Our Security Commitment
At Recogsnap, the security and protection of client and system data is paramount. We implement comprehensive security practices to safeguard information from unauthorized access, disclosure, alteration, and destruction. Our multi-layered security approach protects both our infrastructure and your sensitive data.
Security Practices
Encryption
We employ industry-standard encryption protocols (SSL/TLS) for all data in transit. Data at rest is encrypted using AES-256 encryption standards. End-to-end encryption is used for sensitive communications to ensure complete protection of your information.
Access Control
We implement strict role-based access controls (RBAC) and principle of least privilege. Multi-factor authentication (MFA) is required for all administrative access. Access logs are maintained and regularly audited to detect suspicious activity.
Monitoring and Logging
Continuous monitoring of our systems and networks enables real-time detection of threats. Security Information and Event Management (SIEM) systems track and analyze security events. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) protect against unauthorized access attempts.
Regular Audits and Assessments
We conduct regular security audits, vulnerability assessments, and penetration testing. Third-party security audits are performed annually to ensure compliance with industry standards. Security patches and updates are applied promptly to address identified vulnerabilities.
Employee Training
All employees receive regular training on data security, privacy practices, and secure coding standards. Background checks are conducted for employees with access to sensitive systems. Security awareness programs ensure all staff understand their role in protecting data.
Compliance Standards
We maintain alignment with major security and privacy standards to ensure our practices meet industry best practices:
- GDPR Compliance: We comply with the General Data Protection Regulation for protecting EU resident data
- CCPA Compliance: We adhere to the California Consumer Privacy Act requirements
- ISO 27001: Our information security management systems align with ISO 27001 standards
- SOC 2 Type II: We maintain SOC 2 Type II certification demonstrating strong security controls
- HIPAA Ready: We support HIPAA compliance requirements for healthcare data protection
Responsible Disclosure Policy
We believe in responsible security practices and welcome reports from security researchers and the community. If you discover a security vulnerability, please help us maintain a secure environment by following these guidelines:
- Contact us immediately at it@recogsnap.com with details of the vulnerability
- Do not publicly disclose the vulnerability until we have had a reasonable time to address it
- Provide sufficient information to help us reproduce and understand the vulnerability
- Allow a 90-day period for us to patch the vulnerability before public disclosure
- Work with us in good faith to resolve the issue collaboratively
Incident Response
We maintain a comprehensive incident response plan to address security incidents promptly. In the event of a confirmed data breach, we will notify affected parties as required by law within 30 days. Our incident response team works to contain threats, investigate root causes, and implement preventive measures.
Report Security Concerns
Have you discovered a security vulnerability or have security concerns? Please report them to our security team immediately:
We appreciate your help in keeping Recogsnap and our clients secure. All reports will be treated confidentially and investigated thoroughly.