Security
Valstorm LLC is committed to ensuring the security of your data. We employ a variety of security measures to protect your information from unauthorized access, use, or disclosure. Our security practices include:
- Data Encryption: All sensitive data is encrypted both in transit and at rest using industry-standard encryption protocols.
- Access Controls: We implement strict access controls to ensure that only authorized personnel have access to your data.
- Regular Audits: We conduct regular security audits and vulnerability assessments to identify and mitigate potential risks.
- Compliance: We comply with relevant data protection regulations and standards, including GDPR, CCPA, and HIPAA where applicable.
- Employee Training: Our employees undergo regular training on data security best practices and policies.
Access controls
Valstorm has 3 levels of access control
- RBAC (Role Based Access Control) - This is the first layer to control access to Create Read Update and Delete (CRUD) data on objects. This is done through Profiles and Permission Sets.
- Role Hierarchy - This is the second layer to control access to data. This is done through the Role Hierarchy. Users at higher roles can see data owned by users at lower roles. Teams can also specify whether they share data with their team or not.
- Sharing - This is the third layer to control access to data. Users can provide access to specific records to other users or groups of users. This is done through manual sharing or automated sharing.
Data Backup and Recovery
We perform regular backups of your data to ensure that it can be restored in the event of data loss or corruption. Our backup processes are designed to minimize downtime and ensure data integrity. Your data will be backed up weekly unless you have a packaged offering that includes daily backups. Contact sales for more information.
Our Commitment to Security
We prioritize the security of our customers' data and our platform. Our Incident Response Plan is designed to be a comprehensive and agile framework that allows us to effectively identify, contain, and remediate security incidents while maintaining clear and transparent communication with our users.