Security Database Security Sample Clauses

Security Database Security. Customer data is stored in a dedicated database - no sharing of data between clients. Data access control rules implement complete isolation between customer databases running on the same cluster, no access is possible from one database to another. Password Security Customer passwords are protected with industry-standard encryption. OdooGeek personnel does not have access to passwords, and cannot retrieve it for you, the only option if you lose it is to reset it Login credentials are always transmitted securely over HTTPS. System Security All web connections to client instances are protected with SSL encryption. SSL certificates are free and the Customer can choose to upgrade to a paid one. Our servers are kept under watch on a 24hour basis by the DataDog service and Customers websites by Uptime Robot Service, we always keep servers patched against the latest SSL vulnerabilities. All OdooGeek online servers are running Linux distributions on encrypted hard drives with up-to-date security patches. Installations are ad-hoc and minimal to limit the number of services that could contain vulnerabilities (no PHP/MySQL stack for example) Only one trusted OdooGeek engineer has access to remotely manage the servers - and access is only possible using SSH key pairs or password authentication. We run XxxXxxxx.xx Artificial Intelligence Software Firewall on all our servers, even backup servers, as well as intrusion counter-measures to help prevent unauthorized access. Distributed Denial of Service (DDoS) mitigation is implemented in all our servers. Staff Access OdooGeek personnel may sign into your database to access settings related to your support issue. For this they use their own special staff credentials, not your password (which they have no way to know). This special staff access improves efficiency and security: they can immediately reproduce the problem you are seeing, you never need to share your password, and we can audit and control staff actions separately! Our Helpdesk staff strives to respect your privacy as much as possible, and only access files and settings needed to diagnose and resolve your issue. Physical Security The OdooGeek servers are hosted in different data centers in Europe, that must all satisfy with our minimum physical security criterions: - Physical access to the data center area where OdooGeek servers are located is restricted to data center technicians only - Security cameras are monitoring the data center locations. Credit Cards Saf...
AutoNDA by SimpleDocs

Related to Security Database Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

Time is Money Join Law Insider Premium to draft better contracts faster.