User Tools

Site Tools


pdotd:general-security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pdotd:general-security [2022/10/31 18:30] – [Security Statement (Risk Profile)] dpatenaudepdotd:general-security [2022/10/31 18:35] (current) – [Security Statement (Risk Profile)] dpatenaude
Line 12: Line 12:
     * (customers are free to configure their workstations to meet their IT/IS requirements)     * (customers are free to configure their workstations to meet their IT/IS requirements)
   * All data is stored on customer systems behind their firewall   * All data is stored on customer systems behind their firewall
-  * p.d communicates to our company servers via authenticated HTTPS API requests+  * p.d communicates to our company servers via [[pdotd:rn-30#internet_communications|authenticated HTTPS API requests]]
   * All external communications are initiated by customer end users through the p.d software   * All external communications are initiated by customer end users through the p.d software
     * (i.e. all communications are outbound only and our company has NO access to your network)     * (i.e. all communications are outbound only and our company has NO access to your network)
-  * p.d sends only the minimum data necessary to place an order+  * p.d sends only the [[pdotd:rn-30#data_included_in_device_files|minimum data necessary to place an order]]
     * (i.e. no PHI or PII or sensitive billing information is included in the order files)     * (i.e. no PHI or PII or sensitive billing information is included in the order files)
-  * A third party service is used to store passwords, so our staff does not have access to any end user password information+  * A third party service, [[https://auth0.com/login-security|Auth0]], is used to store passwords, so our staff does not have access to any end user password information
  
 Based on these high level system features, it should be evident that the Information Security risk to our customers due to a breach of p.d or .decimal company systems is very low, as: Based on these high level system features, it should be evident that the Information Security risk to our customers due to a breach of p.d or .decimal company systems is very low, as:
pdotd/general-security.1667241039.txt.gz · Last modified: 2022/10/31 18:30 by dpatenaude