Our information security and privacy program cover all your operations, services, and systems that involve access to confidential information. Both the processes that directly deal with customer data (such as IT) and the processes that might indirectly affect the security of customer data (such as HR processes) are in scope.
Our permission based system enables or disables each feature available to each user. Building on the concept of data classification we have built policies that check, at query time, whether a user has proper access.
Internal audits of the security and privacy program done monthly and third-party audits of the security and privacy program reviewed and assets monthly.