The Security Center Encryption section provides detailed information on the encryption technologies and practices used within our platform to ensure the protection of your data.

Encryption Technologies

Our platform employs a variety of encryption technologies to safeguard your data:

  • Symmetric Encryption: This method uses a single key for both encryption and decryption. It is fast and efficient for encrypting large amounts of data.
  • Asymmetric Encryption: Also known as public-key encryption, this method uses a pair of keys – a public key for encryption and a private key for decryption.
  • Hashing: We use hashing algorithms to ensure data integrity and prevent tampering.

Data Protection

  • End-to-End Encryption: Your data is encrypted from the moment it leaves your device until it reaches our servers, ensuring that only authorized parties can access it.
  • Data at Rest Encryption: All data stored on our servers is encrypted to prevent unauthorized access.
  • Data in Transit Encryption: Data transmitted between your device and our servers is encrypted using secure protocols.

Compliance

Our encryption practices comply with industry standards and regulations, including:

  • GDPR: General Data Protection Regulation
  • HIPAA: Health Insurance Portability and Accountability Act
  • PCI DSS: Payment Card Industry Data Security Standard

Learn More

For more information on our encryption practices, please visit our Security Best Practices.

Encryption Technology