Follow

Data Security

Q:
How does ESGI keep my data safe?

A:
ESGI takes our users’ security and privacy concerns seriously. We strive to ensure that user data is kept secure, and that we collect only as much personal data as is required to make our users’ experience with ESGI as efficient and satisfying as possible. We also aim to collect data in the most unobtrusive manner possible. The Security Statement below is aimed at being transparent about our security infrastructure and practices, to help reassure you that your data is sufficiently protected.  Please also see our Privacy Policy.

User Security

ESGI utilizes some of the most advanced technology for Internet security commercially available today.

• ESGI requires users to create a unique user name and password that must be entered each time a user logs on.

• When a user accesses secured areas of our site, Secure Sockets Layer (SSL) technology protects user information using both server authentication and data encryption, ensuring that user data is safe, secure, and available only to authorized persons

• Passwords and credit card information are always sent over secure, encrypted SSL connections.

• ESGI implements human, organizational, and technological security controls to protect its information assets from unauthorized access, leakage, modification, theft/loss, denial of service attacks, or any other threat.

Physical Security

• Our data center is located in a SOC 1, Type II audited facility

• Our data center is located in a facility that has achieved ISO 27001 certification

• Data center staffed and surveyed 24/7

• Digital surveillance equipment monitors the data center

• Environmental controls for temperature, humidity and smoke/fire detection

Availability

• Fully redundant web servers

• Multiple independent connections to our data centers

• Uptime monitored constantly, with escalation to ESGI staff for any downtime

Network Security

• Firewall restricts access to all ports except 80 (http) and 443 (https)

• Security Sockets Layer (SSL) encryption across load balancers

Storage Security

• Backups occur every 10 minutes internally to a secure/ encrypted centralized backup system for offsite storage

• Backups are encrypted

• Data is stored on a redundant disk array

Organizational Security

• Access controls to sensitive data in our databases and systems are set on a need-to-know basis

• We maintain and monitor audit logs on our services and systems

• We maintain internal information security policies following ISO 27001/27002 standards

• We maintain and follow PCI security regulations

• We maintain privacy policies addressing how we collect, use, and secure your information. Our privacy policy can be viewed here.

Software

• Our engineers use best practices and industry-standard secure coding guidelines to ensure secure coding

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Article is closed for comments.
Powered by Zendesk