Information Security Policy
CheckOP - SaaS Field Operations Management Platform
Last update: February 10, 2026
1. Introduction
This Information Security Policy describes the measures, controls and practices that Progresus S.A.S. (hereinafter "Progresus" or "we" or "us") implements to protect the information of CheckOP customers and users (hereinafter "the Service").
Security is a top priority for Progresus. We have invested in resources and controls designed to protect our customers' data and provide a reliable and secure service.
2. Security Objectives
CheckOP's security program is based on the following objectives:
2.1 Customer Trust and Protection.
To offer superior products and services while protecting the privacy and confidentiality of our customers' information.
2.2 Availability and Service Continuity
To ensure uninterrupted availability of Service and data to all authorized users by proactively reducing risks that threaten service continuity.
2.3 Information Integrity
Ensure that customer information is never corrupted or inappropriately altered, maintaining data accuracy and completeness.
2.4 Standards Compliance
Implement processes and controls aligned with international standards and industry best practices for cloud security.
3. Security Framework
3.1 Reference Standards
CheckOP has developed its security framework based on SaaS industry best practices, including:
- OWASP (Open Web Application Security Project) recommendations.
- Cloud security standards
- ISO 27001 principles as a reference
- Data protection best practices
3.2 Infrastructure Certifications
Our cloud infrastructure providers (Amazon Web Services and Google Cloud Platform) have the following certifications:
- SOC 2 Type II
- ISO 27001
- Additional compliance and security certifications
These certifications guarantee high standards of physical, environmental and infrastructure security in the data centers where CheckOP operates.
4. Data Center Security
4.1 Infrastructure Providers
CheckOP uses top-tier cloud infrastructure providers:
- Amazon Web Services (AWS): Instances located in the United States (us-east-1 region).
- Google Cloud Platform (GCP): Instances located in the United States.
Progresus does not host its product systems at its own corporate offices.
4.2 Physical Security
Our vendors' data centers implement:
- Restricted physical access through multiple layers of security.
- 24/7 surveillance and monitoring systems
- Biometric and card access control
- Physical and electronic intrusion protection
4.3 Infrastructure and Redundancy
- Minimum N+1 redundancy in power, networking, and HVAC services
- Uninterruptible Power Supply (UPS) systems
- Backup generators
- Redundant cooling systems
- Multiple and redundant network connectivity
5. Network Security
5.1 Perimeter Protection
CheckOP's infrastructure implements:
- Firewalls: Network-level access control lists using Virtual Private Cloud (VPC) security groups.
- Segmentation: Separation of networks using VPCs to isolate environments.
- Secure Routing: Enterprise-level traffic control
- Default Deny: All unauthorized traffic is automatically denied.
5.2 Network Access Control
- Fine-grained control of traffic from public networks
- Control of traffic between internal instances
- Complete logging of network traffic for monitoring purposes
- Protection at port and IP address level
5.3 DDoS Protection
CheckOP incorporates security measures against Distributed Denial of Service (DDoS) attacks, designed to ensure continuous availability of the Service.
6. Data Protection
6.1 Encryption in Transit
All communications with CheckOP are protected by:
- TLS (Transport Layer Security) versions 1.0, 1.1, 1.2 or 1.3.
- Encryption keys of 2048 bits or higher
- Regularly updated SSL/TLS certificates
Encryption in transit applies to:
- Authenticated user sessions
- API calls
- Login and authentication
- Data transfer between system components
6.2 Encryption at Rest
Stored data is protected by:
- AES-256 encryption for physical and virtualized hard disks
- Long-term storage encryption (AWS S3)
- Field or database level encryption for particularly sensitive information
- Secure key management via KMS (Key Management System)
6.3 Key Management
- Encryption keys stored in hardened key management systems
- Periodic key rotation according to type and level of confidentiality
- TLS certificates are renewed regularly
- Restricted key access according to the principle of least privilege.
7. Access Control
7.1 User Authentication
For Clients and End Users:
- Unique credentials (identifier and password) for each user.
- Password complexity requirements
- Prohibition of sharing access credentials
- Multi-factor authentication option when available.
For Progresus Employees:
- Industry-standard corporate password policy
- Change passwords at least every 90 days
- Minimum length of 8 characters with complexity requirements
- Multi-factor authentication for access to critical systems
- Unique SSH keys for server level authentication
7.2 Role Based Access Control (RBAC)
- Progresus employees gain access based on their job function
- Access strictly limited to job requirements
- Automated daily access review
- Semi-annual manual recertification of authorizations
7.3 Access to Customer Data
- Limited group of employees with authorized access to production data
- Limited access to technical support and troubleshooting functions
- Time-limited access requests
- Logging of all access to customer data
8. Application Security
8.1 Web Threat Protection
CheckOP implements automatic content protection by following:
- OWASP Top 10 recommendations
- Detection and blocking of malicious traffic
- Protection against SQL injection, XSS and other common vulnerabilities
- Data input validation
8.2 Secure Development
The CheckOP development process includes:
- Code review by specialized teams
- Quality checks at each stage of development
- Approval control by designated repository owners
- Continuous integration with automated testing
- Automatic rollback on error detection
8.3 Vulnerability Management
- Continuous vulnerability scanning against internal networks, applications and infrastructure
- Daily network-based and application level vulnerability scanning
- Static code analysis to detect security flaws
- Periodic penetration testing at application and network layers
- Continuous update of attack signatures
9. Monitoring and Logging
9.1 Activity Logs
CheckOP maintains logs of:
- User and administrator activity
- System accesses
- Data and configuration modifications
- Security events
- Network traffic
9.2 Security Monitoring
- Continuous monitoring of security events
- Automated alerts for anomalies
- Log review by security personnel
- Event correlation for threat detection
9.3 Traceability
CheckOP's History module allows customers to view, filter and download logs of all actions performed in the system, providing full traceability of activities.
10. Personnel Security
10.1 Background Checks
All Progresus employees undergo third-party background checks prior to receiving an offer of formal employment, where permitted by local laws. The check includes:
- Verification of previous employment
- Education verification
- Criminal background check
10.2 Confidentiality Agreements
All employees must comply with:
- Confidentiality agreements
- Acceptable use policy
- Information Protection Commitments
10.3 Security Training
Progresus maintains a written Information Security Policy and trains its employees on:
- Data processing requirements
- Privacy considerations
- Responding to security breaches
- Good security practices
11. Incident Management
11.1 Response Process
CheckOP provides business day coverage for responding to security and privacy events. The process includes:
- Detection: Identification of the incident through automated alerts, vendors, customer requests, or other means.
- Classification: Determining the type and severity of the incident
- Containment: Isolation of the problem to avoid further impact.
- Investigation: Analysis of the origin and scope of the incident
- Resolution: Implementation of solutions and restoration of service
- Communication: Notification to affected customers as appropriate
- Review: Post analysis to prevent recurrence
11.2 Incident Communication
- The security manager reviews all security-related incidents.
- Contact with affected customers via email or telephone
- Periodic updates during incident resolution
- Post-incident reports when appropriate
11.3 Breach Notification
In the event of a security breach affecting customer data, Progresus:
- Notify affected customers as required by applicable law.
- Provide information about the nature of the incident
- Describe measures taken to mitigate the impact
- Provide guidance on actions that customers can take
12. Business Continuity
12.1 Continuity Plans
Progresus has business continuity and disaster recovery plans focused on:
- Avoiding disruptions through redundancy
- Rapid recovery strategies
- Isolation and transparent problem resolution
12.2 Infrastructure Redundancy
- Distribution of instances across multiple availability zones
- Web, application and database components with minimum N+1 redundancy
- Real-time data replication
12.3 Backup Strategy
- Daily database backups
- Minimum seven-day retention of recoverable copies
- Distributed on-premises storage (AWS S3)
- Real-time replication for immediate protection
- Copy protection with database security and access controls
12.4 System Recovery
- Continuous validation of recovery processes
- Continuous implementation allowing daily practice of procedures
- Reversion capability in case of detected errors
- Recovery target time defined in the SLA
13. API Security
13.1 API Authentication
Access to the CheckOP API is controlled by:
- API key authorization for prototypes and custom integrations.
- OAuth 2.0 for production authentication and authorization
- Mandatory OAuth for official integrations
- Defined scopes for request authorization
13.2 Detailed Permissions
Customers can assign granular permissions for their accounts and restrict access to features and data as needed.
14. Customer Responsibilities
14.1 Credential Security
Customer is responsible for:
- Maintaining the confidentiality of their login credentials.
- Not sharing credentials between users
- Immediately notifying any suspected unauthorized use
- Using strong and unique passwords
14.2 Device Security
For mobile application users:
- Keep devices secure and up to date
- Use authorized devices according to account settings
- Protect devices with password or biometrics
- Report lost or stolen devices
14.3 Appropriate Use
The customer must:
- Not upload unauthorized sensitive information
- Comply with acceptable use policies
- Report detected security vulnerabilities or incidents
- Maintain updated security settings for your account
15. Security Contact
To report security incidents, vulnerabilities or security-related inquiries:
Progresus S.A.S.
- E-mail: soporte@checkop.co
- Support Portal: https://support.checkop.co
Notifications of possible vulnerabilities will be treated with priority and confidentiality.
16. Updates to this Policy
This Information Security Policy may be updated periodically to reflect improvements in our security practices or changes in the threat environment.
Important updates will be communicated to customers through appropriate channels.
This Information Security Policy reflects CheckOP's current practices. Protective measures are constantly being improved, and the information contained in this document is not intended to create additional contractual obligations beyond those set forth in the Terms and Conditions of Service.