- MOBILE DEVICE TOKENS: Secure tokens to ensure that only your employees can access forms with approved mobile devices.
- ROLE-BASED PERMISSIONS: Custom employee role-based permissions for form submission and access via encrypted shell (SSH).
- SECURE DATA TRANSFER: Protect data with a combination of security capabilities – both as the data travels to and from the device using 256-bit SSL encryption.
- ENCRYPTION IN STORAGE: Passwords are encrypted in our database using one-way encryption. No one at Synegys knows your password. If you cannot remember it, you need to change it.
- BACKUPS: Synegys data is imaged and backed-up daily to multiple secured locations to ensure that data can be quickly restored.
- SECURE PHYSICAL FACILITIES: Server infrastructure is hosted in ISO 9001 and ISO/IEC27001 compliant facilities with the appropriate authorization and authentication protocols in place.
- SECURE FIREWALLS: Access to servers are protected by a firewall that monitors traffic on multiple protocols and ports. Applications and data-storing servers reside in private subnets, not the public internet. Also server access is only available on a “need to know” basis and is protected by two-way authentication and cryptographic keys.
- REGULATORY & SYSTEMS COMPLIANCE: Our solutions comply with:
- local text messaging regulations
- 21 CFR Part 11 on the usage, protection, and audit of electronic signatures and records
- U.S. Health Insurance Portability and Accountability Act (HIPAA)
- EU Directive 2002/58/EC (ePrivacy Directive)
- Regulation (EU) 2016/679 (General Data Protection Regulation)
- MONITORING: Servers are constantly monitored for uptime using global monitoring service.
- REDUNDANCY: Servers are distributed across several independent data centres are are elastically load-balanced to avoid single points of network failure to provide quick response times.
Security & Reliability
All our solutions come with the features and capabilities to ensure your data is secure. Cloud hosting within world-class data centres with full redundancy ensures your data is safe and secure for critical business processes. Security and reliability measures we take include: