Security Whitepaper
As do many, we take security very seriously! We understand that the data we have been entrusted with is data which our clients have also been entrusted with. We always ensure that we go well above and beyond the requirements and standards for safe secure storage and handling of all data. This white paper outlines in details some of the lengths which we go to ensure business continuity and respect for entrusted data.
Executive Summary
OperationsCommander (OPS-COM) is a cloud-based parking and security management platform. This platform has been developed in-house for over 15 years.
Tomahawk Technologies Inc. is committed to maintaining a high level of information security, and its key priority is protecting customer information, and carefully maintaining the information security of OPS-COM. This Security Whitepaper gives an overview of the OPS-COM security features.
OPS-COM is PCI SAQ D-SP 3.2.1 certified and is audited quarterly by a third-party to maintain this certification. We are also TX-RAMP Level 2 certified by the Texas Risk and Authorization Management Program (certificate ID TX1332619). The Texas Risk and Authorization Management Program provides a standardized approach for security assessment, certification, and continuous monitoring of cloud computing services that process the data of Texas state agencies. Risk analysis forms the foundation of our security program.
Risk assessments are periodically performed and security is regularly discussed in weekly team meetings. Our security processes, roles, and responsibilities are clear and well defined. Everyone is aware of our responsibilities and obligations when protecting our clients data.
We review our policies annually and ensure that all employees sign-off on them. OPS-COM is developed and maintained by inspired, skilled personnel who are committed to maintaining a high level of online security. OPS-COM has been designed to meet customers' strict security requirements and industry best practices.
OPS-COM has a solid and secure foundation that is based on widely used security methods and protocols. It has been designed to protect data both in transit and at rest to ensure its confidentiality, integrity, and availability. Strict access control allows only authorized users to access the data.
Operation and maintenance of OPS-COM follows documented processes. Continuous monitoring of information security and system performance ensures that all deviations and incidents can be responded to in a timely manner by trained and competent personnel in accordance with the incident response process.
This document is designed to answer all your questions regarding the security and design of both OPS-COM and our supporting systems.
This information is no available by request from your Sales representative or from support@ops-com.com.