Privacy and security are extremely important to both our clients and us. We want our clients to know that we understand the sensitivities around the careful handling of their member, donor, and client information, and we take a series of precautions to ensure that their data are kept safe. We use a combination of access restrictions (strong passwords, 2-factor authentication), secure transfer protocols (SSL/TLS, VPN), encryption (256-bit multi-stage), and secure erasure (US DoD 5220.22-M) to guarantee the safety of our clients’ information.
Precaution 1: Secure Access
TouchPoints’ systems are protected with strong passwords and utilize two-factor authentication to ensure that anyone accessing client data has the right to do so.
Precaution 2: Secure Transfer
Files are transferred securely using SSL (Secure Sockets Layer)/TLS (Transport Layer Security) connectivity. SSL/TLS is a protocol that provides secure communications on the internet for such things as web browsing, email, instant messaging and other data transfers. In addition, we use a secure Virtual Private Network (VPN) while working with our proprietary databases to ensure client data cannot be intercepted by a third party.
Precaution 3: Secure Storage
For the limited duration of time that client data are handled by TouchPoints, they are protected by firewalls and stored in secure locations. We use 256-bit multi-stage encryption, the same level of encryption used by banks to protect their clients’ valuable financial information, to guard our clients’ information.
Precaution 4: Secure Erasure
After a client has received their completed files and is satisfied with the results, TouchPoints purges the client’s data from its systems. We want our clients to have maximum confidence in our security procedures, which is why we follow US DoD 5220.22-M specifications when erasing data. This is a similar erasure process to the one used by the US military to destroy sensitive documents.