The security of the data and our systems is of the utmost importance to Contacts Plus and as such we have protected against mis-use through a number of measures. They include:
- Data is only ever be accessible through the applications provided.
- All companies wanting access to our systems are firstly vetted ensuring they are authorised in using the data provided by Contacts Plus.
- Before access to the systems is allowed all organisations must sign access agreements and contracts and are, therefore, bound by our Terms & Conditions of use and are fully aware of any civil or criminal penalties that apply for the mis-use of the data.
- All access to our products and services are logged, providing an auditable record of which users accessed what data and at what time.
Physical Security: The data is stored and held on site in a data centre for the duration of the job. The data centre has redundant power and data. The hardware is locked in our own rack.
System Security: The architecture of the application is n-tier.
Client data is stored inside of a trust-zone, which is behind a DMZ. (i.e. the product is supported by best practice application architecture). Access to the application is via username and password that has industry standard strength requirements.
Our products have passed third party PCI DSS compliance tests.