Security & Infra-Structure Overview
|
|
|
- Kristina Goodman
- 10 years ago
- Views:
Transcription
1 Security & Infra-Structure Overview
2 Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4 KantanMT Enterprise-class Infrastructure... 5 Designed for Top Performance... 5 Advanced Security Features... 6 Industry Leading Deliverability... 6 Account Settings and Global Access Controls... 6 KantanMT.com Privacy Statement... 7 Introduction... 7 How We Collect and Use Your Personally identifiable Information... 7 KANTAN Programs and Services... 7 KANTAN Communications... 8 Other Information We Collect... 8 Consumer Opinion Surveys... 8 Cookies... 8 Information Automatically Collected By Our Site... 8 How We Share Your Personally Identifiable Information... 9 Accessing and Updating your Personally Identifiable Information... 9 Security... 9 Links to Other Websites Changes to this Privacy Statement... 10
3 KantanMT Platform Security At KantanMT, security, integrity and the availability of our customers' data is a top priority. We believe this is vital to their business operations and to our own success. Therefore, we use a multi-layered approach to protect and monitor this information. Customer Data Protection KantanMT applications are accessed across the Internet from secure and encrypted connections (SSL 3.0/TLS 1.0) using high-grade 128 bit certificates. All data is backed up on a rotating schedule of incremental and full backups Each customer s data is fully encrypted Passwords are stored only using hash algorithms Individual user sessions are protected by unique session tokens and re-verification of each transaction Application Security KantanMT tests all code for security vulnerabilities before release and regularly scans our network and systems for vulnerabilities. KantanMT's SaaS services are based on proven and secure Open Source solutions and custom applications Applications and servers are regularly patched to provide ongoing protection from exploits Every major SaaS software release tested by QA for a full scope of security risks
4 Physical and Environmental Security Our service is hosted at top-tier data centres. The data centre provider maintains: Biometric scanning for controlled data centre access Security camera monitoring at all data centre locations 24x7 onsite staff provides additional protection against unauthorized entry Unmarked facilities to help maintain low profile Redundant HVAC (Heating Ventilation Air Conditioning) units, which provide consistent temperature and humidity within a raised floor area Sensors to detect environmental hazards, including smoke detectors and floor water detectors Raised flooring to protect hardware and communications equipment from water damage Fire detection and suppression systems (dry-pipe, pre-action water-based) Redundant (N+1) UPS power subsystem with instantaneous failover (NOTE: All KantanMT data centres are hosted by Amazon Corporation.)
5 ecommerce Transactions Our ecommerce service is hosted by certified and compliant industry leaders. These maintain: Full PCI DSS Level 1 certification SAS70 type II, SSAE 16, CAN-SPAM and EU Safe Harbor compliance Traffic encryption through state-of-the-art encryption layers Multiple segregated networks; highly restrictive configured firewalls and routers Regular audits by external security firms Intrusion Detection System monitors network and system-related parameters Security experts and system administrators on call 24/7 (NOTE: KantanMT ecommerce services are hosted by Cleverbridge GmBH.)
6 KantanMT Enterprise-class Infrastructure A cloud-based Machine Translation platform is a mission-critical aspect of your business. That s why KantanMT provides you with a state-of-the-art, secure platform along with ease of use and zero maintenance. Designed for Top Performance KantanMT runs on a cloud infrastructure designed to provide the performance and reliability features that companies of all sizes should expect: Multi-tenant, secure, scalable platform Top tier, global data centres with guaranteed 99.9% up-time High-speed server technology, load balancing and an advanced storage infrastructure Uninterruptible power and backup systems, plus fire/flood prevention at storage sites Continuous monitoring by a support team of certified experts (NOTE: All KantanMT data centres are hosted by Amazon Corporation.)
7 Advanced Security Features At KantanMT, security, integrity and the availability of our customers' data is a top priority. We believe this is vital to their business operations and to our own success. Therefore, we use a multi-layered approach to protect and monitor this information, including: Sophisticated data encryption Passwords are stored only using hash algorithms All User sessions are protected by unique session tokens and re-verification of each transaction Comprehensive network protection Global security compliance our third party providers has been issued an SSAE 16 Type II report and is Safe Harbor certified Industry Leading Deliverability Successful deliverability depends on a combination of best practices, authentication and reputation. Your monthly subscription includes high-performance servers optimized for maximum deliverability, 24x7 monitoring, reputation and blacklist management, sender authentication set-up (DKIM, SPF, etc.) and certified IP addresses for trusted mailers. Account Settings and Global Access Controls Administrators control the account settings of all KantanMT users and can easily configure permissions and privileges for user accounts.
8 KantanMT.com Privacy Statement Date of last revision: August 1, 2011 Introduction Protecting personally identifiable information is a core KANTAN value. This Privacy Statement describes how KANTAN collects and uses the Personally Identifiable Information you provide on our Websites and on KANTAN Internet applications that appear on third party websites. It also describes the choices available to you regarding KANTAN's use of your personally identifiable information and the steps you can take to access this information and to request that we correct or delete it. NOTE: If you have questions about this Privacy Statement or want to contact us regarding how we handle your data, please send an to [email protected]. How We Collect and Use Your Personally identifiable Information KANTAN Programs and Services If you apply to become a KANTAN client, we will use the Personally Identifiable Information you provide (e.g., your name, address, address, company information and payment information) to follow up with you about your application and facilitate the enrolment process. We also use this information to provide you with customer support and to communicate regularly with you. While providing you with customer support (including through the live chat feature on our website) we may also gather additional information from you. From time to time we will also offer you the opportunity to receive information about products or services offered by our third-party partners. We will not share your personally identifiable information with these third parties for their marketing purposes, unless we have your permission to do so. We use information submitted through our Website or collected through or hard copy surveys to analyze the characteristics of our customers and improve our services. We will occasionally provide anonymized aggregated statistics about our clients in reports made available to them, to third parties, or to the general public. These reports will not identify individual KANTAN clients. If you wish to obtain information about KANTAN programs and services, we will collect your name, address, phone number, and additional company information. We use this
9 information to contact you about your request, or to follow up with you about the programs and services in which you have expressed an interest. KANTAN Communications If you sign up for KANTAN newsletters, webinars, our online behavioural advertising notice opt-out reminder s, or other communications or you want to contact us generally, we will collect your contact information to fulfil your request. To unsubscribe, follow the unsubscribe link that appears at the end of each communication. Other Information We Collect Consumer Opinion Surveys We occasionally conduct online consumer surveys to learn about your views on our products and services. We do not collect personally identifiable information in these surveys. We use the survey data for research and to improve our services. Cookies Cookies are very small text files that are stored on your computer when you visit certain web pages. We use cookies on our site to: help you navigate our website facilitate the sign up and login process for our services personalize your experience analyze which pages our site visitors visit measure advertising and promotional effectiveness Information Automatically Collected By Our Site As is true of most websites, we gather web server log file information automatically such as your IP address, browser type, referring/exit pages, and operating system. We use this information to administer our website, understand how visitors navigate through our Site and to enhance your experience while using our site.
10 How We Share Your Personally Identifiable Information We may provide your personally identifiable information to companies that provide services to help us with our business activities such as website analytics or offering customer service. These third parties are authorized to use your personally identifiable information only as necessary to provide these services to us. We may also disclose your personally identifiable information as required by law such as to comply with a subpoena, or similar legal process when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud or respond to a written government request if KANTAN becomes involved in a merger, acquisition, or any form of sale of some or all of its assets, we will provide notice before personally identifiable information becomes subject to a different privacy statement to any other third party with your prior consent to do so We will share your personally identifiable information with third parties only in the ways that are described in this Privacy Statement. We do not otherwise sell your personally identifiable information to third parties. Accessing and Updating your Personally Identifiable Information To review and update your personally identifiable information to ensure it is accurate, contact us; or, if you are a KANTAN customer, use our online tools. KANTAN will make commercially reasonable efforts to provide you reasonable access to any of your personally identifiable information we maintain within 30 days of your access request. We provide this access so you can review it, make corrections or request deletion of your data. If we cannot honor your request within the 30-day period, we will tell you when we will provide access. In the unlikely event that we cannot provide you access to this information, we will explain why we cannot do so. Security Providing security for the personally identifiable information you submit via our site is a priority for KANTAN. We take appropriate security measures to protect against unauthorized access to; or
11 unauthorized alteration, disclosure, or destruction; of your personally identifiable information. We use Secure Socket Layer (SSL) to encrypt the transmission of data on the KANTAN web application, payment and login pages. Please be aware, however, that no transmission of information via the Internet can be entirely secure. You should, therefore, always use caution when submitting personally identifiable information online. Links to Other Websites This Privacy Statement applies to KANTAN Web services only. Our Site includes links to other Websites. If you submit personally identifiable information to any of those sites, your information is subject to their privacy statements. We encourage you to carefully read the privacy statement of any website you visit. Changes to this Privacy Statement Please note that this Privacy Statement may change from time to time. If we change this privacy statement in ways that affect how we use your personally identifiable information, we will advise you of choices you may have as a result of those changes. We will also post a notice on our home page that this Privacy Statement has changed.
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
BOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com
800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com Protect My Ministry websites including www.ministryopportunities.org have the following SSL Certificates and protection:
TargetingMantra Privacy Policy
Last Updated August 15 th, 2013 TargetingMantra Privacy Policy TargetingMantra allows its customers, to provide personalization widgets to their users (collectively, the TargetingMantra Service ). The
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
INDEX PRIVACY POLICY...2
INDEX PRIVACY POLICY...2 WHAT PERSONAL INFORMATION DOES RENTINGCARZ GATHER FROM ME AND HOW IS THIS INFORMATION USED?...2 MAKING A PURCHASE...2 NEWSLETTERS...2 ONLINE SURVEYS...2 PROMOTIONS & SWEEPSTAKES...3
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
ChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Adaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of:
Privacy Policy is committed to your privacy. We disclose our information practices below and we agree to notify you of: 1. What personally identifiable information of yours or third party personally identification
Profound Outdoors Privacy Policy
Profound Outdoors Privacy Policy Our Commitment to Privacy Our Privacy Policy has been developed as an extension of our commitment to combine quality products and services with integrity in dealing with
PRIVACY POLICY. Last Revised: June 23, 2014 1. About this Privacy Policy.
Last Revised: June 23, 2014 1. About this Privacy Policy. PRIVACY POLICY This Privacy Policy is a statement by Active Data, Inc. ( Active Data ) that describes how we collect, store, process, and share
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
Security & Infrastructure White Paper
Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide
SAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
3Degrees Group, Inc. Privacy Policy
3Degrees Group, Inc. Privacy Policy Your privacy is important to 3Degrees Group, Inc. ( 3Degrees ). The following Privacy Policy discloses the information practices followed by 3Degrees with respect to
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
1. What information do we collect?
CHURNSPOTTER.IO PRIVACY POLICY Last updated: February 03, 2015 Welcome to the http://churnspotter.io Web site (the Site ) owned by PREDICSIS S.A.S, a corporation organized and existing under the laws of
IDT Financial Services Limited. Prime Card Privacy Policy
IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the
Privacy Policy MacID. Document last updated Sunday, 28 December 2014 Property of Kane Cheshire
Privacy Policy MacID Privacy Policy We are committed to safeguarding the privacy of our website visitors and app users; this policy sets out how we will treat your personal information. Our website uses
RezScore SM Privacy Policy
RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
NetSuite Data Center Fact Sheet
NetSuite Data Center Fact Sheet Enterprise-Class Data Management, Security, Performance and Availability NetSuite is the world s largest cloud ERP vendor, supporting over 20,000 organizations, processing
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?
Privacy Policy The Friends of the Public Garden ("FoPG" or "We") is a non-profit corporation and the owner and operator of www.friendsof thepblicgarden.org (the "Website"), which is intended to supply
RDM on Demand Privacy Policy
RDM on Demand Privacy Policy Ataccama Corp. www.ataccama.com [email protected] Toronto, CA Prague, CZ London, UK Stamford, US 1 ATACCAMA RDM ON DEMAND PRIVACY POLICY 1. Ataccama Corp. ("Ataccama") and
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
join.me architecture whitepaper
join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
tell you about products and services and provide information to our third party marketing partners, subject to this policy;
WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses
ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015
CONTEGOVIEW, INC. PRIVACY POLICY 1 ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015 This Privacy Policy discloses the privacy practices for ConteGoView, Inc. and its services and products.
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
1. TYPES OF INFORMATION WE COLLECT.
PRIVACY POLICY GLOBAL ASSESSOR POOL, LLC, DBA PINSIGHT ( Company or we or us ) is committed to protecting your privacy. We prepared this Privacy Policy to describe our practices regarding the information
Itron Cloud Services Offering
Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...
1.1 Personal Information is information about an identifiable individual such as your name, address, telephone number and email address.
Privacy Policy Last updated on December 14, 2015. This Privacy Policy (this Policy ) describes how Kik Interactive, Inc. and its subsidiaries with authorized links to this Policy, (collectively, Kik Group,
SysAid Cloud Architecture Including Security and Disaster Recovery Plan
SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan
Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at [email protected].
Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
How We Use Your Personal Information On An Afinion International Ab And Afion International And Afinion Afion Afion
AFFINION INTERNATIONAL AB COMPANY PRIVACY AND COOKIES POLICY The privacy and cookies policy sets out how we use any personal information that you give to us, or that we may collect or otherwise process
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes
Salesforce & HIPAA Compliance
An ecfirst Case Study: Salesforce & HIPAA Compliance Salesforce Provides the Tool, You Are Responsible for Compliance 2014 All Rights Reserved ecfirst TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 WHAT IS SALESFORCE?...
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
1. Important Information
We at ViewPoint (ViewPoint Government Solutions, Inc. and our affiliates) are committed to protecting your privacy. This Privacy Policy applies to both our websites (Websites), including www.viewpointcloud.com,
2. A Note about Children. We do not intentionally gather Personal Data from visitors who are under the age of 13.
PRIVACY POLICY Macromeasures Inc. ("Macromeasures") is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined
PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION
PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
Security Practices, Architecture and Technologies
Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street Columbus, OH 43215 1-800-VAB-0300 www.viewabill.com 1 CONTENTS End-to-End Security Processes and Technologies... 3 Secure Architecture...
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
Privacy Policy. About Us and Our Purpose. Your Privacy is Our Mission
Privacy Policy The purpose of this Privacy Policy is to describe and explain how we collect, use and distribute any personal information you provide to us. It also describes the options you have available
