Prior to reading this page, it is mandatory or required or necessary or informative to read our Terms and Conditions page at https://aicody.com/general/terms
Entity attests that personally identifiable information and client information stored on our systems is protected as follows:
⚖ Entity's Internet-facing Servers are protected from access through firewalls and/or other security devices.
⚖ The firm's critical Servers reside on isolated networks that have no direct Internet access.
⚖ Entity internal systems that store client personally identifiable information locks people out of internal systems after a few unsuccessful login attempts.
⚖ Access to shared drives is restricted to active employees and pre-authorized individuals on a "need to know" basis within Entity through password-protected logins to the network.
⚖ Encryption technology is employed for data transmissions across public networks and on portable media devices.
⚖ System backups reside either in secure facilities at Entity or in secure storage provided by a third-party specializing in secure information management.
⚖ Personally identifying information is generally not stored on laptop computers or other portable devices. Further all data stored on laptop hard drives is encrypted.
⚖ All end-station computers use anti-virus software that is regularly updated.
⚖ Operating System security patches are applied to all systems on a regular basis.
⚖ Employees are trained on the requirements to protect personal information.
⚖ Entity has adopted written policies and procedures, reasonably designed to protect personally identifiable information.
Entity further asserts and attests that should a breach occur, we will promptly take actions to secure information, mitigate the breach and notify, on a timely basis, any clients whose personally identifiable information could have been compromised.
Any and all requests, Disputes, necessities, emergencies or communications of any and all types shall be transmitted to Entity with proper and sufficient descriptions via all three methods of voice or text messaging, email and mail, respectively and solely:
© 2019 AICODY LC ⚖ ALL RIGHTS RESERVED