We take managing customers' data seriously. We don't just meet industry standards with regard to security; we exceed them. Our culture at Botcopy is built on a security-first mindset in all of our departments, from product design, network administration, and all of our daily business operations, including billing, marketing, support, and every other facet of our work at Botcopy.
Botcopy is hosted on AWS which represents the pinnacle of physical data center security and environmental controls. Botcopy corporate offices all require badge access for entry, maintain video surveillance, and require all visitors to sign in and be accompanied when present.
Botcopy controls access to our production networks through the use of strictly defined rules and requires multi-factor authentication and encrypted connections. We also utilize intrusion detection systems in our production network and advanced email filtering in our corporate network to identify potential security threats.
Botcopy employs internal and external testing of our products. Our API runs on AWS Lambda and our chat window is hosted on S3 with Cloudfront Caching. Our infrastructure is placed on the AWS US East Datacenter. Our cloud providers include AWS, MongoDB, Stripe, and Dashbot when optional analytics integrations are connected. Annually, we engage a nationally-recognized third party to test our application and network to provide assurance that data is being protected according to best practices.
Botcopy makes it mandatory for all employees and contractors to sign a confidentiality agreement prior to the inception of work in any capacity pertaining to Botcopy or our customers. Security awareness training is provided to all Botcopy team members and we routinely publish security alerts across our general internal communication channels to make sure everyone on our team is aware of security protocol changes or improvements.
Botcopy uses redundant servers to ensure data availability and continuity of service. Botcopy maintains daily backups, meaning that the in the highly unlikely event of downtime, the maximum would likely be no greater than 24 hours.