Security & Privacy Fact Sheet

Our commitment to protecting your data and systems

Company

  • Over 45 years in the Electronic Security Industry, since 1975
  • Federal & State Background Checks for every Employee
  • Data Protection Officer contact support@connectedtechnologies.us

Data Privacy & Processing

  • Connected Technologies has a contractual obligation to dealer and dealer's customer pursuant to the Connect ONE Dealer Agreement section 4.1 to process dealer's customer user data which contains transactional activity records and intrusion passcode & access card identification in order to provide Connect ONE services.
  • Connected Technologies does not recommend any user configurable data fields are used for financial, medical, or other personally identifiable information other than intrusion passcode and access control card identification.
  • Connected Technologies does not collect, retain, or process any biometric data from any connected system including access control readers and cameras.
  • Connected Technologies maintains a privacy policy.
  • Connected Technologies maintains a vulnerability policy.
  • The user has the ability to delete their personal data which includes intrusion passcode and access control card identification. The user's transactional activity records will automatically be removed after one year.

Management Interface

  • 100% Cloud-Hosted, No Middleware
  • High-grade 256-Bit AES Encryption via TLS (Transport Layer Security)
  • 3-Factor Identification [Username, Password, Customer Number] (Required)
  • 2-Factor Authentication [Login, Device] (Optional)
  • Brute Force Protection with Automatic Captcha required after 3 failed attempts, Login Exhaustion after 10 failed attempts
  • Common Permissions for each Interface (Desktop Site, Mobile Site, and Mobile App)
  • User Input Filtering/Validation (XSS/CSRF Protection)
  • Form Manipulation Protection
  • Parameterized Database Queries (SQL Injection Protection)
  • Secure Session Fixation/Hijack Protection

Operating Systems

  • Secure UNIX Operating Systems
  • Strict Policies for Immediate Patching of Security Updates
  • Address space layout randomization
  • ProPolice stack protection
  • Writeable XOR executable memory protection

Network Architecture

  • Top-Tier US Data Center Providers
  • Designated Entry/Exit Points
  • Secure Stateful Firewall Filtering
  • Database Separation from Public Internet
  • Encryption of sensitive data at rest and in transit
  • Automatic Geographic Redundancy