Data Security
We recognize the importance of data security and have taken many steps to ensure the security of our client’s data with our solutions. We have considered end-to-end security with the following steps for our cloud-based solution.
We recognize the importance of data security and have taken many steps to ensure the security of our client’s data with our solutions. We have considered end-to-end security with the following steps for our cloud-based solution.
Internet Public Transport
We use Hypertext Transfer Protocol Secure (HTTPS) and Secure Sockets Layer (SSL) protocols for secure communication over the Internet. This prevents wiretapping and man-in-the-middle attacks.
Application Access
Each client is provided with an authorization file containing a unique 128-bit ID that must be loaded on each user’s computer. This file must be present to allow the user to log on. Strong password policies are enforced. The combination of all three of these elements must be successfully verified to gain access to the PD-Trak system.
Once signed-in to PD-Trak, the application will control what functions and data the user is able to access based user access permissions as set up and maintained by a system administrator.
For more details on system security, you may request a copy of the PD-Trak System Security White Paper.