private and used only for the specific purposes for which it was collected. That has been part of our software development philosophy from the beginning. As such, we happily embraced the ‘Privacy by Design' principles advocated by the GDPR.
While we adhere to various international data privacy regulations, with the GDPR having emerged as the global standard, we have adopted the same global approach on our platform. You will benefit from several tools and features available on the platform to help you towards your own GDPR compliance.
Some examples:
- Built-in data classification model
- Your own data retention policy mechanism
- Tools for data access and rectification
- User authentication & permission controls
- Plain language privacy statement
- Security audit logs
Beyond ensuring that our core hosting partners are ISO 27001 certified, we have adopted many ISO 27001 principles as part of our own software development lifecycle and day-to-day operations.
In addition to our security and compliance measures mentioned above, these include the following policies and practices:
- Information Security Policy
- Incident Response Plan
- Data Retention Policy
- Staff Code of Conduct
- Staff security training
- Business continuity planning