Customer Data Security
Introduction
We are committed to ensuring the security of our customers' data. This document outlines our security measures and protocols, adhering to internationally accepted standards.
Data Encryption
AES-256-CBC: We encrypt financial data and tokens using AES-256-CBC, a robust encryption standard.
JWT RS-256: User keys are protected using JWT RS-256 encryption.
Access Control
Restricted Access: Database access is limited to a small group of trained personnel, who are restricted from performing sensitive data analyses.
Query Monitoring: All database queries are monitored to detect and prevent unauthorized access.
Data Transfer
HTTPS Protocols: We ensure that all data transfers are conducted through secure HTTPS tunnels to prevent interception and unauthorized access.
On-Premise Solutions
For organizations requiring complete data isolation, we offer on-premise database solutions. This allows them to manage and secure their data with their own resources and specialists.
Compliance
Third-Party Services: We use Google Cloud's secure database and storage solutions, adhering to their stringent privacy and security policies. Additionally, we utilize Firebase for secure data collection to understand customer usage patterns and improve our system, while ensuring compliance with privacy regulations.
Minimal Third-Party Integrations: Apart from TinyMCE rich editor for customer convenience and Firebase for analytics, we avoid using other third-party JavaScript libraries within our application.
International Standards
GDPR Compliance: We follow the General Data Protection Regulation (GDPR) guidelines for data protection and privacy for individuals within the European Union.
CCPA Compliance: We adhere to the California Consumer Privacy Act (CCPA) regulations, providing specific rights to our users in California regarding their personal information.
Regular Audits and Assessments
Security Audits: Regular security audits are conducted to ensure the integrity and security of our data protection measures.
Vulnerability Assessments: Continuous vulnerability assessments are performed to identify and mitigate potential security risks.
Incident Response
Incident Management: We have an incident response plan to address any data breaches or security incidents promptly.
Notification: In the event of a data breach, affected users will be notified in accordance with applicable laws and regulations.
Employee Training
Security Training: All employees undergo regular security training to stay updated on best practices and emerging threats.
Access Management: Employees are granted access to data and systems based on the principle of least privilege.
Contact Information
For any questions or concerns regarding our data security measures, users can contact us at: info@tasksensor.com.