Security Statement

This Security Statement is aimed at providing you with more information about our security infrastructure and practices. Our privacy policy contains more information on how we handle data that we collect.


Secure Network Connections
HTTPS encryption is configured for customer web application access. This helps to ensure that user data in transit is safe, secure, and available only to intended recipients. The level of encryption is negotiated to either SSL or TLS encryption and is dependent on what the web browser can support

Access Controls - Role Based Access
Role based access controls are implemented for access to information systems. Access controls to sensitive data in our databases, systems, and environments are set on a need-to-know / least privilege necessary basis. Access control lists define the behavior of any user within our information systems, and security policies limit them to authorized behaviors.

Auditing and Logging
We maintain audit logs on systems. These logs provide an account of which personnel have accessed which systems. Access to our auditing and logging tool is controlled by limiting access to authorized individuals.



Digitize your business and cash in on tomorrow’s growth wave

Get Started

Request for a Demo

Digitize now and profit from tomorrow’s growth wave! Write to us and we’ll schedule your demo.

Request for a Demo

Digitize now and profit from tomorrow’s growth wave! Write to us and we’ll schedule your demo.