1.Introduction
At Vivgram, we understand that your research data is sensitive and valuable. This document outlines how we protect your data through our cloud-based infrastructure, encryption practices, and data isolation measures. Our commitment is to ensure your data remains secure, private, and accessible only to authorized users within your organization.
2.Cloud-Based Infrastructure
2.1 No Local Data Storage
Vivgram operates on a strict cloud-only architecture. This means:
- No customer data is ever stored on local devices or on-premises servers
- No data resides on employee workstations or portable devices
- All data is stored exclusively in secure, enterprise-grade cloud infrastructure
- Access to data requires authentication through our cloud platform
2.2 Hyperscaler Cloud Platform
Vivgram is hosted on DigitalOcean, a leading cloud infrastructure provider trusted by millions of businesses worldwide. Our infrastructure benefits from:
- Enterprise-grade data centers with physical security controls
- Redundant power, cooling, and network connectivity
- 24/7 infrastructure monitoring and incident response
- Regular third-party security audits and assessments
- Global data center presence with regional data residency options
2.3 Network Security
Our cloud infrastructure includes multiple layers of network protection:
3.Data Encryption
All customer data in Vivgram is encrypted both at rest and in transit using industry-standard encryption protocols.
3.1 Encryption at Rest
All data stored in our systems is encrypted using strong encryption standards:
3.2 Encryption in Transit
All data transmissions are protected using modern encryption protocols:
At Rest
AES-256
Full-volume encryption
In Transit
TLS 1.2+
HTTPS enforced
4.Customer Data Isolation
4.1 Multi-Tenant Security
4.2 Isolation Methods
We implement data isolation at multiple levels:
4.3 Data Segregation Verification
Our data isolation measures are verified through:
- Automated testing during development and deployment
- Regular code reviews focusing on tenant isolation
- Periodic security assessments and penetration testing
- Comprehensive access logging and monitoring
5.Access Control
5.1 Authentication
Vivgram implements robust authentication mechanisms:
5.2 Role-Based Access Control
Access to data within Vivgram is controlled through role-based permissions:
- Users are granted only the minimum permissions necessary for their role
- Institutional administrators manage user access and permissions
- All access and changes are logged for audit purposes
- Regular access reviews can be performed by administrators
6.Data Retention and Deletion
6.1 Data Retention
Vivgram retains customer data for the duration of the service agreement. Specific retention periods may vary based on:
- Contractual requirements with your institution
- Applicable legal and regulatory requirements
- Research data preservation requirements
6.2 Data Deletion
Upon termination of services or upon request:
7.Security Monitoring
7.1 Continuous Monitoring
Our infrastructure is continuously monitored for security threats:
- 24/7 automated security monitoring and alerting
- Intrusion detection and prevention systems
- Regular vulnerability scanning
- Log aggregation and analysis for anomaly detection
7.2 Incident Response
In the event of a security incident:
- Customers will be notified within 48 hours of confirmed data breaches affecting their data
- Notifications will be sent via registered email addresses
- Incident reports will include scope, impact, and remediation actions
8.Your Responsibilities
While we implement comprehensive security measures, customers also play a role in data security:
- Maintain strong, unique passwords for user accounts
- Enable multi-factor authentication when available
- Promptly report any suspected security issues
- Manage user access appropriately within your organization
- Keep your contact information up to date for security notifications
9.Infrastructure Provider
Our cloud infrastructure is provided by DigitalOcean. For more information about their security practices, you can visit:
10.Contact Us
If you have questions about our data privacy and security practices, or to report a security concern:
Support
info@teamitekllc.com
Company
Team iTek LLC
Address
7300 State Highway, Suite #300, McKinney, TX 75070