In order to support your business objectives with diverse capabilities, we use third-party services in the form of:
We take security very seriously and proactively take reasonable steps to protect personally identifiable information (PII) of our clients and their customers. Examples:
- Unique, strong login credentials are used.
- Encrypted storage.
- Restricted access.
- 2-step verification/authentication is used wherever available.
- Encrypted connections used whenever available.
- Information is shared only on a need-to-know basis.
- Non-disclosure policy.
This statement was last updated on May 11, 2018.