Security Policy

Security Policy

Data Protection

We use a highly durable storage infrastructure designed for mission-critical and primary data storage. Data is redundantly stored on multiple devices across multiple facilities. We keep daily database backups. Files that our customers upload are stored on servers that use modern techniques to remove bottlenecks and points of failure.

Secure data communication

When information passes back and forth between our server and your computer, all the information is encrypted. That means that if anyone were to "listen in" and see this data, they will not be able to decrypt or read what it means. IbisLink uses this security (known as SSL) throughout the site and all its sub-domains to make sure that your personal information is not accessible by anyone but yourself.

Physical security

Our servers are located at Amazon. All servers are protected by biometric locks and round-the-clock interior and exterior surveillance monitoring. Only authorized personnel have access to the data center. Our staff provides additional protection against unauthorized entry and security breaches.

Regularly-updated infrastructure

Our software infrastructure is updated regularly with the latest security patches. Our products run behind a firewall and are carefully monitored. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.

We protect your billing information

All credit card transactions are processed using secure encryption - the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network. We do not keep credit cards on our infrastructure in any way.

Vulnerability detection

We encourage our users and security experts to reach out to us regarding potential security vulnerabilities of IbisLink. Please refer to our Vulnerability Detection policy for details.