Security Policy
Effective Date: January 1, 2022
At MigrateMate, we are committed to ensuring the security of our customers' data. We have implemented a comprehensive set of security practices, policies, and technologies to protect your information. Our security policy covers the following concentration areas:
Physical Security
We host our data centers on facilities that are protected by stringent physical security measures, including:
- 24/7 video surveillance monitoring of access routes and perimeter
- Electronic access control terminals with entrance granted only via transponder key and biometrics
- Protection from physical, logistical, and natural disasters such as fires or floods.
Network Security
Our security team employs best practices to protect your data against sophisticated electronic attacks, including:
- Network firewalls
- DDoS prevention through the use of sophisticated perimeter security technologies and the latest hardware appliances to provide excellent protection against large-scale DDoS attacks
- Regular network posture assessments.
People Processes
We maintain strict control over who has access to customer data. All our employees undergo background checks and security training, and our data access policies are regularly reviewed.
Redundancy and Business Continuity
Our systems are designed with redundancy and business continuity in mind. We regularly test our disaster recovery and business continuity plans to ensure they are effective in the event of a disaster.
Application Security
Our service provides HTTPS-encrypted communication, role-based authorization, and validation of all requests to ensure security at the application level.
Security Audits
We regularly scan all our systems to prevent any vulnerabilities. Our software is constantly updated, and all connections are limited, logged, and checked.
We comply with all confidentiality requirements before, during, and after the migration process. We take appropriate security measures to protect against unauthorized access to, alteration, disclosure, or destruction of data. These include internal reviews of our data collection, storage, processing practices, and security measures, as well as physical security measures to guard against unauthorized access to systems where data is stored.