Vivgram logoVivgramBack to Home

Data Privacy & Security

Last Updated: March 31, 2026

How we protect your research data through encryption, isolation, and enterprise-grade cloud infrastructure.

1.Introduction

At Vivgram, we understand that your research data is sensitive and valuable. This document outlines how we protect your data through our cloud-based infrastructure, encryption practices, and data isolation measures. Our commitment is to ensure your data remains secure, private, and accessible only to authorized users within your organization.

2.Cloud-Based Infrastructure

2.1 No Local Data Storage

Vivgram operates on a strict cloud-only architecture. This means:

  • No customer data is ever stored on local devices or on-premises servers
  • No data resides on employee workstations or portable devices
  • All data is stored exclusively in secure, enterprise-grade cloud infrastructure
  • Access to data requires authentication through our cloud platform

2.2 Hyperscaler Cloud Platform

Vivgram is hosted on DigitalOcean, a leading cloud infrastructure provider trusted by millions of businesses worldwide. Our infrastructure benefits from:

  • Enterprise-grade data centers with physical security controls
  • Redundant power, cooling, and network connectivity
  • 24/7 infrastructure monitoring and incident response
  • Regular third-party security audits and assessments
  • Global data center presence with regional data residency options

2.3 Network Security

Our cloud infrastructure includes multiple layers of network protection:

Virtual Private Cloud (VPC): Isolated network environment with private IP addressing
Cloud Firewalls: Network-based stateful firewall blocking unauthorized traffic by default
DDoS Protection: Automatic protection against distributed denial-of-service attacks
Intrusion Detection: Continuous monitoring for suspicious network activity

3.Data Encryption

All customer data in Vivgram is encrypted both at rest and in transit using industry-standard encryption protocols.

3.1 Encryption at Rest

All data stored in our systems is encrypted using strong encryption standards:

Database Encryption: All database clusters use full-volume encryption with randomly generated keys per instance
Storage Encryption: Block storage volumes are encrypted using AES-256 encryption
Backup Encryption: All backups are encrypted with AES-256 encryption with integrity protection
Key Management: Encryption keys are securely managed and never stored alongside encrypted data

3.2 Encryption in Transit

All data transmissions are protected using modern encryption protocols:

TLS Encryption: All data transmissions use Transport Layer Security (TLS) 1.2 or higher
HTTPS Only: All web interfaces and API endpoints enforce HTTPS connections
Certificate Management: SSL/TLS certificates are automatically managed and renewed
Internal Encryption: All internal service-to-service communications are encrypted

At Rest

AES-256

Full-volume encryption

In Transit

TLS 1.2+

HTTPS enforced

4.Customer Data Isolation

4.1 Multi-Tenant Security

Complete Data Segregation — Vivgram uses a multi-tenant architecture with strict data isolation between customers. Each customer's data is completely segregated from other customers, ensuring there is no possibility of data leakage or cross-tenant access.

4.2 Isolation Methods

We implement data isolation at multiple levels:

Database Segregation: Each customer has dedicated database schemas with strict access controls preventing any cross-customer data access
Application-Level Isolation: Tenant identification is enforced at every layer of the application stack
Network Segmentation: Customer workloads operate within isolated network segments
Access Control Lists: Fine-grained permissions ensure users can only access data within their organization

4.3 Data Segregation Verification

Our data isolation measures are verified through:

  • Automated testing during development and deployment
  • Regular code reviews focusing on tenant isolation
  • Periodic security assessments and penetration testing
  • Comprehensive access logging and monitoring

5.Access Control

5.1 Authentication

Vivgram implements robust authentication mechanisms:

Secure Password Storage: Passwords are hashed using industry-standard algorithms
Multi-Factor Authentication: Optional MFA support for enhanced account security
Session Management: Secure session handling with automatic timeout
Single Sign-On: Enterprise SSO integration available for institutional customers

5.2 Role-Based Access Control

Access to data within Vivgram is controlled through role-based permissions:

  • Users are granted only the minimum permissions necessary for their role
  • Institutional administrators manage user access and permissions
  • All access and changes are logged for audit purposes
  • Regular access reviews can be performed by administrators

6.Data Retention and Deletion

6.1 Data Retention

Vivgram retains customer data for the duration of the service agreement. Specific retention periods may vary based on:

  • Contractual requirements with your institution
  • Applicable legal and regulatory requirements
  • Research data preservation requirements

6.2 Data Deletion

Upon termination of services or upon request:

Data TypeTimeline
Active DataDeleted within 30 days of account deactivation
BackupsPurged from backup systems within 90 days
Export OptionAvailable before account termination
ConfirmationDeletion confirmation provided upon request

7.Security Monitoring

7.1 Continuous Monitoring

Our infrastructure is continuously monitored for security threats:

  • 24/7 automated security monitoring and alerting
  • Intrusion detection and prevention systems
  • Regular vulnerability scanning
  • Log aggregation and analysis for anomaly detection

7.2 Incident Response

In the event of a security incident:

  • Customers will be notified within 48 hours of confirmed data breaches affecting their data
  • Notifications will be sent via registered email addresses
  • Incident reports will include scope, impact, and remediation actions
48-Hour Notification — We are committed to notifying affected customers within 48 hours of any confirmed data breach, with full transparency on scope, impact, and remediation actions taken.

8.Your Responsibilities

While we implement comprehensive security measures, customers also play a role in data security:

  • Maintain strong, unique passwords for user accounts
  • Enable multi-factor authentication when available
  • Promptly report any suspected security issues
  • Manage user access appropriately within your organization
  • Keep your contact information up to date for security notifications

9.Infrastructure Provider

Our cloud infrastructure is provided by DigitalOcean. For more information about their security practices, you can visit:

10.Contact Us

If you have questions about our data privacy and security practices, or to report a security concern:

Support

info@teamitekllc.com

Company

Team iTek LLC

Address

7300 State Highway, Suite #300, McKinney, TX 75070

Security First — At Vivgram, security is not an afterthought. It is built into every layer of our platform, from infrastructure to application to operations. Your research data deserves nothing less.