Privacy Our #1 Principle

We understand you have an obligation to ensure the privacy of your travellers and at Sitata we certainly do not take privacy lightly. In fact, we have designed our entire system with your travellers' confidentiality at the top of our priority list. There are several points to consider when choosing a system that will safeguard the privacy of its users.

Protecting Your Data In Transit

The collection and flow of data occurs when you or your travellers are interacting with the software. Sensitive information will be transferred from its storage location to your screen and you need to ensure that proper measures are taken to safeguard the data while it is in transit.

At Sitata, we use SSL certificates with 2048 bit encryption on all communications between Sitata and its end users. What does this mean? This means that if someone is eavesdropping on the transfer of information, they will not be able to read or understand the information. It's the same level of security that all major banks use.

Protecting Your Saved Data

It's important to understand that you are responsible for the safekeeping of your travellers' personal information and Sitata can help you do so. If you were previously storing such information in your office and records were stolen then you could be liable for any damages resulting from the data breach. Similarly, when choosing a software provider such as Sitata, your provider must provide an environment to safeguard your data. If your existing software solution stores your files and data locally on your computer, then you must take care that these files are never accessed by an unauthorized person or an intruder.

At Sitata, we ensure that our data storage providers maintain the highest level of security possible. Specifically, the storage facilities are located in non-descript buildings. To access the servers, you need to pass multiple levels of security. The servers are located in locked cages. Access to the server rooms themselves requires identification, fingerprint scanning, and an escort. Needless to say, physical breaches are pretty close to impossible. Some of the standards that our systems meet or exceed are:

What About The Inevitable?

Some people believe that data breaches are inevitable. After all, some of the largest and most well known companies have been compromised in the past. It is important to note that an attack on cloud software can occur from anywhere. Your data might live close to home, but a hacker doesn't need to be close to access it. In addition to maintaining our data security infrastructure with daily upgrades, we have gone above many standard's minimum requirements and encrypt all personal information when it is at rest.

This means that in the remote chance that an attacker has compromised our systems and copied some data, they will not be able to read it. Encryption for data at rest is not mandatory by some privacy standards and so this level of security is among the absolute best offerings possible.

  name: Jack Johnson,
  phone_number: +1 (683) 283-4939,
  health_number: 123456,
  address: 123 Street. Toronto, Canada
  sex: male
  name: 83dlasDKS0dkallld+xls8dlsDLL,
  email: 4lsdDDSLEdkallldsdlsa02323LL,
  phone_number: dlasdk%dk#0ad$$dlss=,
  health_number: vt2iBRasddd0tJ2w,
  address: asSDLK0wsdlDSLD03920!ds0,
  sex: adsl20da98aDLRKDLSdlksdKELD038dx

Protecting Data Usage

Since security and privacy is paramount for Sitata, and given the fact that we can't actually read the data stored, our staff do not view anyone's personal details on our systems. Further, we do not share personal, identifiable information with any third parties. In addition to severely restricting access to our environments, we regularly audit our environments and software for security issues and apply patches expeditiously.