Customer Data Security

Introduction

We are committed to ensuring the security of our customers' data. This document outlines our security measures and protocols, adhering to internationally accepted standards.

Data Encryption

  1. AES-256-CBC: We encrypt financial data and tokens using AES-256-CBC, a robust encryption standard.

  2. JWT RS-256: User keys are protected using JWT RS-256 encryption.

Access Control

  1. Restricted Access: Database access is limited to a small group of trained personnel, who are restricted from performing sensitive data analyses.

  2. Query Monitoring: All database queries are monitored to detect and prevent unauthorized access.

Data Transfer

  1. HTTPS Protocols: We ensure that all data transfers are conducted through secure HTTPS tunnels to prevent interception and unauthorized access.

On-Premise Solutions

For organizations requiring complete data isolation, we offer on-premise database solutions. This allows them to manage and secure their data with their own resources and specialists.

Compliance

  1. Third-Party Services: We use Google Cloud's secure database and storage solutions, adhering to their stringent privacy and security policies.

  2. Minimal Third-Party Integrations: Apart from TinyMCE rich editor for customer convenience, we avoid using third-party JavaScript libraries within our application.

International Standards

  1. GDPR Compliance: We follow the General Data Protection Regulation (GDPR) guidelines for data protection and privacy for individuals within the European Union.

  2. CCPA Compliance: We adhere to the California Consumer Privacy Act (CCPA) regulations, providing specific rights to our users in California regarding their personal information.

Regular Audits and Assessments

  1. Security Audits: Regular security audits are conducted to ensure the integrity and security of our data protection measures.

  2. Vulnerability Assessments: Continuous vulnerability assessments are performed to identify and mitigate potential security risks.

Incident Response

  1. Incident Management: We have an incident response plan to address any data breaches or security incidents promptly.

  2. Notification: In the event of a data breach, affected users will be notified in accordance with applicable laws and regulations.

Employee Training

  1. Security Training: All employees undergo regular security training to stay updated on best practices and emerging threats.

  2. Access Management: Employees are granted access to data and systems based on the principle of least privilege.

Contact Information

For any questions or concerns regarding our data security measures, users can contact us at: info@tasksensor.com.

Share on

Share on