Privacy, confidentiality and security
At: 2021-08-15 12:00 | by: @Fiill
Privacy is one of the main concerns of the data age, it is shared between fortune 500 companies trying to protect their billions of dollars in Intellectual Property, and average citizens worry about how bad actors can use their digital footprint to harm them.
At Fiill understand the responsibility that comes from being the custodian of your personal and professional data. We put in place a series of measures and guidelines to make sure your data is neither deliberately shared nor accidentally leak to anyone at any moment.
We do not share your data with any third party
All our analysis is done in-house by our state-of-the-art algorithms and our team of experts. This means that your data do not have to transit outside our infrastructure or be handled by any external entity or person.
All our tools operate according to the principle of least access
Our platform operates by giving minimal privilege. This means access to see and manipulate the data is restricted to the person or piece of code needed to do the job. If any information is unnecessary for the task being done it will be hidden from the entity doing the work to avoid any leak.
We periodically purge our databases from any record that is no more used.
We do not keep any original record by default
Fiill analyzes your employee's interaction to learn about your company culture and help improve on it. To do that we will be accessing some sensitive information through your team's communications.
While we do have a state-of-the-art infrastructure with all the security measures needed to keep your data safe.
We always operate under the principle of not saving any original recorded if it is non more needed ie. once it is analyzed and it result processed.
Security is not negotiable
We only encrypted commutation
Using a SASS (Software as a service) means a lot of communication between the client and the servers and the between the server itself. To avoid any form of data hijacking in transit we implemented a policy of strong encryption for pieces of data exchange between any part of our infrastructure.
We built our platform using the start of the art technology
Using our engineers’ years of experience we set out to learn from what others had done and worked and what did not work, we analyzed data leaks and hacking attempts that occurs in the last years and how to how to avoid them. And we looked at the practices that companies with a history of strong data protection put in place to achieve that, And we used all this learning to build a platform that our client can feel safe to entrust our data to.
Continuous security
Security is not a set it and forget it kind of thing we periodically run security drills, to try to find our new venerability in our system before anyone is away of it, and our automated scanning tools analyze our code each time a change occurs to make sure no new venerably was introduced while keeping an eye on eye new vulnerabilities that might have discovered lately in on of the technology we are using.
We use the most secure IT, cloud provider
Our platform using as it bases the compute power provided by some major cloud infrastructure meanly GCP and AWS (Google Cloud Platform and amazon web services), this allows users to take advantage of the same tools that are used to power some of the work most secure platform like Amazon.com e-commerce platform and the Google Suite of products while been nimble and shift quickly away from one provider or to and new provider if needed in the future.