Cyber Security and Data Protection is not an After-Thought.

Cyber Security and Protection of Data

Aicody LLC ("Aicody") maintains certain personally identifiable information regarding clients in its electronic databases to facilitate the processing of transactions on behalf of its clients to comply with rules, regulations and laws. The personally identifiable information stored on Aicody's network is protected from unauthorized access, treated as confidential, and handled according to the terms of the Aicody privacy policy.

Aicody attests that personally identifiable information and customer information stored on our systems is protected as follows:

  • Aicody's Internet-facing servers are protected from access through firewalls and/or other security devices.
  • The firm's critical servers reside on isolated networks that have no direct Internet access.
  • Aicody internal systems that store customer personally identifiable information locks people out of internal systems after a few unsuccessful login attempts.
  • Access to shared drives is restricted to active employees and pre-authorized individuals on a "need to know" basis within Aicody through password-protected logins to the network.
  • Encryption technology is employed for data transmissions across public networks and on portable media devices.
  • System backups reside either in secure facilities at Aicody or in secure storage provided by a third party specializing in secure information management.
  • Personally identifying information is generally not stored on laptop computers or other portable devices. Further all data stored on laptop hard drives is encrypted.
  • All end-station computers use antivirus software that is regularly updated.
  • Operating System security patches are applied to all systems on a regular basis.
  • Employees are trained on the requirements to protect personal information.
  • Aicody has adopted written policies and procedures, reasonably designed to protect personally identifiable information.

Aicody further attests that should a breach occur, management will promptly take action to secure information, mitigate the breach, and notify, on a timely basis, any customers whose personally identifiable information could have been compromised.