Contact Support

Bookmark This Page

Protecting Your Data

We protect the customer area of this website with the most secure SSL encryption technology available today — up to 256 bits — to protect your confidential and proprietary data. SSL encrypts communications between your computer and our servers. This keeps your data protected from virtual prying eyes.

We use Amazon’s Web Services to host our application and store your data. Amazon has many years of experience in designing, constructing, and operating large scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms, as well as other natural boundary protection.

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Amazon provides data center access and information only to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, their access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.

Security within Amazon EC2 is provided at multiple levels: The operating system (OS) of the host system, the virtual instance operating system or guest OS, a stateful firewall and signed API calls.

Each of these items builds on the capabilities of the others. The goal is to ensure that data contained within Amazon EC2 cannot be intercepted by non-authorized systems or users and that Amazon EC2 instances are themselves as secure as possible without sacrificing the flexibility in configuration that customers demand.