Security
Our Commitment to Security
At Prolixis, security is a top priority. We are committed to protecting your data and ensuring the integrity of our systems. Our security practices are designed to provide a high level of protection for your information and our services.
Security Measures
We implement a variety of security measures to maintain the safety of your information:
Data Encryption
All data transmitted between your browser and our servers is encrypted using industry-standard TLS/SSL protocols. Data at rest is also encrypted using AES-256 encryption.
Access Controls
We implement strict access controls to ensure that only authorized personnel can access sensitive systems and data. We follow the principle of least privilege, granting access only to the resources necessary for job functions.
Regular Security Audits
We conduct regular security audits and vulnerability assessments to identify and address potential security issues before they can be exploited.
Secure Development Practices
Our development team follows secure coding practices and conducts code reviews to identify and fix security vulnerabilities early in the development process.
Compliance
We are committed to complying with relevant security standards and regulations, including:
- GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- SOC 2 (Service Organization Control 2)
- ISO 27001 (Information Security Management)
Incident Response
We have a comprehensive incident response plan in place to quickly address any security incidents. Our team is trained to identify, contain, and remediate security issues promptly.
Reporting Security Issues
If you discover a security vulnerability or have concerns about the security of our services, please contact us immediately at security@prolixis.com.
Security Best Practices
We recommend the following security best practices for our users:
- Use strong, unique passwords for your Prolixis account
- Enable two-factor authentication when available
- Keep your devices and software up to date
- Be cautious of phishing attempts and suspicious emails
- Log out of your account when using shared devices
Last updated: April 2025