Skip to main content
All CollectionsSecurity & privacy
How LiveRem protects user data
How LiveRem protects user data
K
Written by Kathleen Webber
Updated over a month ago

At LiveRem, we recognise the significance of security and privacy for user data. Trust underpins every thriving customer relationship, and we're unyielding in our pursuit to establish and maintain this trust. Here's an outline of how we ensure your data's protection:

1. ISO27001 Certification

We are proud to be ISO 27001 certified under Intercert, demonstrating our commitment to maintaining the highest standards of information security. Under this certification, we are externally tested as part of continuous monitoring to ensure our information security processes are robust and aligned with industry best practices. High-level reports from these tests are available to customers upon request.

2. Data Encryption

Every piece of data moving in and out of LiveRem is safeguarded using the most advanced encryption standards:

  • Data in Transit: As data travels between our servers (hosted on Google Cloud) and your device, it's encrypted with the Transport Layer Security (TLS) protocol, ensuring no interceptions or tampering.

  • Data at Rest: Data resting on our Google Cloud servers is encrypted using cutting-edge algorithms, ensuring its safety even if there's unauthorized access.

3. Secure Infrastructure with Google Cloud

  • Physical Security: Our data is hosted on Google Cloud, which boasts globally recognized security features. This includes state-of-the-art measures like biometric authentication, video surveillance, and 24/7 security personnel.

  • Network Security: Google Cloud's infrastructure comes with advanced firewalls, intrusion detection systems, and network segmentation, all of which contribute to the safety of our data.

4. Regular Audits & Penetration Testing

  • Under the ISO27001 certification requirements, periodic security audits and vulnerability checks ensure that any potential system weaknesses are identified and patched.

  • Our in-house security team also emulates cyber-attacks through penetration testing to evaluate and bolster our defenses.

4. Data Access Control

  • Role-Based Access: Access to data is determined by job function within LiveRem. Strict controls combined with multi-factor authentication (MFA) ensure only authorized individuals can view sensitive information.

  • Logging and Monitoring: All interactions with user data are logged, and these logs are proactively scanned for any unusual or unauthorized actions.

5. Data Backup & Disaster Recovery on Google Cloud

  • We run regular data backups, stored in geographically diverse Google Cloud data centers, ensuring data integrity and resilience.

  • Our comprehensive disaster recovery blueprint, facilitated by Google Cloud, ensures that services can be promptly restored with minimal data loss, even in unforeseen circumstances.

6. Third-Party Vendor Assessment

  • Prior to integrating with third-party vendors, like our payment processor Stripe, we ascertain their commitment to top-tier security standards of ISO27001.

  • Continual assessments of third-party partners make sure they remain compliant with ISO27001.

7. Employee Training

  • Under ISO27001, LiveRem staff undergo routine security training sessions to stay updated on best practices, ensuring they handle user data proficiently.

  • They're also trained to discern and report any phishing or potentially harmful attempts targeting our infrastructure.

8. Incident Response Plan

  • If there's a security incident, our security team has an exhaustive response strategy in place.

  • This blueprint ensures immediate action, timely notifications to stakeholders, and measures to prevent future occurrences.

FAQs

1. How often does LiveRem backup my data?

LiveRem runs daily backups on Google Cloud to uphold the safety and integrity of your data.

2. Can I ask for a detailed account of the data LiveRem has about me?

Yes, indeed! Users can request their data either via account settings or by reaching out to our support.

3. How should I report a suspected security anomaly?

Please direct any security-related concerns or potential vulnerabilities to our security team at [email protected].

Need More Insights?

For an in-depth understanding of our security mechanisms or to address specific questions, please contact our dedicated support at [email protected]. We're always ready to assist.

Your trust is our priority. At LiveRem, we're steadfast in our dedication to safeguarding your data and upholding the highest data security benchmarks.

Did this answer your question?