Security Measures at Inovay- Top-Class Priority
At Invoay, we understand the value of your business data stored in our system. This is why data security and privacy are the number one priority for us.
We have made every effort to ensure the highest possible level of security.
Data entered into the system is stored on rigorously protected servers located in guarded premises. The server rooms are compliant with the security standard and undergo regular audits.
Entrusting us with data can be compared to storing valuable possessions in a safe deposit box. Thanks to the fact that we provide service to thousands of users we can ensure a level of security you would not be able to reach on your own.
Prevention Against any Data Loss
To eliminate the risk of data loss or service interruption, our whole infrastructure is based on n+1 redundancy, which means that all components have at least one independent backup component.
Copies of your data are stored on multiple servers located in independent premises. If any servers are down you can still access your data.
Additionally, we perform daily backups which are encrypted and stored on another region. This would enable us to retrieve all data even in case any natural disaster affected primary locations.
Protection Against any Unauthorised Access to Data
All servers are separated from the public Internet by a firewall which allows only traffic necessary to provide the service.
Access to data is possible only through an encrypted connection, which prevents third party interception.
The data in our database is protected through data encryption. This encryption method prevents unauthorised access to data even by people who have physical access to the servers.
Each user needs to authenticate with a password. Passwords are stored using one-way encryption. This means only the user knows what the password is.
We provide a number of configuration features which enable the administrator to determine different access levels for particular employees. Each operation performed in the system is registered, with the administrator being able to check who made any changes or removed data from the system. Additionally, data removed or amended by mistake can be retrieved.
One of the most interesting features improving security is the customer data protection mode.
Safe source code
The source code is written exclusively by our developers (we do not outsource), who have undergone professional security trainings. While creating the system we invariably follow security good practices, making sure to equip it with security measures against all common types of attack. Third party libraries are updated on a regular basis.
Compliance with the Data Protection Act
We ensure total compliance with the Data Protection Act.
The system fulfils high-level security requirements, with all procedures undergoing regular third-party audits.
If you have any questions on security matters, email us at [email protected]