Security
Robust Security & Comprehensive Recovery Policy
At IDO, we recognize that safeguarding customer data is the cornerstone of trust in our services. Our comprehensive security framework ensures the confidentiality, integrity, and availability of sensitive information. This policy reflects our commitment to protecting data against threats, minimizing vulnerabilities, and maintaining uninterrupted service delivery through robust recovery protocols.
Data Security
IDO employs industry-leading encryption techniques to protect customer data, both while it is stored and during transmission. Our platform utilizes robust authentication methods, including multi-factor authentication (MFA), and ensures that access is strictly controlled through role-based access. Additionally, we continuously monitor our network with advanced firewalls and intrusion detection systems to guard against unauthorized access.
Data Backup & Recovery
We perform regular, encrypted backups of all customer data, ensuring that backups are stored in secure, geographically dispersed locations. Our recovery processes are designed to minimize data loss, with recovery point objectives (RPO) set to 24 hours and recovery time objectives (RTO) of 4 hours. We conduct regular drills to ensure that our backup and recovery systems are effective and reliable in the event of an incident.
Incident Response
IDO’s dedicated security team monitors systems for signs of incidents. Upon detecting a potential breach, our incident response team takes immediate action to contain the issue, eradicate the threat, and restore normal operations. Affected customers are notified promptly, and detailed reports are provided to ensure transparency.
Compliance
IDO complies with all applicable data protection regulations, including GDPR, CCPA, and HIPAA, as well as industry standards like ISO/IEC 27001 and NIST. Regular internal and external audits are conducted to verify compliance and ensure ongoing data security.
User Responsibilities
While we implement robust security measures, users are responsible for ensuring the security of their accounts by using strong passwords and following recommended security practices.