Security Statement
This Security Statement is aimed to reassure you that your data is appropriately protected.
Application and User Security
- SSL/TLS Encryption All communications with the Priotice website are sent over SSL/TLS connections. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) technology (the successor technology to SSL) protect communications by using both server authentication and data encryption. This ensures that user data in transit is safe, secure, and available only to intended recipients.
- User Authentication User data on our database is logically segregated by account-based access rules. User accounts have unique usernames and passwords that must be entered each time a user logs on.
- User Passwords User application passwords have minimum complexity requirements. Passwords are encrypted.
- Data Encryption Certain sensitive user data, such as account passwords, is stored in encrypted format.
- Data Portability Priotice enables you to export your data from our system in a variety of formats so that you can back it up, or use it with other applications.
- Privacy We have a privacy policy that provides a transparent view of how we handle your data, including how we use your data and how long we retain it.
Physical Security
- Data Centers Our information systems infrastructure (servers, networking equipment, etc.) is collocated at data center.
- Data Center Security Our data centers are staffed and surveilled 24/7.
- Location All user data is stored on servers located in the EU.
Availability
- Connectivity Fully redundant IP network connections with multiple independent connections.
- Power Servers have redundant internal and external power supplies. Data center has backup power supplies.
- Uptime Continuous uptime monitoring, with immediate escalation to Priotice staff for any downtime.
Network Security
- Uptime Continuous uptime monitoring, with immediate escalation to Priotice staff for any downtime.
- Third Party Scans Weekly security scans are performed by Qualys.
- Testing System functionality and design changes are verified in an isolated test environment and subject to functional and security testing prior to deployment to active production systems.
- Firewall Firewall restricts access to all ports except 80 (http) and 443 (https).
- Patching Latest security patches are applied to all operating system and application files to mitigate newly discovered vulnerabilities.
- Access Control Secure VPN and role-based access is enforced for systems management by authorized engineering staff.
- Logging and Auditing Central logging systems capture and archive all internal systems access including any failed authentication attempts.
Storage Security
- Backup Frequency Backups occur daily to a centralized backup system for storage in multiple geographically disparate sites.
- Production Redundancy Data stored on a RAID 10 array.