Data Privacy

GreenSlate and its subsidiaries are committed to safeguarding the personal information we collect.

User Profile

GreenSlate’s application is an “invite-only” system. Clients invite crew members and assign per-project permissions, so they may control exactly what each user may access and do.

Divisions

Divisions allow clients to control their crew’s access by department, employee classification, or any custom grouping.

Tracking and Approval History

Every change a user makes within the GreenSlate system is recorded for data integrity and auditing purposes. Digital forms utilize approval flows to gather sign-offs and signatures.

Disclosure of Client Content

GreenSlate does not disclose client content unless we’re required to do so to comply with the law or a valid and binding order of a government or regulatory body.

Cookies

GreenSlate application cookies never store any personally identifiable information and authentication information is encrypted

Data Retention

We configure data deletion settings to meet the needs and policies of our clients.

Business Continuity

GreenSlate ensures high-availability of all services by incorporating redundancy in every layer of the architecture to ensure our systems are resilient to any outages.

Distributed System

Our application is cloud-hosted and backed by both Amazon Web Services and Microsoft Azure.  Application usage is load-balanced across multiple geographic regions allowing for seamless avoidance of any localized outages and the enhancement of system resiliency.

Disaster Recovery

All files are hosted in S3, which provides automatic backups and an SLA guaranteeing 99.99% availability. Our application databases are protected against any data loss by continually mirroring to a separate environment, allowing real-time backups and near- zero downtime failover.

Incident Management

Our 24/7 monitoring allows us to proactively resolve any potential issues. Our clients can expect our customer service to be accessible at all times on all channels. Support is available 8 am – 9 pm EST with after-hours support via email or phone.

CYBER SECURITY

We continually refine our cyber security and password policies to enable us to maintain our defenses and enhance our threat resiliency.

Application

  • User activity audit reports
  • Malicious activity alerts
  • Permission-based access
  • Penetration testing
  • Static and dynamic application security testing

Environment

  • Secured facilities
  • Network firewalls
  • Intrusion detection
  • Network and system monitoring
  • Rigorous change management
  • Web Application Firewall (WAF)
  • Computer incidence response team

Data Transfers

GreenSlate encrypts all traffic between the end user and the application in multiple layers. We use SSL/TLS to encrypt transmitted data, which makes it impossible for an unauthorized third-party to decipher sensitive information.