How do we protect data?
During file transfer:
We take all the necessary measures to protect every layer involved in file movement. For effective data protection, we incorporated rigorous third-party reviews. We take measures to protect your data from interrupted access, we ensure that your data cannot be corrupted and we do not provide unauthorized access to your data.
Our third-party service providers use a file transfer system built on Transport Layer Security to protect your data. Their services protect data with regards to data transfer, data confidentiality, data integrity and authentication. All data transfers are tracked and authorized with proof that files were delivered. The security measures incorporated by our third-party service providers has several security controls which ensures that multiple security failures must occur before attacker has access to data. Once data is saved on servers we have multi-level security policies in place to protect data.
Data provided is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user places an order; enters, submits, or accesses their information to maintain the safety of your personal information. All transactions are processed through a gateway provider and are not stored or processed on our servers.
In case of security breach:
In case of security breach, we immediately terminate the contract with the employee, if he/she is responsible for the breach. The login credentials are changed and the machines, servers and parts of system which has access to the data are immediately isolated. Users accounts who may be involved in wrong doing are blocked. Severity of the breach is then assessed and the clients whose data is compromised are immediately notified.
We can delete your files once the job is done, if requested. However, we store the names of your file for accounting and billing purposes. You may request to delete your files completely.