Last revised on May 23, 2018, effective as of May 25, 2018
As a company, we use the Register Event service for all of our sites. Ensuring that the Register Event service remains secure is vital to protecting our own data. The security of your information is required for our success as a business. Below are some details on our security practices.
Register Event uses 256-bit AES, supports TLS 1.2 for all of your site communication, and uses the ECDHE_RSA Key Exchange Algorithm. We monitor the security community’s output closely and work promptly to upgrade the service to respond to new vulnerabilities as they are discovered.
We contract with respected, external security firms who perform regular audits of Register Event to verify that our security practices are sound and to monitor the service in light of new vulnerabilities discovered by the security research community.
Our servers are located in WP Engine’s data centers. They’ve devoted an entire portion of their site to explaining their security measures, which you can find here: http://wpengine.com/support/wp-engines-security-environment
The highest security risk to any system is usually the behavior of its users. We want to provide you with the tools you need to protect your own data. For example, we log every time your account is signed into, noting the device used and location of the connection
We will continue to roll out additional features which afford you more control over the security of your own Register Event sites. We will also be adding more options for team administrators to set internal security policies, such as establishing password strength requirements or requiring the use of PIN-lock functionality for Register Event’s future mobile apps.
We regard the information you share within your Register Event sites as private and confidential. We place strict controls over our employees’ access to internal data and are committed to ensuring that your data is never seen by anyone who should not see it.
While the operation of the Register Event service would not be possible unless there were some technical employees with sufficient system permissions to enable them to access and control software that stores and indexes the content you add to your Register Event team, this team is kept purposefully small and are prohibited from using these permissions to view customer data unless it is necessary to do so.
All of our employees and contractors are bound to our policies regarding customer data and we treat these issues as matters of the highest importance within our company. If in order to diagnose a problem you are having with the service, we would need to do something that would expose your personal communications to one of our employees in a readable form, we will ask for your consent prior to taking action. Our platform will automatically generate an audit entry of any such access.
If you are using Register Event in a workplace or on a device or account issued to you by your employer or another organization, they will almost certainly have their own policies in place regarding storage, access, modification, deletion and retention of communications and content. Please check with your employer or team administrator about what policies they have in place regarding your information and related content.
We know how important these issues are to you. They are equally important to us. The security, privacy, and confidentiality of your information are core to our success as a business and we will continue to be proactive, vigilant and diligent in ensuring its safety.
If you have additional questions regarding data privacy, security or confidentiality, we’d be happy to answer them. Please write to email@example.com and we’ll respond as quickly as we can.
If you believe you have found a security vulnerability on Register Event, we encourage you to let us know right away. We will investigate all legitimate reports and do our best to quickly fix the problem.