Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel7
include*\.[1//2]

Our Approach to Security

Security and Privacy are at the center of how we continue to enhance customer trust. Core Strengths invests heavily in protecting the confidentiality, integrity, availability, security, and privacy of customer data. Core Strengths continuously assesses and implements additional measures to help improve our security program and address the ever-changing threat landscape.

Please review the information below to learn more about our security, privacy, and compliance policies. If you need additional information do not hesitate to reach out to us at support@corestrengths.com or your Sales Rep if you have more detailed security questions.

Customers who trust Core Strengths

Frequently Asked Questions

Installation

Expand
titleWhy are there two zoom apps?

The Core Strengths RQ Admin app allows access to specific user data that enables the Core Strengths RQ app to show meeting participant insights. Specifically, the two scopes present on the Core Strengths RQ Admin page “meeting:read:admin” and “webinar:read:admin” are only available within a zoom admin app and enables the integration to display Core Strengths insights within a meeting.

Expand
titleHow do you install the Core Strengths RQ Admin App?

To install this app you must first add the Core Strengths Admin app. Follow the steps below to install the admin app.

  1. Log in to Zoom.

  2. Navigate to the Zoom Marketplace by clicking on the “Apps” button.

  3. Find the app by searching “Core Strengths RQ Admin” in the search bar.

  4. Select the Core Strengths Admin RQ app and click add. This will open up a new window prompting you to authorize Core Strength's access to your Zoom account. Click authorize to install app.

  5. Once the app is installed, click on the app in your apps window and enter your Core Strengths credentials.

  6. Select the desired Core Strengths account.

  7. Follow the getting started tutorial to use the app to improve your virtual conversations and meetings inside Zoom!

Expand
titleHow do you install the Core Strengths RQ for individuals app?

To install the Core Strengths RQ you must first add the Core Strengths Admin app. Follow the steps below to install the app for individuals.

  1. Log in to Zoom.

  2. Navigate to the Zoom Marketplace by clicking on the “Apps” button.

  3. Find the app by searching “Core Strengths RQ” in the search bar.

  4. Select the Core Strengths app and click install.

  5. Once the app is installed, click on the app in your apps window and enter your Core Strengths credentials.

  6. Select the desired Core Strengths account.

  7. Follow the getting started tutorial to use the app to improve your virtual conversations and meetings inside Zoom!

Security

Expand
titleHow do you keep customer data safe?

Core Strengths has an active ISMS (Information Security Management System) Team. The Executive leadership actively engages with the ISMS Team, and the Core Strengths Board is provided with updates on security threats, hygiene, and the maturity of the Information Security Management System. We invest heavily in protecting the confidentiality, integrity, availability, security, and privacy of customer data.

Please review the information below and if you have any additional question on security, privacy, and support don’t hesitate to reach to us directly at support@corestrengths.com or by reaching out to us directly at 760-602-0086 Ext. 1.

Expand
titleWhat security certifications do you maintain?

Core Strengths holds an ISO 27001 certification as well as Privacy Shield and CyberEssentials certification. We continue our pursuit to improve and ac

Expand
titleDo you encrypt data?

Yes. Core Strengths data is encrypted at rest and in transit using industry-standard ciphers and methods. This includes the use of AES-256 and TLS encryption ciphers. Encryption keys are stored securely with limited access using Key Management Services (KMS) that AWS fully manages. Advanced encryption is applied to various application infrastructure layers, including disk, application, and database encryption. Sharing of encryption keys is prohibited, and essential management procedures are reviewed on an annual basis.

Expand
titleDo you offer SSO?

Yes. We offer SSO capabilities to customers.

Expand
titleDo you have multi-factor authentication?

Yes. Core Strengths uses MFA to authenticate employees that have direct access to Core Strengths’ owned and managed resources. Employees are required to use Multi-Factor Authentication (MFA) for key application and privileged access.

Expand
titleHow do you manage product access controls?

Core Strengths provides a number of mechanisms to help customers keep their data secure and control access. This includes a series of controls based on the principle of least privilege. Our Relationship Intelligence Platform is fully responsive across desktop, laptop, and mobile devices. Security event and audit logs are collected and monitored to detect and respond to anomalous behavior.

Multi-factor authentication (MFA) is required for Core Strengths employees to access information systems and resources. Access is controlled through a central directory system, with access limited and granted based on the principle of least privilege.

Our Relationship Intelligence Platform delivers a user-friendly experience through the implementation of role-based access features.

Expand
titleWhat is your network control setup?

Our platform is built on isolated, private networks using security groups and firewalls within virtual private clouds (VPC). All inbound and internal traffic is restricted to specific ports across a limited group of machines. All traffic rates, sources, and types are actively monitored at various points in the network beyond ingress and firewalls. Core Strengths logically isolates customer data using application container technology and unique identifiers, which assures that access to customer data is limited to only that customer.

Expand
titleWhat is your policies on data retention and disposal?

Customer data will be deleted upon written request. In general, customer data is retained as needed to satisfy data classification and external requirements.

Expand
titleDo you support secure deletion (E.G. Degaussing/cryptographic wiping) of archived and backed-up data as determined by the tenant?

Asset disposal and repurposing follow the process and procedure outlined in our Asset Management Policy which is a part of our ISMS. An Independent Auditor has validated the existence of this policy and the related controls as part of the ISO 27001 certification audit. Upon a customer’s written request for data erasure, Core Strengths shall remove the customer’s data within thirty (30) days of the request. Unless otherwise instructed or pursuant to applicable law, Core Strengths will retain for perpetuity. Upon request, Core Strengths will provide a log or copy of the data that was deleted.

Cloud-Based (AWS) Media

When AWS determines that media has reached the end of its useful life or it experiences a hardware fault, AWS follows the techniques detailed in Department of Defense (DoD) 5220.22-M (“National Industrial Security Program Operating Manual”) or NIST SP 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process. Please refer to the AWS website for more information: https://aws.amazon.com/compliance/data-center/controls/

Expand
titleDoes Core Strengths coduct penetration testing?

Yes, we use Independent penetration testing and automated testing in our secure development practices are conducted to enable the identification and mitigation of vulnerabilities.

Core Strengths leverages third parties for independent penetration tests of our applications, services, and businesses as a whole. These have resulted in continuous updates to our environment and processes for improving security and reliability. These assessments are part of ongoing compliance and security requirements to maintain Core Strengths as a trusted provider of services.

Privacy

Expand
titleHow do I have my results removed from the app?

If you are in an open sharing environment, you will need to have your data removed from your organization's account. If you are in a closed-sharing environment, you will have to connect with other users in the account before they can see your results. You can remove connections from the app and the Core Strengths website.

Expand
titleWhat are your privacy policies?

Please visit here to view our privacy policies. No. We do not persist any data through the integration, and we don’t sell any data.

Compliance

Expand
titleDoes Core Strengths adhere to GDPR, CCPA, etc?

Yes. We comply with international privacy, security, and confidentiality protocols, regulations, and requirements like GDPR and CCPA.

Expand
titleDoes Core Strengths maintain any certifications?

Core Strengths holds an ISO 27001 certification as well as Privacy Shield and CyberEssentials certification. We continue our pursuit to improve and achieve robust industry accreditations/ certifications. Insert info about SOC2 here?

Expand
titleDoes Core Strengths harvest and/or sell customer data?

No. We do not persist any data, and we don’t sell any data.

Support

Expand
titleHow can I contact customer support?

You can contact support at support@corestrengths.com or by reaching out to us directly at 760-602-0086 Ext. 1.

Expand
titleWhere can report a bug or technical I found with the app?

You can report bugs or technical issues via ourservice desk.

Expand
titleWhere can I provide product feedback or ideas for the app?

You can provide your ideas service desk.

Integrations FAQs

Expand
titleWhat information does the Core Strengths app have access to?

The Core Strengths Zoom app has access to Zoom meeting details and user information.

Expand
titleWhy does the Core Strengths Zoom app need access to meeting details and user information?

The Core Strengths Zoom app uses user information and meeting details to provide collaboration and communication tips personalized to the people who attend your meetings.

Did you not find what you are looking for?

We are proud of our approach to keeping our customer data safe. If you have additional questions, we consistently update our polices on security and privacy on our website. If you have additional questions please reach out to your Sales Rep at 760-602-0086