Security and Integrity
We protect your data with the highest standards in the industry.
Secure Infrastructure
- 100% hosted on Amazon Web Services
- State-of-the-art Graviton architecture
- Ubuntu servers in multiple zones
- N+1 Redundancy in all services
- No on-premise servers
Access Control
- Role-based control (RBAC)
- Granular permissions per user
- Comprehensive audit logs
- Automated daily access review
- Manual recertification every 6 months
Data Protection
- Encryption in transit (TLS 1.2, 1.3)
- Encryption at rest (AES-256)
- Secure hashed passwords
- Daily backups with 7-day retention
- Real-time database replication
24/7 Monitoring
- 24/7 monitoring with Amazon CloudWatch
- Automatic anomaly detection
- Real-time alerts to the technical team
Reliable infrastructure
We operate on world-class suppliers with the most demanding certifications in the industry.
Infrastructure Provider
Amazon Web Services (AWS)
Data Location
United States (us-east-1)
Availability
99.95% - 100%
SOC 2 Type II
Our AWS infrastructure is audited annually for security, availability and confidentiality controls.
ISO 27001
AWS maintains information security management system certification, audited by independent third parties.
OWASP Protection
We implement protections following OWASP Top 10 recommendations and measures against DDoS attacks.
High Availability
N+1 redundancy in all services, multiple availability zones and automatic load balancing.
Security Practices
Comprehensive security at every level of our operation.
For your company
Role-based access control
Strong password policies
Configurable granular permissions
Complete audit logs
Session management
For your Data
Encryption in transit and at rest
Redundant daily backups
Real-time replication
Export at any time
Guaranteed elimination upon cancellation
For Our Team
Security training
Background check
Confidentiality agreements (NDA)
Principle of least privilege
Privacy and Control
Your data, your rules
Our Commitment
Your data is your property
We never sell your information
We do not do data mining
Total transparency in the use
Legal Documents
Your rights
Export your data whenever you want
Request account deletion
Knowing what information we have
Correct incorrect data
Withdraw consent
Frequently asked questions from our customers
Where is my data stored?
All your data is stored in Amazon Web Services (AWS) in the United States, specifically in the us-east-1 region with distribution in multiple availability zones. We use Ubuntu servers with AWS Graviton architecture. We do not maintain physical servers in our own facilities.
How do you protect my information?
We apply encryption at all layers. Communications use TLS 1.2 and 1.3 with 2048 bit keys. Stored data is protected with AES-256. Passwords are never stored in plain text, we always use secure hash algorithms.
What happens to my data if I cancel my subscription?
As an active customer you can export your information at any time. If you cancel, we keep your data for 90 days in case you change your mind. After that period, it is deleted from our production databases. You can also request early deletion in writing.
Who can see my information within CheckOP?
We implement role-based access control (RBAC). Only authorized personnel according to their role can access production data. Permissions are automatically reviewed daily and manually every 6 months. Our entire team signs confidentiality agreements.
How available is the service?
We guarantee availability between 99.95% and 100%. We operate with N+1 redundancy in all critical components: servers, database and storage. If any component fails, another one automatically takes over without affecting your operation.
How do you back up my information?
We maintain multiple layers of backup: real-time database replication, daily backups with 7-day retention, and Amazon S3 file storage distributed across multiple zones. Everything is designed for rapid recovery to any eventuality.
Do you perform safety tests?
Yes, continuously. Every code update goes through security analysis before it goes to production.
How will I know if a security incident occurs?
We have an incident response team. If something happens that affects your information, we contact you directly by mail or phone. We let you know what happened, the extent of the impact and the actions we are taking. We maintain communication until the incident is completely resolved.
You still need help
Didn't find what you were looking for? Our team can help you.
¿Esta información te fue útil?
Para nosostros es importante conocer tu opinión.