Security

Security is a major concern to organisations that want to implement a cloud solution. The eLABInventory is a product of Bio-ITech, and the latter has since 2016 been formally certified for ISO/IEC 27001:2013, the globally accepted standard for information security management. Read further to learn about the measures we take to safeguard your data.

Hosting in ISO-certified data centers

All our servers are located in ISO-certified data centers with tight access control measures. We provide services from a fully redundant and scalable web cluster that is hosted in three data centers located in Europe. In case of a disastrous event in one of the data centers, service delivery can still be provided from one of the other data centers.

Data Encryption

All communication to end-users both from and to our data center is encrypted using an SSL (HTTPS) connection. eLABInventory uses an Extended Validation (EV) SSL class III certificate that has been issued by COMODO CA Limited, a registered Certificate Authority (CA). Extended validation certificates are only issued to the most trusted service providers (including governmental institutes and banks) and are indicated by a green trust bar.

greentrustbar-SSL-Class-III-Bio-ITech

Real-time back-ups and periodic data archiving

In addition to real-time back-ups by mirroring data to two data centers in the web cluster. Every 24 hours an encrypted back-up of all data is stored at an off-site location for recovery in case of an emergency.

Screening and Access Control Policy

Client data is only accessible to Bio-ITech employees for service or support purpose. To guarantee the safety and confidentiality of your data, all our employees undergo a formal and extensive screening procedure. In addition, all our employees have signed a strict confidentiality agreement prior to joining our company.

Periodic Vulnerability Testing

We periodically test our applications for commonly-exploited vulnerabilities. All hardware and software are also subject to a strict update regime. In the event of a reported security breach in any components used in our application, security patches are installed.

Contact our Security Officer

If you have any questions about our security measures or if you are interested in a third party statement about our information security management, please contact our security officer.