Last updated September 6th, 2022
Applied Data Consultants, Inc., and its affiliates (“Applied Data Consultants,” “Elite EXTRA,” “we,” “our” or “us”) have implemented the following information security program to protect our organization and our customer’s data.
- Network & infrastructure security
- Requires business need to access the production environment.
- Requires connections over encrypted VPN to access the production environment.
- Centralized, auditable logs of operations in production environment.
- Data security
- Data encrypted at rest and in transit
- Backups and recovery
- EXTRA utilizes a point-in-time recovery backup solution. The application aggregates the continuous stream of data and transactions in the form of write-ahead logs from database servers. It also creates full backups of the last five days. Utilizing this combination approach EXTRA can restore customer data to any point in time within the previous five days.
- EXTRA does not share any customer data with other entities and only collects and maintains data directly related to the operation of the Elite EXTRA service.
- Data is categorized by our internal data classification policy. Generally all access is based on the ‘need-to-know’ principle. Data that is categorized as non-public (private, restricted, confidential, etc) has strong access controls in place. Controls include user permission/role based access, encryption at rest, encryption in transit, facility security, non-disclosure agreements, secure data disposal policy.
- Depending on the customer requirements, data may be stored in our colocated regional data centers as well as cloud service providers: Digital Ocean, BackBlaze, AWS, Wasabi.
- Regulations and compliance standards
- EXTRA can be configured for HIPAA compliance, including electronically protected health information (e-PHI).
- NIST 800-171
- FTC Safeguards
- Risk Assessment
- Monthly review and audit of identified risk.
- Vulnerability Scan
- EXTRA undergoes a weekly automated vulnerability scan of our external facing web services. This scan focuses on the OWASP (https://www.owasp.org) known vulnerabilities. During our release cycle our team reviews the security audit logs and addresses all reported issues.
- Application security
- Requires a peer review for source code changes.
- Regularly conducts audits of our source code.
- Regularly reviews potential vulnerabilities in our environment and applies relevant patches.
- Orchestration tools manage all host environments (provisioning, patching).
- Continuous Integration server manage all code releases.
- CVE alert notifications monitored daily
- Best practices
- Checks references for all new employees.
- Requires new and existing employees to regularly complete security awareness training.
- Requires new employees to sign a non-disclosure agreement.
- Reviews new vendors prior to using their services, and existing vendors at least annually.
Changes to this Security Policy
This Security Policy may be modified from time to time, so please review it frequently. Changes to this Security Policy will be posted on our websites. Security, confidentiality, integrity, and availability concerns should be reported to firstname.lastname@example.org. Reported issues will be promptly evaluated and remediated by our security team.
Let’s talk Logistics
Have questions or want to learn more? Contact our team today to learn more about our security policy. Fill out the form or contact us from the email or phone number below to start a conversation.
Email Us: email@example.com
Call us: 1.888.484.8729 (option 3 for support)
We look forward to working with you!
Please fill out the form:
(Fields marked with a * are required)