Last Updated: 12 September 2019
Conholdate uses Amazon EC2 cloud servers. Using an industry standard like Amazon helps guarantee the security and resilience of our services. Amazon has attained a number of certifications that affirm that they have stringent, working internal controls.
Amazon safeguards the physical security of their servers. Servers are located in non-descript facilities, and critical facilities have extensive setback and military grade perimeter control. Access to data centers requires two-factor authentication at three points.
Host operating systems are kept secure by internal processes and procedures. Guest operating systems are entirely controlled by Conholdate. Amazon administrators do not have access to them. By default, inbound firewall rules deny all traffic to host servers.
Amazon systems are built with extensive redundancy in mind. Conholdate backs up data on a daily basis. All access is logged and tracked for auditing purposes.
Account passwords are encrypted and filtered out from all application and system logs. Passwords are not visible to anyone.
Sign out of your Conholdate account to prevent someone from using your computer to access your account without your authorization. Keep your user name and password secure and do not disclose it to any third-party. In case a third-party gains unauthorized access to your account due to any act or omission on your part, you are solely responsible for any loss caused.
Credit Card Safety
Conholdate does not retain any credit card information provided by you. When we charge your credit card, such information is transferred directly to, and processed by, our payment gateway.
To protect user information, Conholdate's payment gateway uses the latest 256-bit Secure Socket Layer (SSL) technology for secure transactions. The payment gateway is certified as compliant with card association security initiatives including Payment Card Industry (PCI) and Cardholder Information Security Program (CISP) standards for data protection.
File Retention Policy
Conholdate products run on customer's own machines, infrastructure and network and do not send any files back to Conholdate for processing and therefore does not have access to them. From time to time a customer may send documents to the Conholdate support team via the forums for the purpose of diagnosis of technical issues or feature requests. These files are maintained only as long as necessary to complete the required task and the customer can ask for these files to be removed at any time. If the customer marks the thread as private none of these files are accessible to any person other than the customer and select Conholdate staff.
Reporting License and Software Theft
If you think a Conholdate license is being used in a way it shouldn't be, or you suspect a Conholdate product has been modified and being made available for free, please tell us about it. More ...
System uptime and availability is a major priority for us, check system uptime and subscribe to status notifications from our System Status page. System Status
More questions about Security?