Fendous Sustainability CRM: Security and Privacy Features
Data Privacy Features for Fendous Sustainability CRM
- Data Encryption: All data transfer between users, Caspio apps (Fendous PLS) and the Caspio platform are protected with TLS encryption (HTTPS). Full disk encryption is also enforced while data is at rest. Employ Transport Layer Security (TLS) to secure data transmitted over networks. Use Secure Sockets Layer (SSL) certificates for web-based interfaces.
- Data Anonymization: Implement data anonymization techniques to mask personally identifiable information (PII) when performing analytics or sharing data, ensuring user privacy while still deriving insights from the data.
- User Consent and Control: Obtain explicit consent from users before collecting, processing, or sharing their data. Provide users with control over their data, allowing them to update, export, or delete their personal information at any time.
- Data Minimization: Collect only the minimum amount of data necessary for the intended purpose. Regularly review and delete data that is no longer needed to reduce privacy risks.
- Access Control and Auditing: Implement strict access controls to ensure that only authorized personnel have access to sensitive data. Maintain detailed audit logs to track data access and modifications, which helps in detecting and responding to potential privacy breaches.
- Compliance with GDPR and Other Regulations: Ensure compliance with the General Data Protection Regulation (GDPR) and other relevant data protection laws. This includes appointing a Data Protection Officer (DPO), conducting regular privacy impact assessments, and adhering to data subject rights.
- Data Deactivation and Deletion: When a user is deactivated or deleted, ensure their data is either anonymized or completely removed from the system in accordance with regulatory requirements. Implement processes to handle data retention and destruction securely.
- Secure Data Backup: Regularly back up data and store backups securely to prevent data loss and ensure data availability in case of system failures or cyber-attacks.
- Transparent Data Handling Policies: Provide clear and transparent information about data handling practices, including the types of data collected, purposes of data processing, and data retention periods. Make privacy policies easily accessible to users.
Security Features for Fendous Sustainability CRM
- Two-Factor Authentication (2FA):
Enhanced Security: Requires users to provide two forms of verification before accessing the CRM, significantly reducing the risk of unauthorized access.
- Single Sign-On (SSO):Convenience and Security: Integrates with identity providers like Microsoft Entra ID and Okta to allow users to log in using a single set of credentials, streamlining access while maintaining high security standards.
- Encryption: All data transfer between users, Caspio apps (Fendous PLS) and the Caspio platform are protected with TLS encryption (HTTPS). Full disk encryption is also enforced while data is at rest. Employ Transport Layer Security (TLS) to secure data transmitted over networks. Use Secure Sockets Layer (SSL) certificates for web-based interfaces.
- Access Control: Role-Based Access Control (RBAC): Access to data and system functionalities is granted based on user roles and responsibilities, minimizing the risk of unauthorized access. Multi-Factor Authentication (MFA/2FA): Users are required to verify their identity through multiple methods before gaining access, enhancing security.
- Regular Security Audits: Internal Audits: Regular internal audits are conducted to review security policies and procedures. Third-Party Assessments: External security experts are engaged to perform vulnerability assessments and penetration testing.
- Security Rules and Access Restrictions:Granular Controls: Administrators can define and enforce security rules that restrict access based on roles, locations, and other criteria. Compliance Monitoring: Continuous monitoring ensures compliance with internal security policies and external regulations.
- Security Dashboard:Centralized Monitoring: A security dashboard provides a centralized view of security metrics, alerts, and logs, enabling proactive management of security incidents. Customizable Alerts: Users can configure alerts for specific security events to stay informed about potential threats in real-time.
- Automated Threat Detection: Intrusion Detection Systems (IDS): Advanced IDS are deployed to detect and mitigate potential intrusions and security threats. Machine Learning: Machine learning algorithms analyze data patterns to identify and respond to anomalies and potential threats proactively.
- Activity Logging and Monitoring:Audit Logs: Comprehensive logs of all user activities are maintained and regularly reviewed for suspicious activity. Real-Time Monitoring: Continuous monitoring tools are used to detect and respond to potential security threats in real-time.
- Secure API Integration: API Security: All third-party integrations are conducted through secure APIs with strict authentication and authorization protocols. Regular Reviews: APIs are regularly reviewed and updated to ensure they meet the highest security standards.
- Security Alerts: Proactive Notifications: Automated alerts notify administrators and users about suspicious activities, potential breaches, and compliance issues. Incident Response: Alerts are integrated into the incident response process, ensuring quick action to mitigate threats.
- Data Deactivation and Deletion:Secure Data Handling: When a user is deactivated or deleted, their data is securely anonymized or completely removed from the system in accordance with regulatory requirements. Implement processes to handle data retention and destruction securely.