What are the different methods iCare uses for data privacy and security?

Posted on: 7/1/2025 2:21:55 PM
Replied by : support@icaresoftware.com

iCare Data Privacy and Security Methods

iCare employs a comprehensive set of data privacy and security practices to ensure the safety and confidentiality of user information. These methods include:

1.Identity and Access Management (IAM)

Role-Based Access Control: Under Settings > Role Management, admins can assign specific roles and permissions to users based on their responsibilities.

Granular Permissions: Admins can grant access to staff for site and corporate data as needed. Teachers have access to children’s data and program-related information.

Parent-Managed Access: Parents can share access with secondary contacts for limited information such as contact details, photos, and videos.

2. Authentication and Authorization

Multi-Factor Authentication (MFA): Adds an extra layer of security to verify user identities and prevent unauthorized access.

3. Data Encryption

In Transit & At Rest: All sensitive data is encrypted both during transmission and while stored, ensuring it remains protected at all times.

4. Activity Monitoring

Logging and Alerts: All system activity is logged and monitored to detect and respond quickly to suspicious or unauthorized actions.

5. Physical Access Security

Data Center Security: Facilities are equipped with security guards, surveillance cameras, biometric scanners, and controlled visitor access.

Infrastructure Resilience: Data centers are built with redundancy and failover mechanisms to maintain continuous operations during disruptions.

Leave a Comment / Question

Copyright © 2025 Orgamation Technologies, Inc. All rights reserved.