Teamstand builds products that help its users organize their documents in email. We take security seriously, maintain strict internal policies that restrict unauthorized access to our users’ data, and work with our users to build trust and confidence in sharing data with us.
Teamstand is hosted on a Virtual Private Cloud on Amazon Web Services, a secure and scalable platform that hosts thousands of other applications that you know or trust already. Learn more about AWS Cloud Security here.
All our servers are launched inside the private cloud of Amazon Web Services, protected by network firewalls. We implement strict network access control lists that prevent intrusion into or attack on our servers. We implement strict network segmentation and isolation of environments and services that prevents unauthorized access to production servers. We use separate AWS SSO (Single Sign-On) accounts for production and non-production. Only production accounts have access to our production servers. We also implement MFA (Multi-Factor Authentication) and role-based authorization to restrict human access to production servers and production data.
We employ strict separation of data across environments and have strict role-based access control to our production servers on authorized, need-to-use basis.
Stored data is protected by encryption at rest, and in-flight transmitted data is protected by use of HTTPS / SSL Encryption. We utilize HTTPS / SSL encryption when sending or receiving data from the browser. We use key management services offered by Amazon AWS KMS to manage and rotate the encryption keys.
We have deployed both automated and manual processes around Change Management that enable us to continuously release our software to our users. We have stable, automated processes around Incident Management and Reporting that quickly escalate to our Operations and Support teams any Incidents, including Systems downtime and Platform glitches, arising out of planned or unplanned changes.
You could submit a bug report, feedback, any concerns, incidents you encounter to email@example.com with detailed steps required to reproduce the issue.
If you’ve discovered a security vulnerability, we want to know about it. Please send reports of vulnerabilities to firstname.lastname@example.org. We will make our best effort to investigate and fix the legitimate issues in a reasonable time frame.