At Apsona, security and data protection are primary drivers in the design of our products and services. We strive to ensure that Customer Data is protected and treated securely. The Apsona Data Security and Protection Policy summarizes the security-related aspects of our Software (as defined in the Privacy Policy). Any terms that are undefined in this Data Security and Protection Policy shall have the meanings as defined within the Apsona Terms of Service or the Apsona Privacy Policy. The Data Security and Protection Policy are incorporated into the Apsona Terms of Service or the Apsona Privacy Policy by reference.
The Apsona Software is an add-on to Salesforce, and the Software works within your browser connected to Salesforce. The Software can only operate within the browser window in the Salesforce context. Therefore, all of the security protections afforded by Salesforce are automatically inherited by the Apsona Software.
With all Apsona Software, data traffic is entirely limited to between your browser and your Salesforce database, with no third-party servers involved. There are two exceptions, the PDF generator and the Scheduler, which are described further below. This data traffic is encrypted via the industry-standard SSL (Secure Sockets Layer) between your browser and Salesforce.
We do not collect or store Customer Data and no Customer Data passes through servers, except as disclosed within our Privacy Policy or this Apsona Data Security and Protection Policy. Throughout our product designs, we take particular care to ensure that all our code and processes are data-independent, so as to maximize data security.
We do not share any of your Customer Data submitted to the Software with any partners or others outside of Apsona. All data access is strictly limited to qualified and experienced personnel within Apsona.
If you purchase and use Apsona’s Scheduler product, the Scheduler requires access to your data to produce reports non-interactively (i.e., outside of the browser). The Scheduler’s design ensures the best possible security:
Our Software uses servers for:
Our servers are located in secure hosting environments, across geographically distributed locations in the United States. This ensures high redundancy and resilience.
As noted above, we do not store any Customer Data on any of our servers, with the exception of document format conversion. Given the range of verticals and domains that we service and the nature of data in documents, we are unable to detect sensitive information in them. Consequently, we rely on you, our customers, to safeguard your data. In general, it is advisable to ensure that sensitive data is not included in generated documents, so that your security is not compromised.