Security Policy
Our Commitment to Data Security
Bytescribe is committed to keeping data secure. WebShuttle is designed to safeguard information, and we have developed a robust strategy to mitigate any risk of service disruption. Our platform is built with security in mind, and compliance audits are frequently performed within our organization. We continuously work to ensure the safety of information.
Application Security and Encryption
Access to all WebShuttle data is handled through a secure web portal. All data transfers occur over encrypted SSL channels or through FTPS (secure FTP over SSL for Premium accounts). Data is encrypted in transit and optionally at rest, ensuring that files remain secure. Files are decrypted as they are downloaded through secure SSL ports.
Continuous Security Testing
Bytescribe performs continuous security testing. This includes third-party penetration testing and vulnerability scans. Our IT staff controls the testing of our web application and implements necessary security measures. We stay up-to-date on the latest security threats and issues, and any vulnerabilities identified are promptly addressed through patches and updates. After applying patches, new scans are performed to ensure their effectiveness.
Physical Security
Our data center enforces strict access policies. It is a 24/7/365 manned facility with security patrols and multiple security checkpoints. The center maintains a 90-day recorded CCTV log, along with intrusion detection and on-site guards present at all times. Key card access is required for all floors, and the center utilizes cameras, guards, locked cages, backup generators, and fire suppression/humidity controls. Only trusted employees have access to servers containing sensitive data. Our data center is SOC II certified.
Compliance
Bytescribe serves many clients in the medical industry and adheres to HIPAA compliance requirements. We enforce encryption and SSL access across our platform to ensure compliance. Our workflow is designed to maintain and reinforce security throughout our processes.
Information Protection
All customer data is treated as confidential and stored only in electronic form. Our servers are protected by firewalls, and we take necessary steps to secure the data. Customer data is accessed over SSL ports, and Data Loss Prevention (DLP) measures such as firewalls, intrusion detection systems, and antivirus software are in place to protect it.
Security Monitoring
Our team has ongoing access to log reports, usage graphs, login reports, and network analysis data. Network alerts and notifications are always in place, and our data center staff monitors network logs and graphs to detect any unusual activity. This proactive monitoring helps maintain the security of our platform.
Incident Response
We log and track all security incidents through our support ticket system. Any security issues are reviewed by our IT team and senior management, and tickets are updated as the issues are resolved. Our security team addresses all alerts and concerns, and if any security breach were to occur, we have processes in place to notify clients promptly.