Data Privacy and Security
Our application and platform are designed with stringent security protocols, which are independently verified to help ensure customer data is protected. We are SOC 2 Type 2 certified.
Client Control
GreenSlate’s application is an “invite-only” system. Clients invite crew members and assign per-project, role-based permissions, so they may control exactly what each user may access and do. This granular control extends to access by department, employee classification, or any custom grouping.
User Activity and Approvals
Once enrolled within the GreenSlate system, user activity is logged for data integrity and auditing purposes. Clients define approval flows for their digital forms to gather sign-offs and signatures so that only authorized actions are taken.
Data Retention
We configure data deletion settings to meet the needs and policies of our clients.
Client Content
GreenSlate does not disclose client information unless we’re required to do so to comply with the law or a valid and binding order of a government or a regulatory body, or with authorization under our privacy policy. Our complete privacy policy is available on our website and describes the purposes for which we use personal information.
Business Continuity
GreenSlate ensures high availability of all services by incorporating redundancy
in every layer of the architecture to ensure our systems are resilient to outages.
Distributed System
Our application is cloud-hosted and backed by Amazon Web Services. Application usage is load-balanced allowing for protection against any localized outages and the enhancement of system resiliency.
Disaster Recovery
All client files are hosted in the cloud which provides automatic backups and an SLA commitment to 99.99% availability. We take steps to protect application databases against interruption, such as continually mirroring to a separate environment, providing real-time backups and near- zero downtime failover.
Incident Management
We monitor our systems to help ensure that we can detect and resolve any potential issues. Customer service support for our clients is available 9 am – 10 pm EST with after-hours support via email.
Cyber Security
Our cyber security program will continue to evolve to maintain our defenses and mitigate new threats. We will update this page periodically to reflect our practices. Some features of our application include but are not limited to:
|
|
|