Security Commitments Statement
At keycentrix, we prioritize the security of your information as one of our key responsibilities. We believe that the security of your information is not an afterthought, but a fundamental aspect that underpins every decision we make and every action we take.
- Secure Infrastructure: Our products and services are built on top of highly secure, cutting-edge technology platforms that meet the highest industry standards and regulations. We regularly conduct security audits, vulnerability scans, and penetration testing to ensure the reliability and robustness of our infrastructure.
- Data Protection: We employ advanced encryption techniques and access controls to protect your data, both at rest and in transit. We work tirelessly to mitigate any risks associated with unauthorized access, modification, disclosure, or destruction.
- Data at Rest Security: We understand the importance of safeguarding data even when it’s not actively in use. Our “Data at Rest” security measures encompass various strategies to protect sensitive information stored within our systems:
- Encryption: All data at rest within our systems is encrypted using industry-standard encryption algorithms.
- Access Controls: Access to data at rest is restricted to authorized personnel only.
- Regular Audits: We conduct regular audits and assessments of our data storage systems.
- Data Retention Policies: We adhere to strict data retention policies.
- Physical Security: Our data storage facilities are equipped with state-of-the-art physical security measures.
- Incident Response: In the event of a security incident or breach, we have a well-defined incident response plan in place.
- Continuous Improvement: We continuously evaluate emerging technologies and best practices to enhance our “Data at Rest” security measures.
- Privacy by Design: We are committed to upholding your privacy rights. We follow a privacy by design approach, which means that privacy and data protection measures are embedded into every stage of our software development lifecycle.
- Continuous Monitoring: Our security systems monitor our infrastructure 24/7 to detect and defend against potential threats.
- Incident Response: We have an incident response plan in place that ensures any potential breach is quickly identified, contained, and resolved. In the event of an incident, we commit to providing transparent communication with all relevant parties.
- Employee Training: We understand that security isn’t just about technology. That’s why all of our staff receive ongoing training about the latest security and privacy practices to further ensure the protection of your data.
- Regulatory Compliance: We are fully compliant with all relevant security and data privacy laws and regulations, such as HIPAA, among others.
We are dedicated to continually enhancing our security measures and fostering a culture of security awareness throughout our organization. By choosing keycentrix, you’re trusting us with your information, and we are fully committed to honoring that trust.
We truly appreciate your trust in us, and we will strive to continually ensure your data’s security.
Last updated: August 26, 2023
Take a Tour
Contact us at 1-800-444-8486 or drop us a line to request a tour of our Newleaf pharmacy management software.Let's Go