top of page

Security Information

 

Last Updated 10-14-2024

​

At Mag-Filer division of Spokane Computer, we prioritize the security and privacy of our users' data. To ensure the highest level of protection, we have implemented industry-leading security protocols in our data processing systems. Our approach involves using AWS Lambda functions for scalable, serverless computing and Amazon S3 for secure, encrypted storage of sensitive data. Below is a detailed explanation of how we manage data securely:

 

1. AWS Lambda Functions for Secure Data Processing

We leverage AWS Lambda functions to handle the automated processing of data in a scalable and secure environment. AWS Lambda offers the following key security benefits:

- Isolation and Resource Control: Each Lambda function is executed in a secure and isolated environment, ensuring that your data remains protected throughout its processing lifecycle.

- IAM Permissions: We enforce strict AWS Identity and Access Management (IAM) policies that define the exact permissions for each Lambda function, limiting access to only necessary resources.

- Secure Invocation: Lambda functions are invoked securely over encrypted channels (TLS/SSL) to prevent interception or unauthorized access.

 

2. Encrypted Storage with Amazon S3

For storing sensitive data, we use Amazon S3, configured with the highest security standards:

- Data Encryption: All data stored in our S3 buckets is encrypted both at rest and in transit using AWS Key Management Service (KMS). Encryption keys are managed and rotated automatically according to AWS best practices.

  - Server-Side Encryption (SSE-S3): We use AES-256 encryption for all objects stored in S3.

  - Server-Side Encryption with Customer-Provided Keys (SSE-C): For even greater control, we offer the option to use customer-provided encryption keys.

 

- Access Control: Access to the S3 data is restricted using IAM policies, and bucket-level policies ensure that only authorized entities (Lambda functions) have the necessary access.

 

3. Purging Privacy-Sensitive Data

After the processing of sensitive data is completed, we ensure that all privacy-sensitive information is purged from our systems in compliance with data protection regulations and best practices. The purging process includes:

- Automatic Data Deletion: Once the AWS Lambda functions complete their processing tasks, any privacy-sensitive data is immediately removed from temporary storage or S3.

  - Lifecycle Policies: We enforce S3 Lifecycle Policies that automatically delete or transition objects containing sensitive data after a predefined time period (often immediately after processing).

 

- Data Masking and Anonymization: For cases where data needs to be retained for audit or analytical purposes, we apply data masking or anonymization techniques to ensure that personally identifiable information (PII) is removed.

 

4. Compliance and Monitoring

- Logging and Monitoring: All Lambda functions and S3 interactions are fully logged using AWS CloudTrail and Amazon CloudWatch to ensure complete visibility into all data processing activities.

  - Audit Trail: We maintain an audit trail of all activities to demonstrate compliance with regulations like GDPR, CCPA, and other global data protection standards.

 

- Regular Audits: We perform regular security audits and vulnerability assessments to ensure that our systems remain secure and compliant with the latest industry regulations.

 

5. Incident Response

In the unlikely event of a data breach or security incident, we have a robust incident response plan in place:

- Immediate Notification: Affected users will be notified promptly if their data has been compromised.

- Mitigation and Remediation: We will immediately take action to mitigate the impact of the breach and ensure that the root cause is addressed to prevent future incidents.

 

 

By using state-of-the-art AWS services and enforcing strict security controls, Mag-Filer division of Spokane Computer ensures that all data, especially privacy-sensitive information, is handled securely from the moment it enters our system until its safe deletion.

 

If you have any further questions or concerns regarding our data security practices, feel free to reach out to our Security Team at MagFiler@SpokaneComputer.com.

bottom of page