Security

Security

Security

The InStage team is monitoring security protocols.

The InStage Team is continuously monitoring it's

security procedures.

The InStage Team is continuously monitoring it's security procedures.

Active Controls

Monitoring

Monitoring

Encryption at Rest

SSL/TLS Enforced

Data Security

Data Security

Acceptable Use Policy

Annual Performance Evaluations

Backup Policy

Code of Conduct

Disaster Recovery Plan

Organization Security

Organization Security

Cloud Data Storage Restricted

Credential Keys Managed

End to end encryption

Firewalls

Least-Privileged Policy for Customer

Data Access

Code Review Process

Product Security

Product Security

Subprocessors

AWS

Cloud services

Date location: [fill in date location]

FrontEgg

User logins & authentication.

Date location: [fill in date location]

Microsoft Azure

Cloud services.

Date location: [fill in date location]

PostHog

Event analytics.

Date location: [fill in date location]

Sentry

Error tracking & application performance monitoring.

Date location: [fill in date location]

By requesting the selected documents, a message will be sent to our team who will review and process your request.

Is student data encrypted?

Where is student data stored?

Does InStage have a Privacy Policy?

Is student data encrypted?

Where is student data stored?

Does InStage have a Privacy Policy?

Is student data encrypted?

Where is student data stored?

Does InStage have a Privacy Policy?

Is student data encrypted?

Where is student data stored?

Does InStage have a Privacy Policy?

FAQ

Is student data encrypted?

Where is student data stored?

Does InStage have a Privacy Policy?

Is student data encrypted?

Where is student data stored?

Does InStage have a Privacy Policy?