Effective: April 5, 2020
Guarding our users against security breach is something we take seriously. We are committed to doing all we can to remain secure and helping our users to manage their own account security responsibly.
What Point Inside Does to Protect Data
We use a variety of industry-standard security technologies and procedures to help protect personal and public data from unauthorized access, use, or disclosure. To protect data in transit, Point Inside encrypts traffic using Transport Layer Security (TLS) configured with industry best-practices. All of APIs and Applications to customers are set behind a Content Deliverable Network (CDN) globally with low latency, high transfer speeds and benefit through a variety of built-in protections. Data partitioning is applied to divide the record into several distinct groups or clusters, making the data indistinguishable. We also use encryption technologies to protect your account information. You should be aware that Point Inside has no control over the security of other sites on the Internet you might visit, interact with, or from which you buy products or services.
Security Testing and Updates
Point Inside security team tests for security vulnerabilities and bugs on a regular basis. We have also setup boundary protection measures such as firewalls and intrusion detection.
Third Party Applications using Point Inside Data
We require unique keys for developers who want to return data, and we reserve the right to revoke an application key if our developer terms and conditions or guidelines are not followed. In addition, we use industry-standard protocols for authorization.
Secure Physical Location
Our servers are located in Amazon's AWS data centers. Our users can find information about the security of AWS Cloud Security at Cloud Security - Amazons Web Services.
We hold our employees to strict guidelines regarding confidentiality and do not allow disclosure of personal or private contact information to any third party without permission. We limit the access and use of personal information to personnel with a legitimate business need.
Data Transmission and Disposal
Point Inside uses reasonable encryption methods for transmission of information across networks and has implemented processes for the secure disposal of personal information.
Recommended Precautions for our Users
No method of transmission over the Internet, or method of electronic storage, is 100% secure. Therefore, while Point Inside uses reasonable efforts to protect your data, Point Inside cannot guarantee its absolute security.
If you need to speak with the security team, or if you believe your own account may have been compromised, please contact email@example.com.