Protecting your data and privacy
At EazyTagg Technologies, we understand the sensitivity of your data, and we’re committed to
ensuring confidentiality and reliability as critical components of our service to you.
Keeping your data secure
Data encryption
All customer data is transferred securely using TLS v1.2 and above from the iPad app and EazyTagg Technologies dashboard to the cloud. All requests are routed through Cloudflare which acts as a firewall. At rest, data is encrypted using AWS for databases and Cloudflare for object storage. Both AWS and Cloudflare use AES256 for disk encryption.
Our IT infrastructure is 100% cloud-based.
Data storage
When your Tablet or mobile device is connected to a network, data syncs to EazyTagg Technologies automatically, and all records are stored in EazyTagg Technologies’s database. Backups are taken every day and stored off-site in either the AWS US-East-1 data center in Virginia, US-West-1 data center in California, or US- West-2 data center in Oregon. AWS oversees the physical security of these facilities and tightly controls who has access.
Data retention
EazyTagg Technologies stores your data indefinitely while you’re a customer. We only delete or purge data upon explicit request. Customer data is available for download as a CSV file through the dashboard or via our API. Data can be anonymized, which removes all personally identifiable information from your Visitor Log, upon request. EazyTagg Technologies may retain customer data for up to 30 days after the termination of the contract.
Reliability and offline-mode
We understand the importance of reliability and aspire to a
99.9% uptime. EazyTagg Technologies proactively protects against denial-of-service (DoS) attacks using CloudFlare’s advanced distributed DoS protection. We continually monitor uptime through third parties like Pingdom.
Security testing
We seek out and proactively address vulnerabilities and exposures in EazyTagg Technologies’s code and dependencies through automated tools, peer review, penetration tests, and a public bug bounty program. All public access to our applications is proxied through Cloudflare which detects and automatically blocks unexpected traffic.
Protecting privacy
Privacy policy
We have a strict policy to respect the privacy of sensitive customer data: we will never sell your visitor or employee data, and we will not contact your visitors or employees without explicit permission. Our support team will only access your account in the event of a technical support issue that requires real-time access.
Employee privacy
Your team, except those mandated to, will not have access to employees’ data and visitors’ log in any form, whether through a dashboard, report, or otherwise. To help your team keep
your workplace safe, administrators can see to who gets access or who does not.
Access management
EazyTagg Technologies makes it easy to centrally manage data and permissions for multiple facilities, no matter where you’re located. Role-based administration allows customers to provide the right EazyTagg Technologies access to specified team members on global- or location-specific levels. And SAML can be utilized to integrate with your single sign-on identity provider to further regulate access.
Verified security practices
Our security processes and controls are verified to meet SOC 2 Type II security standards. This includes using two-factor authentication, encrypting computers, logging administrator actions, tracking access grants using verified policies, and following repeatable processes for a consistent and secure customer experience.
Compliant with standards and regulations
We have made significant efforts to ensure we are in compliance with the General Data Protection Regulation (GDPR) and Ghana Data Protection Act and to help our customers comply with GDPR contractual obligations.