Client Control

GreenSlate’s application is an “invite-only” system. Clients invite crew members and assign per-project, role-based permissions, so they may control exactly what each user may access and do. This granular control extends to access by department, employee classification, or any custom grouping.

User Activity and Approvals

Once enrolled within the GreenSlate system, user activity is logged for data integrity and auditing purposes.

Clients define approval flows for their digital forms to gather sign-offs and signatures so that only authorized actions are taken.

Data Retention

We configure data deletion settings to meet the needs and policies of our clients.

Client Content

GreenSlate does not disclose client information unless we’re required to do so to comply with the law or a valid and binding order of a government or a regulatory body, or with authorization under our privacy policy. Our complete privacy policy is available on our website and describes the purposes for which we use personal information.

Business Continuity

GreenSlate ensures high availability of all services by incorporating redundancy in every layer of the architecture to ensure our systems are resilient to outages.

Distributed System

Our application is cloud-hosted and backed by Amazon Web Services.  Application usage is load-balanced allowing for protection against any localized outages and the enhancement of system resiliency.

Disaster Recovery

All client files are hosted in the cloud which provides automatic backups and an SLA commitment to 99.99% availability. We take steps to protect application databases against interruption, such as continually mirroring to a separate environment, providing real-time backups and near- zero downtime failover.

Incident Management

We monitor our systems to help ensure that we can detect and resolve any potential issues. Customer service support for our clients is available 9 am – 10 pm EST with after-hours support via email.

Cyber Security

Our cyber security program will continue to evolve to maintain our defenses and mitigate new threats. We will update this page periodically to reflect our practices. Some features of our application include but are not limited to:

  • Permission-based access rights for users
  • Data transfers encrypted (TLS)
  • Multi-factor Authentication
  • Password policies
  • Account lock-outs

  • CAPTCHA verifications
  • Secured facilities
  • Network security
  • Change management process

  • Web Application Firewall (WAF)
  • Content-delivery network
  • Advanced end-point protection
  • Computer incident response team