Date of Last Revision: November 11, 2012
This security policy (“Policy”) explains the security measures LiquidPlanner, Inc. (“LiquidPlanner”) employs to protect the content posted in private WorkSpaces (as such term is defined in our Terms of Service) on our Web site (the “Site”). As our policies and procedures may change from time to time, we reserve the right to update and modify this policy at any time. We will post changes to this policy on the Site and will update the revision date at the top of this Policy.
We use secure internet technology.
LiquidPlanner utilizes some of the most advanced technology for Internet security available today. Connections between the browser and LiquidPlanner are HTTPS (encrypted with Secure Socket Layer (SSL)). When you access our Site using a supported browser, SSL technology protects information using both server authentication and data encryption, which is designed to keep content posted in Workspaces safe and secure, and to prevent unauthorized access by users that have not been invited to collaborate in a Workspace.
Your Workspace data is secure.
Our servers are located at Adhost, a secure, world-class hosting facility in Seattle Washington. LiquidPlanner’s dedicated servers are located in locked cages in a hosting facility that is staffed by guards and equipped with video surveillance and keycard locks. Only specific, authorized employees of LiquidPlanner have physical and logical access to the servers. Access is monitored and logged.
We have redundant power and internet connections, and the facility is equipped with backup generators. We use automated tools to keep server configurations consistent and up to date.
We use automated tools to monitor the performance and availability of our hardware and our site. We are alerted to events by email, SMS, and telephone. We use both network and host-based firewalls configured with a “default deny” policy. Only necessary traffic is allowed through the firewall.
Your Workspace data is backed up.
We operate under an industry-standard architecture for maintaining data integrity against hardware or software failures. We utilize high-performance RAID-10 disk drives, in which the database is striped across several disks for performance and disks are mirrored in pairs, such that if any disk fails, we have an exact copy on its partner and can simply swap in a new drive. We also replicate the database to a second hot standby database server. The purpose of the backup is to provide service recovery in the event that the data center gets destroyed (e.g. major earthquake). We store a daily, encrypted backup of the database offsite long enough to facilitate a disaster recovery. We have service agreements with Dell for hardware replacement within 4 hours under normal operating circumstances. In short, we are dedicated to preserving operational integrity for all our customers; crashing and losing data is unacceptable.
Your Workspace content is always kept private.
Content posted in a Workspace is designated as private. This means that users who have not been invited to join a Workspace are not allowed to see the content posted there. Only the authorized users you invite into your workspace have access to your data, and each user logs into their account with a unique email address and password. Each account is bound to a specific and verified email address that must be entered when a user logs on. Every page request is logged with a timestamp, user identity, and source IP address.
You own your Workspace content and control who has access to it.
The owner of a Workspace retains control and rights over all content posted within that Workspace. They also control who is permitted to access the Workspace. If a user’s permission to access a Workspace is revoked in accordance with the procedures set forth on the Site, then such user will no longer be permitted to access the Workspace or the content posted in such Workspace.
Your account manager can connect you with our operations team for more specific questions. Call 800-971-1601 for assistance.
Terms of Service:
Please refer to our Terms of Service for information on how the LiquidPlanner service is delivered.