Let’s Get Started
Schedule a demo to see how our tools can help your organization work smarter and grow faster.
How we protect your data and safeguard your trust.
Last updated: March 15, 2021
GrowthZone LLC (“GrowthZone”) shall at all times use industry standard technical, physical and procedural controls to protect the Customer Data against destruction, loss, alteration, unauthorized disclosure to third parties or unauthorized access by employees or contractors employed by GrowthZone, whether by accident or otherwise.
GrowthZone’s security strategy is to protect Customer Data at multiple levels, which includes data security, data integrity, and data privacy.
Without limiting the first paragraph of this Schedule, to ensure the privacy, security, and availability of Customer data and transactions, GrowthZone employs the following technologies in delivering its service.
GrowthZone’s production systems are located in one of the leading co-location facilities in the United States of America. Production web, application, and database servers along with network equipment are housed in a suite at the colocation facility which provides 24×7 security. To access the suite there are several levels of security that must be passed where each entry point provides state of the art card readers, scanners, and other access devices.
GrowthZone’s network is protected by firewalls against unauthorized access. Leading-edge firewall equipment has been chosen to protect the network.
GrowthZone’s systems use 256-bit with a 2048 key length SSL encryption to protect all customer and visitor data, including all transaction and PII in transit. All databases are encrypted at rest and protected by firewalls against unauthorized usage. Database users are restricted to a controlled list; individual activities are restricted.
GrowthZone’s users access the application using password authentication which is encrypted with Secure Hash Function. The robust design of the application prevents a customer from accessing another customer’s data. There are several layers of protected servers that stand between the web page where the customer logs in and the actual data. All data is encrypted using AES 256-bit.
GrowthZone uses controlled passwords on its servers and network equipment. GrowthZone limits access to production systems to authorized personnel only. Passwords are changed on a regular basis. Security updates to the operating systems are tracked and updated as necessary.
GrowthZone looks at its application as well as the infrastructure as a tightly integrated system. GrowthZone has spare servers ready to deploy at a moment’s notice in the event of an equipment failure. GrowthZone chooses equipment of the highest quality to power our application.
GrowthZone has in place an expert team to provide services for server and network management, monitoring, backups, and other necessary maintenance. System administrators respond to monitoring alerts 24×7 and repair critical failures immediately.
Schedule a demo to see how our tools can help your organization work smarter and grow faster.