SlideShare a Scribd company logo
Maintain A Secure, Independent Network For Survey Projects With Data Security Services
DataForceTM
maintains a secure, independent network for survey projects and client data. We are committed to
protecting your data as we protect our own.
Data Security – Protection you can count on
Authorized Access to Data Servers: Our domain servers are behind a hardware firewall, which ensures that there is no
outside access and extremely limited internal access (administrator only) from DataForce’s internal domain. Our secure
FTP (SFTP) server provides a place where files can be securely and quickly exchanged. It requires the use of trusted
encryption schemes for all connecting clients. All outgoing data is sent directly from behind our firewall with the
preferred client protocol. Our SFTP server folders are continuously monitored by a transaction manager that moves, and
if necessary decrypts, incoming files to an appropriate protected location behind our firewall; the original file is then
deleted.
Restricted Access to Data via Computer: Computer access to data of any kind is restricted by login. Levels of access are
controlled by security settings. For example, an operator with only viewing needs will not be given appending rights, and
so on. Authenticated users are subject to a password policy, which requires all users to maintain passwords that meet
minimum security requirements and provides them with access to only the specific data for which they are authorized.
DataForce enforces a strict requirement that users change their passwords on a regular basis.
Data Encryption: For additional security, DataForce encourages the use of a minimum 128-bit PGP encryption for transferred
files. For web applications containing sensitive data, DataForce utilizes second socket layer (SSL) protection, which means that
all incoming and outgoing information traveling via the internet is encrypted and secured in both directions.
Controlled Physical Access to Production Areas: Access to DataForce operation areas is strictly monitored, controlled, and
enforced. Only authorized personnel are allowed into the areas of operation in order to protect the sensitive nature of
the information involved. Unauthorized personnel are required to sign in/out and must be accompanied by an authorized
escort. DataForce provides secured storage for paper-based documents.
Retention of Clients’ Digital Data: Clients’ data are retained for 90 days following project completion. If the client requests
extended storage, data are transferred to optical media and kept in a sealed, fireproof safe. When optical media are disposed
of, they are shredded before being placed in common trash containers.
Backups: To ensure that client data are not lost, DataForce follows a thorough backup procedure on all servers and
computers. We use Microsoft’s Azure platform to backup and set retention on server and production data. Depending on
the data and the client’s needs, we generally keep data for two weeks, with backups of the database occurring every 15
minutes and restore points for the file data being created three times daily. In addition, full backups are run nightly and
weekly, and retained for one month.
Document Destruction: Depending on the client’s requirements, forms and documents can be destroyed on- or off-site, and
paper can be recycled. Documented proof of destruction and videotaped proof are available upon client request.
Know More On
Paper Scanning services
Data Capture services

More Related Content

What's hot

Executive Overview
Executive OverviewExecutive Overview
Executive Overview
aaa0
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
mjordan100
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
Parshant Tyagi
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
Doug Landoll
 
Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
sandwep3
 

What's hot (16)

Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
17581556 045 lab 3
17581556 045  lab 317581556 045  lab 3
17581556 045 lab 3
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
 
Web security
Web securityWeb security
Web security
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
Tech Vault Solution
Tech Vault SolutionTech Vault Solution
Tech Vault Solution
 
Data center
Data centerData center
Data center
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
Network Support Services
Network Support ServicesNetwork Support Services
Network Support Services
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
 

Similar to Maintain A Secure, Independent Network For Survey Projects

Secure overlay cloud storage with access
Secure overlay cloud storage with accessSecure overlay cloud storage with access
Secure overlay cloud storage with access
IMPULSE_TECHNOLOGY
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
jeffreye3
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 

Similar to Maintain A Secure, Independent Network For Survey Projects (20)

Circuit security
Circuit securityCircuit security
Circuit security
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leaflet
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Secure overlay cloud storage with access
Secure overlay cloud storage with accessSecure overlay cloud storage with access
Secure overlay cloud storage with access
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Zyncro security
Zyncro securityZyncro security
Zyncro security
 
Presciense InterQuest IoT Talk
Presciense InterQuest IoT TalkPresciense InterQuest IoT Talk
Presciense InterQuest IoT Talk
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
Amdlrmo needs
Amdlrmo needsAmdlrmo needs
Amdlrmo needs
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 

Recently uploaded

chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 

Recently uploaded (20)

Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdf
 
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case StudyTransforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
Transforming Max Life Insurance with PMaps Job-Fit Assessments- Case Study
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
 

Maintain A Secure, Independent Network For Survey Projects

  • 1. Maintain A Secure, Independent Network For Survey Projects With Data Security Services DataForceTM maintains a secure, independent network for survey projects and client data. We are committed to protecting your data as we protect our own. Data Security – Protection you can count on Authorized Access to Data Servers: Our domain servers are behind a hardware firewall, which ensures that there is no outside access and extremely limited internal access (administrator only) from DataForce’s internal domain. Our secure FTP (SFTP) server provides a place where files can be securely and quickly exchanged. It requires the use of trusted encryption schemes for all connecting clients. All outgoing data is sent directly from behind our firewall with the preferred client protocol. Our SFTP server folders are continuously monitored by a transaction manager that moves, and if necessary decrypts, incoming files to an appropriate protected location behind our firewall; the original file is then deleted. Restricted Access to Data via Computer: Computer access to data of any kind is restricted by login. Levels of access are controlled by security settings. For example, an operator with only viewing needs will not be given appending rights, and so on. Authenticated users are subject to a password policy, which requires all users to maintain passwords that meet minimum security requirements and provides them with access to only the specific data for which they are authorized. DataForce enforces a strict requirement that users change their passwords on a regular basis. Data Encryption: For additional security, DataForce encourages the use of a minimum 128-bit PGP encryption for transferred files. For web applications containing sensitive data, DataForce utilizes second socket layer (SSL) protection, which means that all incoming and outgoing information traveling via the internet is encrypted and secured in both directions. Controlled Physical Access to Production Areas: Access to DataForce operation areas is strictly monitored, controlled, and enforced. Only authorized personnel are allowed into the areas of operation in order to protect the sensitive nature of the information involved. Unauthorized personnel are required to sign in/out and must be accompanied by an authorized escort. DataForce provides secured storage for paper-based documents. Retention of Clients’ Digital Data: Clients’ data are retained for 90 days following project completion. If the client requests extended storage, data are transferred to optical media and kept in a sealed, fireproof safe. When optical media are disposed of, they are shredded before being placed in common trash containers. Backups: To ensure that client data are not lost, DataForce follows a thorough backup procedure on all servers and computers. We use Microsoft’s Azure platform to backup and set retention on server and production data. Depending on the data and the client’s needs, we generally keep data for two weeks, with backups of the database occurring every 15 minutes and restore points for the file data being created three times daily. In addition, full backups are run nightly and weekly, and retained for one month. Document Destruction: Depending on the client’s requirements, forms and documents can be destroyed on- or off-site, and paper can be recycled. Documented proof of destruction and videotaped proof are available upon client request. Know More On Paper Scanning services Data Capture services