My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2011-09-14 Handouts @ Mtg.
Centerville
>
City Council
>
Agenda Packets
>
1996-2022
>
2011
>
2011-09-14 Handouts @ Mtg.
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/3/2011 9:03:06 AM
Creation date
10/3/2011 9:03:03 AM
Metadata
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
16
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
We use firewall software and perform daily scans for viruses and rootkits. Data sent between the <br /> survey production machines is sent over an AES -256 (256 bit) encrypted connection. Our <br /> database is behind a firewall and configured to only accept connections from a single machine in <br /> our local network. User passwords are encrypted/hashed and salted via MD5. <br /> Plus some other security measures that are not discussed publically! <br /> If you have any other questions about the security of SurveyGizmo, please give us a call at <br /> 800.609.6480 ext 1. <br /> UltraCart regarding Data Security <br /> The UltraCart web functions process transactions securely using 128 -bit SSL2 encryption. The <br /> company is PCI Compliant for Visa & Master Card. Each user or relying party is warrantied to <br /> $10,000.00. <br /> Statement Intuit Merchant Services Processing website Regarding Data Security <br /> Intuit internet functions process transactions securely using 128 -bit SSL encryption. The <br /> following is a statement from the Intuit website. <br /> Protecting your information <br /> • We have workers whose sole purpose is to run a safeguarding program, monitoring and <br /> adjusting the program as circumstances change. <br /> • We continually perform internal risk assessments to determine and address potential risks. <br /> • We perform external security audits for critical financial applications. <br /> • We secure our facilities, our network, and our servers. <br /> • If we transmit financial information, we encrypt it and transmit it securely. <br /> • We prepare for disasters to enable timely and secure recovery. <br /> • We install virus protection on all relevant servers. <br /> • We continually scan our network for vulnerabilities and remediate against any we might find. <br /> • We run back -ups to a secure off -site location. <br /> • We have an incident response plan in place should it be needed and test it on regular basis to <br /> ensure we are ready to act. <br /> Ensuring our workers handle your data securely <br /> • We perform background checks on workers at hiring. <br /> • We remove individuals' access credentials to systems and facilities when workers leave. <br /> • We only allow authorized individuals access to information when it is critical to complete <br /> tasks for you. <br /> • We provide training on security and privacy to all workers at hire. Workers take the security <br /> training annually and the privacy training bi- annually thereafter. <br /> 4 <br />
The URL can be used to link to this page
Your browser does not support the video tag.