Data Security Policy
Updated July 5th, 2021
At En-Gage Applications, LLC, we take the security of your data very seriously.
If you have questions regarding security that are not addressed in this document please contact us at [email protected] and we will respond as quickly as we can. Or you can submit a ticket from our Help Center, information at the bottom of this page.
Confidentiality
We place strict controls over our employees’ access to the data you and your users make available via the En-Gage Platform, as more specifically defined in your agreement with En-Gage covering the use of the En-Gage services (“Terms of Service”). The operation of the En-Gage services requires that some employees have access to the systems which store and process Customer Data. For example, in order to diagnose a problem you are having with the En-Gage services, we may need to access your Customer Data. These employees are prohibited from using these permissions to view Customer Data unless it is necessary to do so. We have technical controls and audit policies in place to ensure that any access to Customer Data is logged.
All of our employees and contract personnel are bound to our policies regarding Customer Data and CJIS content and we treat these issues as matters of the highest importance within En-Gage Applications, LLC.
Personnel Practices
En-Gage conducts CJIS compliant background checks on all employees with access to En-Gage code or Customer data. Employees also receive privacy and security training prior to accessing any code or data in addition to ongoing training. All employees are required to read and sign our comprehensive information security policy covering the security, availability, and confidentiality of the En-Gage services.
Compliance
The following security-related audits and certifications are applicable to the En-Gage services:
- CJIS: We follow CJIS for data in transit and at rest, including transfer over FFIPS compliant connection and military-grade (AES256) encryption for data at rest.
En-Gage hosts with AWS GOVCLOUD (US). Regions are subject to FedRAMP High and Moderate baselines, and allow customers to host sensitive Controlled Unclassified Information (CUI) and all types of regulated workloads. See: https://aws.amazon.com/security/
Data Protection Roles and Responsibilities
Data protection roles and responsibilities are summarized from the “CJIS Companion Document” and CJIS Security Policy V5.8
Security Features for Executive Level Users
In addition to the work we do at the infrastructure level, we provide Executive Level Users of En-Gage services with additional tools to enable their users to protect their own Data.
Access Logging
Detailed access logs are available both to users and Executive Level Users. We log every time an account signs in, noting the type of device used and the IP address of the connection.
Executives Level Users can review consolidated access logs for their whole team. Executives Level Users control access to Agency data.
Users can remotely terminate all connections and sign out all devices authenticated to the En-Gage services at any time, on-demand.
Unique Access Code
Each Customer’s user is assigned a Unique Access Code which is under their care and control for verification upon the first login to the system. Once the Customer adds user the access code is automatically generated by the En-Gage Platform. After the first login user will be prompted to enter a personal password. After every login from this point forward the system will send an access code for login confirmation. Two-Factor authentication.
Two-Factor authentication is required for all users of the En-Gage services.
Data Retention
All data entered into the En-Gage system by Users is retained indefinitely until deletion is formally requested by the Agency or upon the termination of the Agency’s service.
Return of Customer Data
All Customer data is the property of the Customer and can be audited, downloaded, and stored on Agency servers by the Customer at any time. Data is transmitted using FIPS cryptography.
Data Encryption In Transit and At Rest
En-Gage supports FIPS-compliant cryptography (140-2) for data in transit and Advanced Encryption Standards (AES256) – at a minimum – for data at rest. Internally all data is transmitted via TLS between services on our network.
Availability
We understand that you rely on the En-Gage services to work. We’re committed to making En-Gage a highly available service that you can count on. Our infrastructure runs on systems that are fault-tolerant, for failures of individual servers or even entire data centers. Our operations team tests disaster-recovery measures regularly and staffs an around-the-clock on-call team to quickly resolve unexpected incidents.
For additional information on availability, please refer to the “Service Level Agreement” on our website.
Disaster Recovery
Customer Data is stored redundantly at multiple locations in our hosting provider’s data centers to ensure availability. We have well-tested backup and restoration procedures, which allow recovery from a major disaster. Customer Data and our source code are automatically backed up nightly. The Operations team is alerted in case of a failure with this system. Backups are fully tested at least every 90 days to confirm that our processes and tools work as expected.
Network Protection
In addition to sophisticated system monitoring and logging, we have implemented two-factor authentication for all server access across our production environment. Firewalls are configured according to industry best practices and unnecessary ports are blocked by configuration with AWS Security Groups.
Host Management
We perform automated vulnerability scans on our production hosts and remediate any findings that present a risk to our environment. We enforce screens lockouts for company laptops.
Logging
En-Gage maintains an extensive, centralized logging environment in its production environment which contains information pertaining to security, monitoring, availability, access, and other metrics about the En-Gage services. These logs are analyzed for security events via automated monitoring software, overseen by the security team.
Incident Management & Response
In the event of a security breach, En-Gage will promptly notify you of any unauthorized access to your Customer Data. En-Gage has incident management policies and procedures in place to handle such an event.
Product Security Practices
New features, functionality, and design changes go through a security review process facilitated by the security team. In addition, our code is audited with automated static analysis software, tested, and manually peer-reviewed prior to being deployed to production. The security team works closely with development teams to resolve any additional security concerns that may arise during development.
*En-Gage services backups are destroyed within 30 days, except that during an ongoing investigation of an incident such period may be temporarily extended.
PDF of Data Security Policy