Security

Robust Security & Comprehensive Recovery Policy

At IDO, we recognize that safeguarding customer data is the cornerstone of trust in our services. Our comprehensive security framework ensures the confidentiality, integrity, and availability of sensitive information. This policy reflects our commitment to protecting data against threats, minimizing vulnerabilities, and maintaining uninterrupted service delivery through robust recovery protocols.

Data Security

IDO employs industry-leading encryption techniques to protect customer data, both while it is stored and during transmission. Our platform utilizes robust authentication methods, including multi-factor authentication (MFA), and ensures that access is strictly controlled through role-based access. Additionally, we continuously monitor our network with advanced firewalls and intrusion detection systems to guard against unauthorized access.

Data Backup & Recovery

We perform regular, encrypted backups of all customer data, ensuring that backups are stored in secure, geographically dispersed locations. Our recovery processes are designed to minimize data loss, with recovery point objectives (RPO) set to 24 hours and recovery time objectives (RTO) of 4 hours. We conduct regular drills to ensure that our backup and recovery systems are effective and reliable in the event of an incident.

Incident Response

IDO’s dedicated security team monitors systems for signs of incidents. Upon detecting a potential breach, our incident response team takes immediate action to contain the issue, eradicate the threat, and restore normal operations. Affected customers are notified promptly, and detailed reports are provided to ensure transparency.

Compliance

IDO complies with all applicable data protection regulations, including GDPR, CCPA, and HIPAA, as well as industry standards like ISO/IEC 27001 and NIST. Regular internal and external audits are conducted to verify compliance and ensure ongoing data security.

User Responsibilities

While we implement robust security measures, users are responsible for ensuring the security of their accounts by using strong passwords and following recommended security practices.