Data Security

Last Updated: January 21, 2025

Introduction

At Core Nexis, we prioritize the security and confidentiality of your data across all our platforms and services. This Data Security page outlines the comprehensive measures we implement to protect your information when you use our website https://corenexis.com and all our related products and services, including:

Our commitment to data security is fundamental to our operations and reflects our dedication to maintaining your trust. We employ industry-leading security protocols, advanced technologies, and best practices to ensure your data remains protected at all times.

Table of Contents

  1. Security Infrastructure
  2. Data Encryption
  3. Access Controls
  4. Network Security
  5. Financial Data Protection
  6. Monitoring and Auditing
  7. Incident Response
  8. Compliance and Standards
  9. User Security Features
  10. Security Best Practices
  11. Contact Us

1. Security Infrastructure

Core Nexis has built a robust security infrastructure designed to protect your data from unauthorized access, disclosure, alteration, and destruction.

Cloudflare Protection

We partner with Cloudflare Inc. to provide enterprise-grade security services:

Secure Hosting Environment

Our infrastructure is hosted in secure, tier-1 data centers that feature:

System Security

We implement multiple layers of system security:

2. Data Encryption

Encryption is a cornerstone of our security strategy, ensuring your data remains protected both in transit and at rest.

Encryption in Transit

All data transmitted between your device and our servers is protected using:

Encryption at Rest

Data stored in our systems is protected through:

End-to-End Encryption

For our most sensitive services, particularly in Core Nexis Financial Tools:

3. Access Controls

We implement strict access controls to ensure that only authorized individuals can access systems and data.

User Authentication

Our authentication systems include:

Internal Access Controls

For Core Nexis staff and systems:

Third-Party Access

When third-party services require access to our systems:

4. Network Security

Our network security architecture is designed to protect against both external threats and internal vulnerabilities.

Perimeter Security

We implement multiple layers of perimeter defenses:

Internal Network Security

Within our infrastructure:

Traffic Monitoring

We continuously monitor network traffic for security threats:

5. Financial Data Protection

Core Nexis Financial Tools implement additional security measures specific to financial information.

Enhanced Encryption

Financial data receives our highest level of encryption protection:

User-Controlled Access

We ensure you maintain control over your financial information:

Secure Form Submissions

When you input financial information through forms:

Compliance with Financial Standards

Our financial tools adhere to relevant financial security standards:

6. Monitoring and Auditing

Continuous monitoring and regular auditing form a critical component of our security program.

Security Monitoring

Our 24/7 monitoring systems include:

Security Auditing

We conduct regular security audits including:

Logging and Record Keeping

Our comprehensive logging approach includes:

7. Incident Response

Core Nexis maintains a comprehensive incident response plan to address security incidents quickly and effectively.

Incident Response Team

Our dedicated team includes:

Incident Response Process

Our structured approach includes:

Notification Procedures

In the event of a security incident affecting user data:

8. Compliance and Standards

Core Nexis adheres to industry standards and best practices for data security and privacy.

Security Standards

Our security program is aligned with recognized standards including:

Privacy Compliance

We design our systems to comply with global privacy regulations including:

Regular Assessments

To maintain compliance, we conduct:

9. User Security Features

We provide users with tools and features to enhance the security of their accounts and data.

Account Security

Features available to protect your account:

Data Control

Tools to manage your data:

Secure Tools

Our tools are designed with security in mind:

10. Security Best Practices

We recommend these security best practices to enhance your protection when using Core Nexis services:

Account Security

Device Security

Data Security Awareness

11. Contact Us

If you have any questions about our data security practices or need to report a security concern, please contact us:

Security Vulnerability Reporting

If you believe you've found a security vulnerability in any Core Nexis service, we encourage you to report it to us responsibly. Please email [email protected] with details about the potential issue. We commit to:

Social Media

You can also reach us through our social media profiles:

In alignment with our unified platform approach, you can contact us about any Core Nexis product or service through these common channels. As per our motto, one platform serves all your Core Nexis needs.