Consent Preferences

Insights

Ensuring Data Security and Privacy: Our Commitment to Protecting Data

In an era where data breaches and privacy concerns dominate headlines, safeguarding sensitive information has never been more critical.

At Veraset, we take data security, privacy, and partner protection seriously. Recent high-profile breaches in the industry have underscored the importance of robust security measures.

In the article below, we outline the key protocols we’ve implemented to ensure the highest standards of data protection and maintain the trust of our clients and partners.  

Minimizing Risk

At Veraset, we’ve built our systems with security as a top priority. Here’s how we protect our infrastructure and operations:  

  • No Marketplaces: Unlike some data providers, Veraset does not distribute data through third-party marketplaces. This ensures that data is only accessible directly through our secure systems, minimizing the risk of unauthorized access or exposure.  
  • Server-to-Server Connections: All data delivery is conducted exclusively through server-to-server connections. This means data is pushed directly from our environment to our clients’ environments, eliminating any public exposure or intermediaries in the exchange. All data transfers utilize up-to-date, secure protocols and that systems are regularly audited for potential vulnerabilities.
  • Role-Based Access Control (RBAC): Access to sensitive systems, such as AWS, is provisioned through Okta. This allows us to grant specific roles to users, ensuring that only authorized personnel can access the resources they need. With fine-grained control over permissions, we maintain a secure and efficient workflow.  

Protecting Our Data

We go above and beyond to ensure that the data we handle is protected at every stage of its lifecycle. Here’s how we do it:  

  • Veraset Anonymous Identifiers (VAIDR): Our pipeline uses pseudonymized identifiers that cannot be reverse-engineered. This means that even if someone were to access a VAIDIR, they wouldn’t be able to trace it back to an individual.  
  • Data Segregation: Personally identifiable information (PII) is stored separately from other data types, such as location, demographic, and device data. These datasets are only brought together at the point of delivery, reducing the risk of exposure.  
  • Encryption and Regular Testing: All data is encrypted during transit, and we conduct penetration testing every six to twelve months to identify and address potential vulnerabilities. These proactive measures ensure that our systems remain secure against evolving threats.  
  • Code Reviews: Any data provisioning requires a code review and approval by a second developer. This two-step process prevents unauthorized access and ensures accountability.  

Protecting Our Partners: Safeguarding Identities and Access

We understand that our partners rely on us to protect their interests as well. Here’s how we ensure their security:  

  • Supplier Anonymization: Suppliers are identified by unique codes rather than names, protecting their identities from exposure and maintaining their anonymity.  
  • Controlled Access: When we expose a data bucket to a partner, access is provisioned to a specific user within their organization. This minimizes the risk of exposure, as a breach would require compromising that user’s credentials.  
  • Use Case Vetting: Before proceeding with data evaluation, all prospects must state their intended use case, which is reviewed and approved by our team. This ensures that data is only used for legitimate and authorized purposes.  

Key Takeaways for Clients

When you partner with Veraset, you can trust that your data is in safe hands. In sum, what sets us apart is:

  1. Direct and Secure Data Delivery: Our server-to-server connections ensure minimal exposure risk.
  2. Advanced Data Protection: Sensitive data is pseudonymized, segregated, and encrypted for maximum security.  
  3. Partner Safeguards: We protect the identities of our partners and suppliers through anonymization and controlled access.  
  4. Proactive Security Measures: Regular testing and robust access controls prevent unauthorized data access.  

We’re committed to maintaining the highest standards of data security and privacy. By implementing these measures, we not only protect our data but also uphold the trust and confidence of our clients and partners.  

---

Stay secure. Stay confident. Partner with Veraset.  

For more information about our data security practices, contact us today.

FTC Enforcements Against Location Data in 2024
Uses Cases of Geospatial Data

Let's discuss what our data can do for you

Book a free data consultation with our team to discuss:

  • Your particular data needs and setup
  • Use cases in your industry or specialization
  • Pricing, timetables, schema, and counts

See why Veraset is trusted by:

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.