{"id":874,"date":"2013-04-05T16:14:06","date_gmt":"2013-04-05T15:14:06","guid":{"rendered":"https:\/\/www.contract-alert.com\/?page_id=874"},"modified":"2016-06-25T12:25:03","modified_gmt":"2016-06-25T11:25:03","slug":"data-security","status":"publish","type":"page","link":"https:\/\/www.contract-alert.com\/en\/data-security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used, including:<\/p>\n<p><!--more--><\/p>\n<div class=\"features_grid\">\n<div class=\"row\">\n<div class=\"four columns\">\n<p><img decoding=\"async\" alt=\"SSL-Encryption\" src=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/lock.png\" \/><\/p>\n<h5>SSL-Encryption<\/h5>\n<p>An SSL-Certificate guarantees all data being transferred between our server and the user&#8217;s PC is encrypted, similar to online banking transactions.<\/p>\n<\/div>\n<div class=\"four columns\">\n<p><img decoding=\"async\" alt=\"Datacenter\" src=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/firewall.png\" \/><\/p>\n<h5>Tier IV Datacenter<\/h5>\n<p>Your contract database and documents are being stored in a Tier IV Datacenter, considered as <strong>most robust<\/strong> and less prone to failures, with fully redundant subsystems.<\/p>\n<\/div>\n<div class=\"four columns\">\n<p><img decoding=\"async\" alt=\"IP Restrictions\" src=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/ip-lock1.png\" \/><\/p>\n<h5>IP-Restrictions<\/h5>\n<p>Restrict access to your data to a specific IP range, so that Contract Alert is only accessible at designated physical locations.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"four columns\">\n<p><img decoding=\"async\" alt=\"User lock\" src=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/user-lock.png\" \/><\/p>\n<h5>User Lock<\/h5>\n<p>Once a user has attempted to login three times using an incorrect password, the user account will be blocked automatically.<\/p>\n<\/div>\n<div class=\"four columns\">\n<p><img decoding=\"async\" alt=\"AES Encryption\" src=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/contract-lock1.png\" \/><\/p>\n<h5>Document Encryption<\/h5>\n<p>Documents will be automatically encrypted with a password <strong>you<\/strong> specify and can\u2019t be viewed without a valid login.<\/p>\n<\/div>\n<div class=\"four columns\">\n<p><img decoding=\"async\" alt=\"Backups\" src=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/cloud.png\" \/><\/p>\n<h5>Offsite Backups<\/h5>\n<p>Password protected backups of your contract database and docuements data are being stored in a separate datacenter.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used, including:<\/p>\n","protected":false},"author":3,"featured_media":935,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"template-full-width.php","meta":{"footnotes":""},"class_list":["post-874","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security of your contract database<\/title>\n<meta name=\"description\" content=\"Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.contract-alert.com\/en\/data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security of your contract database\" \/>\n<meta property=\"og:description\" content=\"Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.contract-alert.com\/en\/data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Contract Alert \u00ae\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-25T11:25:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"60\" \/>\n\t<meta property=\"og:image:height\" content=\"60\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@contractalert\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.contract-alert.com\/en\/data-security\/\",\"url\":\"https:\/\/www.contract-alert.com\/en\/data-security\/\",\"name\":\"Security of your contract database\",\"isPartOf\":{\"@id\":\"https:\/\/www.contract-alert.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.contract-alert.com\/en\/data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.contract-alert.com\/en\/data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png\",\"datePublished\":\"2013-04-05T15:14:06+00:00\",\"dateModified\":\"2016-06-25T11:25:03+00:00\",\"description\":\"Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.contract-alert.com\/en\/data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.contract-alert.com\/en\/data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.contract-alert.com\/en\/data-security\/#primaryimage\",\"url\":\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png\",\"contentUrl\":\"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png\",\"width\":\"60\",\"height\":\"60\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.contract-alert.com\/en\/data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.contract-alert.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.contract-alert.com\/#website\",\"url\":\"https:\/\/www.contract-alert.com\/\",\"name\":\"Contract Alert \u00ae\",\"description\":\"State of the Art Contract Management Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.contract-alert.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security of your contract database","description":"Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.contract-alert.com\/en\/data-security\/","og_locale":"en_US","og_type":"article","og_title":"Security of your contract database","og_description":"Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used.","og_url":"https:\/\/www.contract-alert.com\/en\/data-security\/","og_site_name":"Contract Alert \u00ae","article_modified_time":"2016-06-25T11:25:03+00:00","og_image":[{"width":60,"height":60,"url":"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@contractalert","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.contract-alert.com\/en\/data-security\/","url":"https:\/\/www.contract-alert.com\/en\/data-security\/","name":"Security of your contract database","isPartOf":{"@id":"https:\/\/www.contract-alert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.contract-alert.com\/en\/data-security\/#primaryimage"},"image":{"@id":"https:\/\/www.contract-alert.com\/en\/data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png","datePublished":"2013-04-05T15:14:06+00:00","dateModified":"2016-06-25T11:25:03+00:00","description":"Protecting your contract database and documents is a high priority. To ensure it remains secure, a number of approaches are being used.","breadcrumb":{"@id":"https:\/\/www.contract-alert.com\/en\/data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.contract-alert.com\/en\/data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.contract-alert.com\/en\/data-security\/#primaryimage","url":"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png","contentUrl":"https:\/\/www.contract-alert.com\/wp-content\/uploads\/2012\/11\/icon-security.png","width":"60","height":"60"},{"@type":"BreadcrumbList","@id":"https:\/\/www.contract-alert.com\/en\/data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.contract-alert.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/www.contract-alert.com\/#website","url":"https:\/\/www.contract-alert.com\/","name":"Contract Alert \u00ae","description":"State of the Art Contract Management Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.contract-alert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/pages\/874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/comments?post=874"}],"version-history":[{"count":0,"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/pages\/874\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/media\/935"}],"wp:attachment":[{"href":"https:\/\/www.contract-alert.com\/en\/wp-json\/wp\/v2\/media?parent=874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}