Skip to content
Talk to Sales

    Data Privacy and Security

    Our application and platform are designed with stringent security protocols, which are independently verified to help ensure customer data is protected. We are SOC 2 Type 2 certified.

    Client Control

    GreenSlate’s application is an “invite-only” system. Clients invite crew members and assign per-project, role-based permissions, so they may control exactly what each user may access and do. This granular control extends to access by department, employee classification, or any custom grouping.

    1-3
    User Activity and Approvals

    Once enrolled within the GreenSlate system, user activity is logged for data integrity and auditing purposes. Clients define approval flows for their digital forms to gather sign-offs and signatures so that only authorized actions are taken.

    2-4
    Data Retention

    We configure data deletion settings to meet the needs and policies of our clients.

    3-4
    Client Content

    GreenSlate does not disclose client information unless we’re required to do so to comply with the law or a valid and binding order of a government or a regulatory body, or with authorization under our privacy policy. Our complete privacy policy is available on our website and describes the purposes for which we use personal information.

    Business Continuity

    GreenSlate ensures high availability of all services by incorporating redundancy
    in every layer of the architecture to ensure our systems are resilient to outages.

    4-1
    Distributed System

    Our application is cloud-hosted and backed by Amazon Web Services. Application usage is load-balanced allowing for protection against any localized outages and the enhancement of system resiliency.

    5-1
    Disaster Recovery

    All client files are hosted in the cloud which provides automatic backups and an SLA commitment to 99.99% availability. We take steps to protect application databases against interruption, such as continually mirroring to a separate environment, providing real-time backups and near- zero downtime failover.

    7-1
    Incident Management

    We monitor our systems to help ensure that we can detect and resolve any potential issues. Customer service support for our clients is available 9 am – 10 pm EST with after-hours support via email.

    Cyber Security

    Our cyber security program will continue to evolve to maintain our defenses and mitigate new threats. We will update this page periodically to reflect our practices. Some features of our application include but are not limited to:

    • Permission-based access rights for users
    • Data transfers encrypted (TLS)
    • Multi-factor Authentication
    • Password policies
    • Account lock-outs
    • CAPTCHA verifications
    • Secured facilities
    • Network security
    • Change management process
    • Web Application Firewall (WAF)
    • Content-delivery network
    • Advanced end-point protection
    • Computer incident response team

     

    See How GreenSlate Keeps Your Data Secure.

    Get SOC 2 Type 2 certified security with GreenSlate's all-in-one app. Schedule a demo today to experience our all-in-one app.

    See a Demo