Bookmark and Share

Privacy Policy

Nothing is more important than the security and privacy of your data. We utilize industry leading security processes and technology to ensure your data is protected and available for your business needs. Industry standard products and processes support all security processes and technology – from recognized, proven market leaders. We envelope your data and user account with 256-bit encryption Secure Socket Layer (SSL) technology from GeoTrust.

Physical Security

Our 24/7/365, multi-level physical security ensures that no unauthorized personnel access the Data Center. The building, floor-level and computer room access security measures are in place. Other security measures include, but not limited to closed-circuit cameras and network/server monitoring.

Environmental Controls

We utilize innovative fire detection, suppression and HVAC equipment to maintain and protect the proper environ
mental controls in the Data Center.

Network Access Security & Intrusion Detection

Remote access is controlled through state-of-the-art firewall’s. In addition, we utilize industry-leading network switches and routers enabling the implementation of VLANs (virtual LANs) to further enhance security.

Secure Private Servers offers you a secure and private database server for ironclad protection. Only authorized users have access to your applications environment.

Operating System Hardening

Operating System “hardening” removes all non-essential services and functions, limiting the number of possible entry points for unauthorized access.

Application & Database Security

Every security feature embedded in an application and database is used to implement your company’s access control policy, regulating access all the way down to the IP address level.

Access Control

We establish an access control policy, limiting access to only those users and those functions required to support your business needs.


Authentication ensures that the customer-specific access control policies are enforced, and that only users with the proper authentication gain access to your managed application resources.

Virus Security

Keeping up to date with virus monitoring is critical to data security and has a proven, industry leading virus protection technology. This service keeps us up-to-date with the latest virus definition files and scanning engines for on-going protection.

Logging & Auditing

We maintain all historical user account profile, access control, and authentication information and policies to support your audit requirements.

Disaster Recovery

Full disaster recovery services are available including off-site storage of data back-ups at alternate processing centers. Your business is back to full operation within 24 hours of a declared disaster.


Information contained herein is that of, a division of Collard Investigations Internationale, LLC and should not be construed as legal advice or a legal opinion on any specific facts or circumstances. The contents are intended for general information purposes only, and you are urged to consult a lawyer concerning your own situation and any specific legal questions you may have.