What are the different methods iCare uses for data privacy and security?
iCare Data Privacy and Security Methods
iCare employs a comprehensive set of data privacy and security practices to ensure the safety and confidentiality of user information. These methods include:
1.Identity and Access Management (IAM)
Role-Based Access Control: Under Settings > Role Management, admins can assign specific roles and permissions to users based on their responsibilities.
Granular Permissions: Admins can grant access to staff for site and corporate data as needed. Teachers have access to children’s data and program-related information.
Parent-Managed Access: Parents can share access with secondary contacts for limited information such as contact details, photos, and videos.
2. Authentication and Authorization
Multi-Factor Authentication (MFA): Adds an extra layer of security to verify user identities and prevent unauthorized access.
3. Data Encryption
In Transit & At Rest: All sensitive data is encrypted both during transmission and while stored, ensuring it remains protected at all times.
4. Activity Monitoring
Logging and Alerts: All system activity is logged and monitored to detect and respond quickly to suspicious or unauthorized actions.
5. Physical Access Security
Data Center Security: Facilities are equipped with security guards, surveillance cameras, biometric scanners, and controlled visitor access.
Infrastructure Resilience: Data centers are built with redundancy and failover mechanisms to maintain continuous operations during disruptions.