Image Relay Security Policy
The confidentiality, integrity and availability of our customer’s data is paramount to the success of our services and your experience. Our focus is to ensure security throughout each core process. Our security policy outlines a few of the steps implemented to protect both your privacy and data while using Image Relay.
Your data is backed up redundantly in multiple data center clusters that are geographically dispersed and designed to provide 99.999999999% durability. Our databases are configured to support point-in-time recovery with a full automated backup run daily.
All data is encrypted at rest using AES-256 standard and while in transit using 256-bit secure sockets layer (SSL). Large data backups are encrypted using the AES algorithm immediately upon creation.
We identify and eliminate points-of-failure and maintain a 99.98% uptime, which is publicly available and monitored by a third party.
We have implemented automated features for monitoring the health and performance of our application servers, which are dispersed across multiple availability zones. Load balancers and automated scaling distributes traffic and requests evenly over the necessary amount of servers.
User access is password-protected to a highly granular level. Customizable permission groups determine precisely which folder, file, or function a user may view, download, or perform. Administrators can quickly modify or remove the access of an entire group of users.
Tracking reports may be run on a per-file or per-user basis to see who is downloading which files and how they are being used. We can further integrate with Google Analytics to provide even more detailed traffic reporting as required. If you have any specific questions not answered here or need to report an incident, please contact us at: email@example.com