Security and data protection
The data you entrust to us are extremely precious: we guarantee their security, confidentiality, availability and integrity.
Security
Securing IT equipment:
- Implementation of an automatic session lock
- Disk encryption
- Anti-virus protection
- installation of firewalls
Network and database security:
- Implementation of VPN solutions to ensure an encrypted and secure connection to the network and increased data
- Implementation of complex passwords with a requirement to change them periodically
- Strict separation of development, test and production environment
Securing the code:
- Access to strictly controlled source code, with systematic peer review when merging new codes
- Software-as-a-Service Training of our employees: Equify members are regularly trained and made aware of confidentiality and data security
Training of our employees:
- Equify members are regularly trained and sensitized to the confidentiality and security of data
Confidentiality
Awareness and empowerment of our teams:
- Systematic background checks of our candidats
- Signature of a confidentiality agreement and adherence to our security and confidentiality charter by all of our members
- Limitation of access to customer data to only members showing an interest in the views of their mission
Data encryption:
- Encryption of all data, including backups, both during transmission and during storage (AES-256 algorithm)
- Anonymisation of sensitive data
Availability
Hosting of your data:
- All data, including backups, is hosted in France
- Data replication in multiple data centers to ensure their durability and access in the event of a disaster
Database backup:
- The database is subject to a daily backup and test
- Continuous replication of all data on 2 nodes for databases and 3 nodes for storage on AW S3. Each node is hosted in a specific data center, geographically separated from the others
- In the event of an incident in a data center, the data stored there is automatically replicated in the other data centers
Integrity
Access security:
- Mandatory authentification of users by email and password (controlled by a strict policy)
- Saving of connections and connection attempts to detect possible fraudulent use of accounts
- Internal data access reserved for duly authorised employees, through a VPN
System access traceability and data modification:
- Implementation of audit logs to identify and archive any access to systems, as well as any access and modification of data on these systems
- Identification and archiving separately of all technical events of the systems, such as errors
- Automatic replication of logs 3 times in 3 remote data centers in France (AWS servers, ISO 27001 certified), automatically switching from one to the other in the event of an accident
- Retention of audit logs set at one year