Pixel tracking image
Free Trial

Technical and Organizational Security Measures (TOMs)

 
The Technical and Organizational Measures (TOMs) provided below apply to GoXpro services. Evidence of measures implemented by GoXpro may be presented in the form of attestations, reports, screenshots or extracts from relevant sources upon request from entitled customers.
 
Data Centres
 
GoXpro is hosted in Europe (London), Asia Pacific (Singapore and Sydney), using world-class, highly secure data centers that are certified to comply with global standards including SOC 1/2/3, ISO 27001, PCI DSS and several more. Canadian hosting using the same world-class infrastructure is also available by request.
 
Access control
 
Access to systems and data is governed by an Information Security policy, and access is managed in accordance with a formalized and approved IT Access and Account Management process. Access to a customer's data within GoXpro is controlled by, and the responsibility of, administrators appointed by GoXpro. GoXpro provides the ability for these administrators to control the things that users can see and do in GoXpro via Security Groups. For more information please refer to the Configuring Permissions article.
 
Data Processor (GoXpro) internal user account controls
 
GoXpro has a defined process in place for the provisioning, management and deprovisioning of its internal employee IT accounts to ensure customer data is protected from unauthorized access via these accounts. Access to data processing systems within GoXpro is granted on a least-privilege basis, and audited in line with company policy. GoXpro employees are provided security training and are subject to non-disclosure agreements and background checks.
 
Data separation
 
GoXpro implements measures that ensure data is logically separated between customers. Customer data in GoXpro is tightly controlled via authentication and authorization. GoXpro regions are physically and geographically separated with no data being transmitted between regions (unless requested by the customer).
 
Local user accounts
 
Local user passwords have a minimum length and complexity requirement, and passwords are individually salted and hashed in a one-way irreversible fashion at rest.
 
Single Sign On (SSO) integration
 
GoXpro supports Single Sign On via JWT. The use of SSO integration removes the need for local passwords in GoXpro and establishes a trust relationship with the customer's identity provider. This also means that users do not have to remember a separate password which they may be inclined to write down or forget. Further, SSO allows organizations to control password rules and complexity including frequency of changes, and multi-factor authentication controls.
 
Data encryption
 
TLS encryption (also known as HTTPS) is used to encrypt and protect user data in transit. AES-256 or better encryption algorithms are used to encrypt data at rest.
 
Information Security Policy
 
All operations are governed by a corporate Information Security Policy which enforces the responsibilities of all GoXpro employees and contractors in relation to security of information assets including systems, software, and customer data .
 
Privacy Policy
 
All information stored is governed by the terms of our Privacy Policy. We don't use customer data for any other purpose than to maintain and administer the service, and we will never sell customer data to third parties.
 
Credit card and financial records
 
GoXpro systems don't store, retain or ever even receive credit card information. All credit card details are securely processed and stored by secure 3rd party payment providers.
 
Data Backup
 
We take complete daily backups of all data for the purposes of Disaster Recovery (only). Backups are encrypted and stored in a secure manner with minimal access rights.
 
Disaster Recovery
 
GoXpro has a defined process for recovery of data in the event of a disaster. This includes the use of hot-standby infrastructure that is physically separated from primary infrastructure. GoXpro has a defined process for recovery of services from backup medium.
 
Business Continuity
 
GoXpro has a defined Business Continuity Plan that allows our business to continue operating in the event that systems or physical locations become unavailable.
 
Monitoring
 
We implement proactive system monitoring and have rules in place to detect important events such as failures, outages and errors. Appropriate alerting is implemented to provide notification of priority events, as defined by monitoring rules.
 
Web Application Firewalls
 
We implement Web Application Firewalls (WAFs) which monitor incoming traffic from the Internet.
 
Malware Scanning
 
We implement automated malware scanning across all servers that we manage, across all regions.
 
Software design/development
 
GoXpro has been built from the ground up using best practice methodologies to meet the security and functional requirements of the modern-day Internet and World Wide Web. Our software engineers are the best in their field with decades of experience.
 
Minimization of information requirements
 
The amount of personally identifiable information we require to be stored in the system is limited to names and emails, however you can store more if you wish. We don't require any other personally identifiable information such as addresses, phone numbers, or credit cards. You have the option to delete data in the system whenever you require.
 
Vulnerability and Threat management
 
GoXpro has policies in place for the management of vulnerabilities and threats including mitigation, minimization, defenses and controls. This includes regular testing including vulnerability and penetration testing.
 
Vulnerability Scanning
 
Vulnerability scanning is performed annually on the GoXpro application, with any risks being mitigated as soon as possible. Vulnerability scan reports are available to entitled customers upon request.
 
Penetration Testing
 
GoXpro engages independent, expert third-party cyber security firms to conduct penetration testing on the GoXpro application, with any risks being mitigated as soon as possible. Penetration test reports are available to entitled customers upon request.
 
Incident management
 
GoXpro has a defined process for the management of incidents and events, including those that could pose a threat to the security or integrity of data, which are treated with priority.
 
Handling breaches
 
When we learn of a breach we will take appropriate steps to mitigate it and to contain any damage. In the event that there are affected users which require notification, we will do so in a timely manner using appropriate channels so that users are able to take protective steps.
 
If you become aware of a breach, you can report it to us using our contact form.
 
This document was last modified on 27 February 2023.
cross