Skip to main content

Main navigation

  • Documents
  • Search

User account menu

  • Log in
Home
Nashua City Data

Breadcrumb

  1. Home
  2. Finance Committee - Agenda - 3/2/2022 - P9

Finance Committee - Agenda - 3/2/2022 - P9

By dnadmin on Sun, 11/06/2022 - 21:40
Document Date
Thu, 02/24/2022 - 13:47
Meeting Description
Finance Committee
Document Type
Agenda
Meeting Date
Wed, 03/02/2022 - 00:00
Page Number
9
Image URL
https://nashuameetingsstorage.blob.core.windows.net/nm-docs-pages/fin_a__030220…

%e
69
INCEPTIVWN | @ Quote

Security Controls

Security

All of Inception Technologies employees are focused on maintaining the highest level of physical and digital security
possible. We constantly review and test our physical security procedures and network vulnerability to ensure that all
documents and data are safe and highly secure. Below are the processes and security controls we incorporate.

Production Site Physical Security

Our production facility is located in a modern, 6,000 square foot, fully alarmed building with 16 Camera's providing
full video coverage of the facility and your documents. Documents are secured each night in a segregated area of
our facility. All locks are coded and require a valid code to enter into each area. Our security locks audit and tracks
each entry into an area.

Inception Technologies Production Control System

The Inception Technologies Production Control System (PCS) individually tracks each box as they move through the
production process. All boxes of incoming documents or media are logged and a label is printed to track each box as
it moves through the imaging process.

Data Security
Inception Technologies employs the following procedures for maximum security of our customers’ confidential
information:

¢ Employment of Dual redundant RAID 5 server configuration

¢ File servers in production are located in a secure data center with limited access to select IT staff only.

¢ All production servers and workstations are monitored and protected by our state-of-the-art firewall and
intrusion monitoring and reporting systems. In addition, all servers and workstations are protected with antivirus
software.

e Employee access to client data is tightly controlled at both the application level and file access level.

¢ Database information in process is password protected at both the Client and Server levels

Inception Technologies Inc. - Quote # 1385 v3 6/10

Page Image
Finance Committee - Agenda - 3/2/2022 - P9

Footer menu

  • Contact