You should sleep well at night. We’ve got your back.

In order to protect the personal data you handle on behalf of your customers, you need to know exactly what data is processed, who has access to it and where it is located. You also need to know what security and compliance measures are in place.

Using our relocation platform, you will be able to answer all those questions. And sleep well, again.

Security

Your trust in the security of our systems, application and your data is of utmost concern to us. We dedicate significant time and resources to building the right technology solutions and safeguarding against known security vulnerabilities of cloud-based software.

Systems security

This covers the physical and environmental security of servers and data centers, as well as technical security of the network, resources and systems. We work with trusted service partners to provide enterprise-level security to host and maintain our servers, data storage and related technology services.

Our partners’ hosting environment and data centers include these accreditations:

  • ISO 27001
  • SOC 1 & SOC 2 / SSAE 16
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)

Application security

Securing the application layer is a serious commitment and can be achieved, among others, through:

  • Careful selection of technology frameworks
  • Rigorous software development lifecycle
  • Health monitoring and tracking tools
  • Security mindset to architecture design
  • Conducting regular vulnerability assessments

Data security

In addition to utilizing a secure hosting environment, the data itself should be protected through encryption. Personal data processed and stored on our platform is encrypted with TLS/SSL protocols when in transit and block-level storage encryption when at rest.

Compliance

We have always held strong believes that personal data should be kept private and used only for the specific purposes for which it was collected. That has been part of our software development philosophy from the beginning. As such, we happily embraced the ‘Privacy by Design’ principles advocated by the GDPR.

Your data privacy compliance

While we adhere to various international data privacy regulations, with the GDPR having emerged as the global standard, we have adopted the same global approach on our platform. You will benefit from several tools and features available on the platform to help you towards your own GDPR compliance.

Some examples:

  • Built-in data classification model
  • Your own data retention policy mechanism
  • Tools for data access and rectification
  • User authentication & permission controls
  • Plain language privacy statement
  • Security audit logs

ISO 27001

Beyond ensuring that our core hosting partners are ISO 27001 certified, we have adopted many ISO 27001 principles as part of our own software development lifecycle and day-to-day operations.

In addition to our security and compliance measures mentioned above, these include the following policies and practices:

  • Information Security Policy
  • Incident Response Plan
  • Data Retention Policy
  • Staff Code of Conduct
  • Staff security training
  • Business continuity planning