Keeping Your Memories Private

Data
-
Data Center - Amazon AWS - The data centers we use are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means.
-
Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.
-
How is sensitive data stored?
-
We do not store most confidential informaton like credit cards We don't encrypt sensitive data like passwords, but rather use a one-way hash so they cannot be decrypted. We don't use backup tapes or other removable media to store data, especially sensitive customer data, at this time. For non-sensitive data, we do not encrypt data at rest.
-
How is data transmitted?
-
We transmit via HTTPS and have an SSL certificate We use https for all account data and videos when in transit. Data enviroments We use a separate development, testing,and operations enviroment This is to protect systems from unplanned

 -

Data center access

This is set by AWS, and is very secure. The data centers we use are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. Office security Offices are in a locked building monitored by a security camera.

Background checks We do not currently conduct background checks We are a small company, and currently find background checks uncessary. We check references and do an internet search to verify identity, and check for a criminal record of any kind. We are likely to revisit this as our team grows. Firewall We use AWS for our data center and CDN, and consider them absolutely secure We do not store any sensitive information in our offices, which do not have a firewall.

Anti-Virus Software We use AWS for our data center and CDN, and consider them absolutely secure. We do not store sensitive information in our offices, which do not have anti-virus software as our servers are protected and we believe that anti-virus software might open up a greater security concern

Disposal of media We have an internal equipment disposal policy. All equipment is wiped, and is not sold (unless it can be done safely and securely). Nothing is ever left at a dump or trash site. This is monitored and handled by thedisposal team. Wireless security Network is WPA2 Only parties with knowledge of the password are able to connect to the network.