Security & Compliance
Your data security is our top priority. We implement industry-leading security practices to protect your information.
Enterprise-Grade Security
We employ multiple layers of security to ensure your data remains safe and accessible only to authorized users.
Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
Access Controls
Role-based access control (RBAC) ensures users only access data they need.
Secure Infrastructure
Hosted on enterprise-grade cloud infrastructure with 24/7 monitoring.
Audit Logs
Comprehensive logging of all system activities for security and compliance.
Threat Detection
Advanced monitoring and alerting for suspicious activities and potential threats.
Regular Audits
Annual third-party security audits and penetration testing.
Secure Infrastructure
99.9% Uptime SLA
Guaranteed service availability with automatic failover and redundancy
Daily Backups
Automated daily backups with 30-day retention and point-in-time recovery
DDoS Protection
Advanced protection against distributed denial-of-service attacks
Compliance & Certifications
We maintain rigorous compliance standards to meet regulatory requirements and industry best practices.
PIPEDA Compliant
PendingCompliant with Canadian privacy legislation
SOC 2 Type II
PendingIndependently verified security, availability, and confidentiality controls
ISO 27001
PendingInternational standard for information security management
GDPR Compliant
PendingFull compliance with European data protection regulations
Our Security Practices
Data Encryption
All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest and most secure encryption protocol. Data stored in our databases is encrypted at rest using AES-256 encryption, the same standard used by banks and government agencies.
Access Management
We implement role-based access control (RBAC) to ensure users only access data necessary for their job functions. Multi-factor authentication (MFA) is available for all accounts and required for administrative access. All access attempts are logged and monitored.
Security Monitoring
Our security operations center monitors systems 24/7 for unusual activity, potential threats, and security incidents. Automated alerts notify our team of suspicious behavior, enabling rapid response to potential security issues.
Incident Response
We maintain a comprehensive incident response plan and conduct regular drills to ensure our team is prepared to respond quickly and effectively to any security incidents. In the event of a data breach, we will notify affected customers within 72 hours.
Employee Training
All employees undergo security awareness training and must follow strict security protocols. Access to customer data is limited to essential personnel and requires approval. Background checks are conducted on all employees with data access.
Third-Party Security
We carefully vet all third-party vendors and require them to meet our security standards. Vendor access is monitored and limited to only what is necessary for service delivery. All vendor agreements include strict data protection clauses.
Responsible Disclosure
We welcome reports of security vulnerabilities. If you believe you've discovered a security issue, please contact our security team immediately.
Security Contact: security@mydispatchhub.com
Please do not publicly disclose security vulnerabilities until we've had a chance to address them. We commit to responding to security reports within 48 hours.
Questions About Security?
Our team is happy to answer any questions about our security practices and compliance.