The Security Center Encryption section provides detailed information on the encryption technologies and practices used within our platform to ensure the protection of your data.
Encryption Technologies
Our platform employs a variety of encryption technologies to safeguard your data:
- Symmetric Encryption: This method uses a single key for both encryption and decryption. It is fast and efficient for encrypting large amounts of data.
- Asymmetric Encryption: Also known as public-key encryption, this method uses a pair of keys – a public key for encryption and a private key for decryption.
- Hashing: We use hashing algorithms to ensure data integrity and prevent tampering.
Data Protection
- End-to-End Encryption: Your data is encrypted from the moment it leaves your device until it reaches our servers, ensuring that only authorized parties can access it.
- Data at Rest Encryption: All data stored on our servers is encrypted to prevent unauthorized access.
- Data in Transit Encryption: Data transmitted between your device and our servers is encrypted using secure protocols.
Compliance
Our encryption practices comply with industry standards and regulations, including:
- GDPR: General Data Protection Regulation
- HIPAA: Health Insurance Portability and Accountability Act
- PCI DSS: Payment Card Industry Data Security Standard
Learn More
For more information on our encryption practices, please visit our Security Best Practices.
Encryption Technology