Security Policy

Our Commitment to Data Security

Bytescribe is committed to keeping data secure. WebShuttle is designed to safeguard information, and we have developed a robust strategy to mitigate any risk of service disruption. Our platform is built with security in mind, and compliance audits are frequently performed within our organization. We continuously work to ensure the safety of information.

Application Security and Encryption

Access to all WebShuttle data is handled through a secure web portal. All data transfers occur over encrypted SSL channels or through FTPS (secure FTP over SSL for Premium accounts). Data is encrypted in transit and optionally at rest, ensuring that files remain secure. Files are decrypted as they are downloaded through secure SSL ports.

Continuous Security Testing

Bytescribe performs continuous security testing. This includes third-party penetration testing and vulnerability scans. Our IT staff controls the testing of our web application and implements necessary security measures. We stay up-to-date on the latest security threats and issues, and any vulnerabilities identified are promptly addressed through patches and updates. After applying patches, new scans are performed to ensure their effectiveness.

Physical Security

Our data center enforces strict access policies. It is a 24/7/365 manned facility with security patrols and multiple security checkpoints. The center maintains a 90-day recorded CCTV log, along with intrusion detection and on-site guards present at all times. Key card access is required for all floors, and the center utilizes cameras, guards, locked cages, backup generators, and fire suppression/humidity controls. Only trusted employees have access to servers containing sensitive data. Our data center is SOC II certified.

Compliance

Bytescribe serves many clients in the medical industry and adheres to HIPAA compliance requirements. We enforce encryption and SSL access across our platform to ensure compliance. Our workflow is designed to maintain and reinforce security throughout our processes.

Information Protection

All customer data is treated as confidential and stored only in electronic form. Our servers are protected by firewalls, and we take necessary steps to secure the data. Customer data is accessed over SSL ports, and Data Loss Prevention (DLP) measures such as firewalls, intrusion detection systems, and antivirus software are in place to protect it.

Security Monitoring

Our team has ongoing access to log reports, usage graphs, login reports, and network analysis data. Network alerts and notifications are always in place, and our data center staff monitors network logs and graphs to detect any unusual activity. This proactive monitoring helps maintain the security of our platform.

Incident Response

We log and track all security incidents through our support ticket system. Any security issues are reviewed by our IT team and senior management, and tickets are updated as the issues are resolved. Our security team addresses all alerts and concerns, and if any security breach were to occur, we have processes in place to notify clients promptly.