Security Policy

Nothing is more important than protecting our customers’ data. We adhere to enterprise-class security levels and highest encryption standards to keep customer data secure at all times. We apply GDPR rules for all customers.

Data centers

All Shortcast products run on best-in-class servers in Amazon AWS data centers located in United States of America. All Amazon AWS services are GDPR compliant. Customer data is always protected and never leaves data centers. You can read the AWS terms here https://aws.amazon.com/legal/?nc1=f_cc

Host security

Servers are configured as bastion hosts with each server containing only the services it absolutely needs. No other software is added to the host to lessen the security penetration surface. Shortcast software infrastructure is comprised of many microservices. Each microservice is isolated and ran on a specific docker host. Hosts are dynamically scaled depending on load.

Network security

Network security follows a multi-layered approach:

• At the top we use Amazon’s Virtual Private Cloud (VPC) utilizing its own security measures and principles • Security groups are assigned to each instance type, permitting only networks and ports absolutely needed for each instance type to function • Each instance has its own system firewall to protect its services even further • At the single network point of entry, the network intrusion detection & prevention system is installed, with active monitoring, filtering and alerting system. • Every connection to our hosts is SSL encrypted using a proven, peer-reviewed and open source encryption algorithms to prevent network sniffing, injecting and other attacks

Payment data security

We do not store our users' payment information, we do not store credit card or other user payment information. All payment information is stored in the Paddle. By making payments to the Shortcast you agree to the terms of use of Paddle. You can read the Paddle terms here https://paddle.com/legal/checkout-buyer-terms

Data Storage

Data at rest is encrypted via AES-256 encryption using the services AWS provides and/or native Linux tools.

Monitoring

We use on-site and off-site monitoring and alerting tools 24/7. We try to detect every anomaly which could affect our services, before it becomes an issue. Personnel is always available for urgent issues, which are escalated up the chain as necessary.  We strive for 99.99% uptime for all our products.

Penetration testing

Although our services are regularly upgraded, configured and monitored, regular penetration tests are employed to identify and remedy potential security issues. We try to perform such penetration tests at least on quarterly basis.

Internal IT Security

Critical passwords are secured in a virtual vault, using strong encryption protocols. Access is granted to authorised and qualified personnel only, on need-to-know basis.

Data protection, Disaster Recovery & Data Continuity

Production data is mirrored to multiple servers in a master/slave fashion. In case of an instance failure, other instances take over the load. New instance is launched, which then resyncs data and rejoins the cluster. Backups are taken on a daily basis, some more often, depending on sensitivity of data. Backups are securely stored on encrypted storage in a GDPR compliant datacenter. We test our recovery operations and backup quality by regular data recovery. Minimum data recovery is seven days, up to 30 days of retention. GDPR requirements are followed.