TEGRAL

FAQ
Data Security in Tegral

Frequently Asked Questions
Data security stands at the forefront of Tegral's priorities. Through routine checks and unwavering adherence to the most stringent security protocols, we ensure user data remains safeguarded within a fortress of safety.
By default, our Tegral application steers clear of integrating Artificial Intelligence (AI) to maintain the highest standards of data privacy and to mitigate potential biases. However, when required, our seasoned development team is on standby to implement custom AI solutions that fit seamlessly with the application's functionalities.
Our server operations are strategically located in Australia, the United States, the United Kingdom, Switzerland, Germany, and Canada. Clients have the freedom to choose their preferred server location, ensuring both optimal performance and adherence to regional security and compliance standards.
Tegral employs the Advanced Encryption Standard (AES) with a 256-bit key size for data at rest. In tandem, for data in transit, we deploy SSL/TLS encryption. This dual-pronged approach guarantees robust security at all phases of data handling.
We make use of HTTPS protocols, ensuring data is encrypted before transmission. This practice heightens the security and integrity of data during its transit.
Certainly. We adopt a robust token-based authentication system. This intricate method involves user credential validation, the generation and distribution of secure tokens, and subsequent token verification for ensuing interactions. This meticulous approach anchors our unwavering commitment to data security.
At Tegral, we believe that you have full ownership of your data. From the moment you entrust us with it, maintaining its confidentiality is our utmost priority. Should you ever decide to conclude our partnership (an eventuality we always hope to avoid), you can immediately request the deletion of your data. We're here to serve your needs and respect your decisions, ensuring that you always feel in control of your own information.
Our software is perpetually under vigilant monitoring. This entails both automated and manual reviews, punctuated by regular vulnerability assessments. This approach ensures that Tegral's systems are always fortified, staying ahead of potential security threats.
Comprehensive security assessments are conducted by Tegral on a quarterly basis. These checks are pivotal for detecting and addressing potential vulnerabilities, underscoring our proactive approach to maintaining paramount data security.
Tegral employs a multi-layered security strategy that includes intrusion detection systems, proactive threat monitoring, and real-time alerts. Furthermore, our dedicated security team continually upgrades our defenses, ensuring that our systems are resilient against evolving cyber threats.
Absolutely. Clients retain full ownership of their data. Upon request, we can provide a copy of your data. If you decide to terminate our services, you can also request the permanent deletion of your data, which we will execute in accordance with legal requirements and our data retention policy.
Our team undergoes regular training sessions to stay updated on the latest data security best practices. This ensures that every member of the Tegral team, from developers to customer support, prioritizes and upholds our high data security standards.