Security and Data management Archives - iTouchVision UK Customer Service Software, Cloud Service and Support CRM platform Tue, 13 Feb 2024 13:00:51 +0000 en-GB hourly 1 https://wordpress.org/?v=6.5.5 39676639 Where are your servers located? Can we inspect your data centre? https://www.itouchvision.com/data-centre/?utm_source=rss&utm_medium=rss&utm_campaign=data-centre https://www.itouchvision.com/data-centre/#respond Tue, 14 Jun 2016 08:05:36 +0000 https://www.itouchvision.com/?p=17738 Where are your servers located? Can we inspect your data centre?? Our data centres are located in Shoreditch and Docklands, London. Our servers are connected to the Internet backbone. They have full battery backed redundancy and alternate generator. Battery backup kicks in until the alternate power generator gets started in [...]

The post Where are your servers located? Can we inspect your data centre? appeared first on iTouchVision.

]]>
https://www.itouchvision.com/data-centre/feed/ 0 17738
Are they ISO accredited? https://www.itouchvision.com/iso-accredited-platform/?utm_source=rss&utm_medium=rss&utm_campaign=iso-accredited-platform https://www.itouchvision.com/iso-accredited-platform/#respond Tue, 14 Jun 2016 07:48:37 +0000 https://www.itouchvision.com/?p=17731 Are they ISO accredited? Our platform is hosted in ISO (International Organization for Standardization) certified environment. The London data centre is certified and ISO accredited to ISO 27001:2013. The standard ensures best practice for security controls within London colocation operations to protect information assets and equipment. The accreditation confirms that [...]

The post Are they ISO accredited? appeared first on iTouchVision.

]]>
https://www.itouchvision.com/iso-accredited-platform/feed/ 0 17731
Is the platform and mobile apps encrypted? https://www.itouchvision.com/secure-platform-encryption/?utm_source=rss&utm_medium=rss&utm_campaign=secure-platform-encryption https://www.itouchvision.com/secure-platform-encryption/#respond Tue, 14 Jun 2016 07:32:52 +0000 https://www.itouchvision.com/?p=17725 Is the platform and mobile apps encrypted? Encryption is needed at all the levels to enhance security and as a measure to prevent any type of cyber attacks. We have implemented industry-standard encryption for data across all the products to make it as the most secure platform. All packets transmitted are [...]

The post Is the platform and mobile apps encrypted? appeared first on iTouchVision.

]]>
https://www.itouchvision.com/secure-platform-encryption/feed/ 0 17725
How is data entry validation done to force compliance with data standards? https://www.itouchvision.com/software-validation-data-standards/?utm_source=rss&utm_medium=rss&utm_campaign=software-validation-data-standards https://www.itouchvision.com/software-validation-data-standards/#respond Tue, 14 Jun 2016 07:14:05 +0000 https://www.itouchvision.com/?p=17721 How are the different users authorised to access the data? Our platform performs a strict validation of data at the point of entry, regardless of the channel. The software validation rules configured by the administrator will apply to web forms and also to the bespoke native mobile apps across every [...]

The post How is data entry validation done to force compliance with data standards? appeared first on iTouchVision.

]]>
https://www.itouchvision.com/software-validation-data-standards/feed/ 0 17721
How are the different users authorised to access the data? https://www.itouchvision.com/role-based-access-control-data-security/?utm_source=rss&utm_medium=rss&utm_campaign=role-based-access-control-data-security https://www.itouchvision.com/role-based-access-control-data-security/#respond Tue, 14 Jun 2016 06:51:58 +0000 https://www.itouchvision.com/?p=17716 How are the different users authorised to access the data? Every business runs on data! It is important to capture and store all the information related to the business and so is the importance of authorisation. Only the authorised users should be accessing the right data after authentication according to [...]

The post How are the different users authorised to access the data? appeared first on iTouchVision.

]]>
https://www.itouchvision.com/role-based-access-control-data-security/feed/ 0 17716