We deploy multi-layer security to ensure the privacy of our clients’ data. Our infrastructure software includes rigorous security practices. Our software providers and technicians detect and respond to internal and external threats to the infrastructure around the clock. Communications over the internet to our Platform are encrypted in transit. Multiple layers of protection shield the network and its infrastructure against denial-of-service attacks.
The identities of our Platform users and services are protected by robust multiple-factor-authentication procedures. Access to sensitive data is protected by advanced tools such as phishing-resistant security keys. Data stored on our Platform is automatically encrypted and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions. Individual user data can be deleted from our Platform. Aggregated data is maintained for analysis.