Data Processing

Security Methodology

Autino utilises outsourced cloud hosting and other service providers within a contractual framework to provide compliant storage and processing of data.

Service providers (sub-processors) must satisfy a documented set of criteria in a formal assessment process which forms a part of an eternally audited ISO27001:2013 certification.

In partnership with recognised service providers Autino employs continuous penetration testing to reduce possible attack and abuse vectors.

Production infrastructure is protected by network access and control mechanisms designed in partnership with our service provider to prevent access by unauthorised traffic and protocols.

Autino employs an array of logging systems to record security, availability and performance of its products, incidents are recorded and processed according to a formal procedure.

All employees and contractors are subject to background checks and continuous training and awareness.

CustomerLounge Sub-processors

Sub-processor

Service

Purpose

Location

Microsoft Limited

Hosting and infrastructure

On demand cloud computing and platform management services

EU

TextAnywhere

SMS distribution and management

SMS distribution and management

EU

MailChimp

E-Mail distribution and management

E-Mail distribution and management

EU

Logz.io

Operational log management 

Used for technical support and performance management

EU

Auth0

Identity Management

Authentication and authorisation for application access

EU

Intercom

Support and customer  communications

Communications for business support

EU

Zendesk

Support and customer  communications

Communications for support

EU