Security Policy
Sign up Free Trial Now!
View Video Demo

Corporate Headquarters:
Teczo.com, Inc.

160 Arbor Court,
San Bruno, CA 94066-2615,
California, USA
Website: www.teczo.com

Hong Kong Sales Office:
Teczo.com, Ltd.

Units 2010-2013, 20th Floor
Chevalier Commercial Centre
8 Wang Hoi Road,
Kowloon Bay, Hong Kong
Tel: 852-3423 3333
Fax: 852-3423 3322
Email: sales@teczo.com

Security: The Foundation On Which We Build

Teczo Security Policy With customer data security as our top priority, Teczo.com has taken the strictest steps to safeguard the integrity of its data and prevent unauthorized access to the information it maintains. We hold a three-part vision of security:—"CIA" namely, confidentiality, integrity and availability, which have been built into the design, implementation and day-to-day practices of the entire operating environment of our system. Coupled with our commitment to the highest standards in business ethics, Teczo.com not only ensures the security you expect but also supports your ability to assure your customers of the same high standards to which the Company adheres.

Data confidentiality covers data in storage, during processing, and in transit. The Company guarantees that your data at Teczo.com will not be accessed or disclosed to unauthorized individuals, entities, or processes and will be protected from international or accidental attempts to perform unauthorized data reads.

Confidentiality refers to limiting information access and disclosure to authorized users—"the right people"—and preventing access by or disclosure to unauthorized ones—"the wrong people".

1. Physical Access Control

Access control is determined by the software, hardware and liveware (humans) that enforce it. Teczo.com has a system of controls that limit access to the organizations' resources.

1.1 Guarded Premises

On-premise security guards monitor all traffic and ensure that entry procedures are strictly followed.

1.2 Identification System

Data center-authenticated photo ID cards presentation and finger authentication are simultaneously required for entrants prior to gaining admittance to the facility.

1.3 Video Surveillance

Video surveillance cameras are installed at points of entry to the collocation and other secured areas within the perimeter. Video records are stored for review for non- repudiation.

2. Network Protection

Also critical to confidentiality—and data integrity and availability as well—are protections against malicious software (malware), spyware, spam and phishing attacks. All of the Teczo.com servers are protected by firewall to prevent users from accessing modules them other than the specifically allowed protocols and methods. Also, Teczo.com maintains a detection method, which picks up suspicious activity that may signal an intrusion. At Teczo.com, investigation can be done by tracking each transaction using the user login details and the provided timestamp for each event.