Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Next »

Our Approach to Security

Security and Privacy are at the center of how we continue to enhance customer trust. Core Strengths invests heavily in protecting the confidentiality, integrity, availability, security, and privacy of customer data. Core Strengths continuously assesses and implements additional measures to help improve our security program and address the ever-changing threat landscape.

Please review the information below to learn more about our security, privacy, and compliance policies. If you need additional information do not hesitate to reach out to us at support@corestrengths.com.

Customers who trust Core Strengths

Frequently Asked Questions

Installation

 Why are there two zoom apps?

The Core Strengths RQ Admin app allows access to specific user data that enables the Core Strengths RQ app to show meeting participant insights. Specifically, the two scopes present on the Core Strengths RQ Admin page “meeting:read:admin” and “webinar:read:admin” are only available within a zoom admin app and enables the integration to display Core Strengths insights within a meeting.

 How do you install the Core Strengths RQ Admin App?

To install this app you must first add the Core Strengths Admin app. Follow the steps below to install the admin app.

  1. Log in to Zoom.

  2. Navigate to the Zoom Marketplace by clicking on the “Apps” button.

  3. Find the app by searching “Core Strengths RQ Admin” in the search bar.

  4. Select the Core Strengths Admin RQ app and click add. This will open up a new window prompting you to authorize Core Strength's access to your Zoom account. Click authorize to install app.

  5. Once the app is installed, click on the app in your apps window and enter your Core Strengths credentials.

  6. Select the desired Core Strengths account.

  7. Follow the getting started tutorial to use the app to improve your virtual conversations and meetings inside Zoom!

 How do you install the Core Strengths RQ for individuals app?

To install the Core Strengths RQ you must first add the Core Strengths Admin app. Follow the steps below to install the app for individuals.

  1. Log in to Zoom.

  2. Navigate to the Zoom Marketplace by clicking on the “Apps” button.

  3. Find the app by searching “Core Strengths RQ” in the search bar.

  4. Select the Core Strengths app and click install.

  5. Once the app is installed, click on the app in your apps window and enter your Core Strengths credentials.

  6. Select the desired Core Strengths account.

  7. Follow the getting started tutorial to use the app to improve your virtual conversations and meetings inside Zoom!

Security

 How do you keep customer data safe?

Core Strengths has an active ISMS (Information Security Management System) Team. The Executive leadership actively engages with the ISMS Team, and the Core Strengths Board is provided with updates on security threats, hygiene, and the maturity of the Information Security Management System. We invest heavily in protecting the confidentiality, integrity, availability, security, and privacy of customer data.

Please review the information below and if you have any additional question on security, privacy, and support don’t hesitate to reach to us directly at support@corestrengths.com or by reaching out to us directly at 760-602-0086 Ext. 1.

 What security certifications do you maintain?

Core Strengths holds an ISO 27001 certification as well as Privacy Shield and CyberEssentials certification. We continue our pursuit to improve and ac

 Do you encrypt data?

Yes. Core Strengths data is encrypted at rest and in transit using industry-standard ciphers and methods. This includes the use of AES-256 and TLS encryption ciphers. Encryption keys are stored securely with limited access using Key Management Services (KMS) that AWS fully manages. Advanced encryption is applied to various application infrastructure layers, including disk, application, and database encryption. Sharing of encryption keys is prohibited, and essential management procedures are reviewed on an annual basis.

 Do you offer SSO?

Yes. We offer SSO capabilities to customers.

 Do you have multi-factor authentication?

Yes. Core Strengths uses MFA to authenticate employees that have direct access to Core Strengths’ owned and managed resources. Employees are required to use Multi-Factor Authentication (MFA) for key application and privileged access.

 How do you manage product access controls?

Core Strengths provides a number of mechanisms to help customers keep their data secure and control access. This includes a series of controls based on the principle of least privilege. Our Relationship Intelligence Platform is fully responsive across desktop, laptop, and mobile devices. Security event and audit logs are collected and monitored to detect and respond to anomalous behavior.

Multi-factor authentication (MFA) is required for Core Strengths employees to access information systems and resources. Access is controlled through a central directory system, with access limited and granted based on the principle of least privilege.

Our Relationship Intelligence Platform delivers a user-friendly experience through the implementation of role-based access features.

 What is your network control setup?

Our platform is built on isolated, private networks using security groups and firewalls within virtual private clouds (VPC). All inbound and internal traffic is restricted to specific ports across a limited group of machines. All traffic rates, sources, and types are actively monitored at various points in the network beyond ingress and firewalls. Core Strengths logically isolates customer data using application container technology and unique identifiers, which assures that access to customer data is limited to only that customer.

 What is your policies on data retention and disposal?

Customer data will be deleted upon written request. In general, customer data is retained as needed to satisfy data classification and external requirements.

 Do you support secure deletion (E.G. Degaussing/cryptographic wiping) of archived and backed-up data as determined by the tenant?

Asset disposal and repurposing follow the process and procedure outlined in our Asset Management Policy which is a part of our ISMS. An Independent Auditor has validated the existence of this policy and the related controls as part of the ISO 27001 certification audit. Upon a customer’s written request for data erasure, Core Strengths shall remove the customer’s data within thirty (30) days of the request. Unless otherwise instructed or pursuant to applicable law, Core Strengths will retain for perpetuity. Upon request, Core Strengths will provide a log or copy of the data that was deleted.

Cloud-Based (AWS) Media

When AWS determines that media has reached the end of its useful life or it experiences a hardware fault, AWS follows the techniques detailed in Department of Defense (DoD) 5220.22-M (“National Industrial Security Program Operating Manual”) or NIST SP 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process. Please refer to the AWS website for more information: https://aws.amazon.com/compliance/data-center/controls/

 Does Core Strengths coduct penetration testing?

Yes, we use Independent penetration testing and automated testing in our secure development practices are conducted to enable the identification and mitigation of vulnerabilities.

Core Strengths leverages third parties for independent penetration tests of our applications, services, and businesses as a whole. These have resulted in continuous updates to our environment and processes for improving security and reliability. These assessments are part of ongoing compliance and security requirements to maintain Core Strengths as a trusted provider of services.

Privacy

 How do I have my results removed from the app?

If you are in an open sharing environment, you will need to have your data removed from your organization's account. If you are in a closed-sharing environment, you will have to connect with other users in the account before they can see your results. You can remove connections from the app and the Core Strengths website.

 What are your privacy policies?

Please visit here to view our privacy policies. No. We do not persist any data through the integration, and we don’t sell any data.

Compliance

 Does Core Strengths adhere to GDPR, CCPA, etc?

Yes. We comply with international privacy, security, and confidentiality protocols, regulations, and requirements like GDPR and CCPA.

 Does Core Strengths maintain any certifications?

Core Strengths holds an ISO 27001 certification as well as Privacy Shield and CyberEssentials certification. We continue our pursuit to improve and achieve robust industry accreditations/ certifications. Insert info about SOC2 here?

 Does Core Strengths harvest and/or sell customer data?

No. We do not persist any data, and we don’t sell any data.

Support

 How can I contact customer support?

You can contact support at support@corestrengths.com or by reaching out to us directly at 760-602-0086 Ext. 1.

 Where can report a bug or technical I found with the app?

You can report bugs or technical issues via our service desk.

 Where can I provide product feedback or ideas for the app?

You can provide your ideas service desk.

Integrations FAQs

 What information does the Core Strengths app have access to?

The Core Strengths Zoom app has access to Zoom meeting details and user information.

 Why does the Core Strengths Zoom app need access to meeting details and user information?

The Core Strengths Zoom app uses user information and meeting details to provide collaboration and communication tips personalized to the people who attend your meetings.

Did you not find what you are looking for?

We are proud of our approach to keeping our customer data safe. If you have additional questions, we consistently update our polices on security and privacy on our website. If you have additional questions please reach out to your Sales Rep at 760-602-0086

  • No labels