Loading...
Security 2018-06-11T13:00:00+00:00

SECURITY IS OUR PRIORITY

Security is the foundation for all Scytl products with 40+ international election security patents and patent applications.

We follow strict security protocols to ensure your data is secure, backed up, and available when you need it. Our security measures encompass every aspect of our business – from restricted personnel access, system checks, to product security.

SECURITY PRACTICES

Access
Physical office access requires keycards, and all visitors are recorded and monitored. Digital platforms can only be accessed from secure locations.
Login Access
All workstations require password entry. We consistently apply updates and software patches to ensure system health and efficiency.
Data Encryption
Data is secured during transit by using the latest approved secure encryption methods. We also use additional layers of protection to prohibit insecure connections.

CONFIDENTIALITY

Protecting your data is our highest priority. Each Scytl employee must sign a non-disclosure agreement (NDA) upon hire. Access to specific client data is based on employee role, and as-needed.

DATA CENTER SECURITY AND COMPLIANCE

Scytl products and services are hosted on Amazon Web Services, a secure cloud service platform built on sound network infrastructure. AWS has multiple certifications, including SSAE 16, adhering to an extensive list of global security standards.

For more information on AWS and their security processes, please visit http://aws.amazon.com/compliance and http://aws.amazon.com/security

DISASTER RECOVERY

We conduct regular system checks to ensure our processes and services are working properly. Your production platforms and data are automatically backed up and stored at multiple locations in Amazon’s secure data centers. Our recovery procedures ensure that your data will always be available, even in the event of a disaster.

THEY TRUST US