Personal Information Security

439 Words1 Page

The security of your information is a priority at Soberlink. We understand that your personal data belongs to you. In order to keep out commitment to privacy protection, we have instituted layers of personalized security to ensure that such data is kept confidential, including but not limited to the following areas:

Customer Data Protection

The portal is accessed across the Internet from secure and encrypted connections (TLS 1.0) using high-grade 2048 bit certificates. Individual user sessions are protected by unique session tokens and re-verification of each transaction.

Application Security

We personally test all code for security vulnerabilities prior to its release. We perform regular scans of our network and systems for vulnerabilities. …show more content…

From biometric scanning for controlled data center access to security camera monitoring at all data center locations, we have all the bases covered. Including around the clock onsite staff provides additional protection against unauthorized entry. We maintain a low profile by using unmarked facilities. There is always a consistent temperature and humidity within the raised floor area by using redundant HVAC (Heating Ventilation Air Conditioning. The data center has sensors to detect environmental hazards (i.e. smoke detectors and floor water detectors) as well as a fire detection and suppression systems. Instantaneous failover is provided by redundant (N+1) UPS power subsystem.

Network Access Controls

Network access to and from Soberlink's DMZ is controlled by dedicated firewall devices. Access to our servers requires use of VPN with multi-factor authentication and extensive access monitoring. We use Distributed Denial of Service (DDoS) mitigation services to protect our servers.

Security Monitoring

Our information security staff monitors internal and external security events and implements corrective actions. We track systems access for auditing purposes. We also collect application access logs and analyze them according to internal security

Open Document