Our users trust us and That’s a responsibility we hold from our side to fullfill and we take it seriously.
At CryptX, we maintain a security system that:
- Prevents all unauthorized access;
- Continuous monitoring for potential vulnerabilities
- Proactive improvement to stay on top of the latest security tools and threats.
All user data including names, uploaded files, account information,
and payment information are sent using SSL/HTTPS secure channels with a bank standard
We use Amazon Web Services (AWS) servers to host all user data. We make extensive use of their built-in firewalls to protect your data against unauthorized remote access.
All user data are stored and encrypted at rest (when not in use).
AWS data centers undergo annual certifications to ensure they meet the highest standards of physical and virtual security. You can find more information on AWS security practices at http://aws.amazon.com/security/.
All data included in cloud storage attachments (such as Dropbox, Google Drive and One Drive) remain on their comany servers and are covered by their respective security policies and practices. We are not responsible for any data breach or loss with files uploaded to Dropbox and Google Drive.
All user data are automatically backed up on AWS servers with multiple redundant copies, to ensure there is no loss of data.
We verify account access through both email/password based authentication and Google Accounts authentication via OAuth 2.0.
When email/password based authentication is used, we always store individuals passwords with unique identifer and encryption to add an extra layer of protection to your account.
Alternatively, OAuth provides a seamless way to create and access your account without CryptX ever needing to access or store your account login credentials.
At CryptX, we understand the importance of your business data and information. We have strict control over internal personnel's access to your data and information. We are committed to ensuring that your data and information is not accessible to anyone who is not authorized by our Customers. At an event of software service, some of our developers may need to access your data for troubleshooting and performing diagnosis. These developers are under strict supervision and cannot access your data unless deemed necessary and authorized by our Customer.