Protecting your data and privacy

At EazyTagg Technologies, we understand the sensitivity of your data, and we’re committed to

ensuring confidentiality and reliability as critical components of our service to you.

Keeping your data secure

Data encryption

All customer data is transferred securely using TLS v1.2 and above from the iPad app and EazyTagg Technologies dashboard to the cloud. All requests are routed through Cloudflare which acts as a firewall. At rest, data is encrypted using AWS for databases and Cloudflare for object storage. Both AWS and Cloudflare  use AES256 for disk encryption.

Our IT infrastructure is 100% cloud-based.

Data storage

When your Tablet or mobile device is connected to a network, data syncs to EazyTagg Technologies automatically, and all records are stored in EazyTagg Technologies’s database.  Backups are taken every day and stored off-site in either the AWS US-East-1 data center in Virginia, US-West-1 data center in California, or US- West-2 data center in Oregon. AWS oversees the physical security of these facilities and tightly controls who  has access.

Data retention

EazyTagg Technologies stores your data indefinitely while you’re a customer. We only delete or purge data upon explicit request. Customer data is available for download as a CSV file through the dashboard  or via our API. Data can be anonymized,  which removes all personally identifiable information  from your Visitor Log, upon request. EazyTagg Technologies may retain customer data for up to 30 days after the termination  of the contract.

Reliability and offline-mode

We understand the importance  of reliability and aspire to a

99.9% uptime. EazyTagg Technologies proactively protects against denial-of-service (DoS) attacks using CloudFlare’s advanced distributed DoS protection.  We continually monitor uptime through third parties like Pingdom.

Security testing

We seek out and proactively address vulnerabilities and exposures in EazyTagg Technologies’s code and dependencies through automated tools, peer review,  penetration  tests, and a public bug bounty program. All public access to our applications  is proxied through Cloudflare  which detects and automatically blocks unexpected  traffic.

Protecting privacy

Privacy policy

We have a strict policy to respect the privacy of sensitive customer data: we will never sell your visitor or employee data, and we will not contact your visitors or employees without explicit permission.  Our support team will only access your account in the event of a technical support issue that requires real-time access.

Employee privacy

Your team, except those mandated to, will not have access to employees’ data and visitors’ log in any form, whether through a dashboard, report, or otherwise. To help your team keep

your workplace safe, administrators can see to who gets access or who does not.

Access management

EazyTagg Technologies makes it easy to centrally manage data and permissions for multiple facilities, no matter where you’re located. Role-based administration allows customers to provide the right EazyTagg Technologies access to specified team members on global- or location-specific levels. And SAML can be utilized to integrate with your single sign-on identity provider to further regulate access.

Verified security practices

Our security processes and controls are verified to meet SOC 2 Type II security standards. This includes using two-factor authentication, encrypting computers, logging administrator actions, tracking access grants using verified policies, and following repeatable processes for a consistent and secure customer experience.

Compliant with standards  and regulations

We have made significant efforts to ensure we are in compliance with the General Data Protection Regulation  (GDPR) and Ghana Data Protection Act and to help our customers comply with GDPR contractual obligations.