Security
Tekion’s products are built
with security at their core.
Data Storage Site Security
The sites where your data is stored, including data centers, offices, and off-site storage facilities, will have appropriate and physical security controls.
These measures include:
Network Security
The networks on which your data will be transmitted will be protected from unauthorized access or infiltration, either internally or externally.
The measures that will be taken to ensure this includes:
Platform Security
The technology on which your data is stored, including servers, workstations and laptops, cloud service and other portable media will be protected from known threats by:
The measures that will be taken to ensure this will include:
Data Confidentiality
The confidentiality of your data will be maintained by protecting such data wherever it is stored, and whenever it is transmitted.
These processes and procedures may include:
Data Access
Your data will be accessed only by Tekion authorized personnel through such means as:
Data Processing
We will ensure that appropriate aspects of good security practice are enforced when processing any of your data.
These processes include:
Staff and 3rd Party Security Procedures
We will ensure and maintain the integrity of personnel accessing your data by:
Third party subcontractors will be bound to technical and organizational measures that are at least as rigorous as the measures that We commit to You. We continuously review these measures and update them as needed to keep in line with industry standards. If requested, We will provide You with a description of our current measures.
Data Breach Procedures
We have established a set of data breach security procedures that include the following elements:
Availability and continuity
System availability is our top priority. To that end, we maintain multiple geographically diverse data centers and have implemented robust disaster recovery and business continuity programs. For more information on our service levels, please see Our Service Level Agreement.
Security built upon a strong foundation
As an end-to-end cloud native platform, our products and services leverage the state-of-the-art security provided by Azure and AWS to keep your data and our products secure.
Click the following links for more information on how Azure and AWS secure your information in their data centers.
Frequently Asked Questions
Does Tekion have any internal policies regarding data privacy and information security?
Tekion has formal policies and procedures addressing how we develop, implement, maintain, and improve our robust information security program. We also have several internal policies governing how our employees and contractors access, store, and secure customer data. These policies follow a similar format, have dedicated owners, and committed review periods. The policies cover a variety of topics ranging from securing our employees’ assets to responding to security incidents.
Who has access to our data?
Access to your data is generally limited to the following recipients: (1) our employees and contractors who require access to develop our products and services and to provide you with customer support (including employees of Tekion entities); (2) third-parties that you authorize us to share data with (e.g., third-party integrations that you use in your business); (3) third-party partners, including our sub-processors, that we use to develop and support our products and services (e.g., our cloud service providers and OEMs). In some limited circumstances, we may also need to share your data with third-parties for legal purposes (e.g., in connection with a legal action or for tax purposes). However, in all instances, we share only the data that is necessary to fulfill the above purposes. For more information about how we use and share data, please see our privacy policy.
Additionally, our products have audit trails to give customers visibility over access to their data in Tekion’s systems, including their employees and third-party vendors. Please contact your solutions specialist for more information on obtaining this information.
Do you have an appointed information security officer?
Yes – please contact privacy@tekion.com for more information.
Does Tekion use multi-factor authentication?
Yes. Multi-factor authentication (MFA) is one of several tools that we use to secure data in our products and our internal systems. Authorized Tekion employees and contractors may only access Tekion systems and databases holding customer data through MFA. On the product side, MFA is enabled by default.
Do you have a vulnerability management, penetration testing or bug bounty programs? If so, which apply?
Yes, Tekion has a vulnerability management program. We also regularly conduct vulnerability assessment and penetration testing (VA/PT) as well. While we do not have a formal bug bounty program, we promptly investigate any reported security flaws and risks and address them as quickly as possible. To report a potential security risk, please contact security@tekion.com.
Do you have Service Level Availability Policy (SLA) in place and communicated to the customer?
Yes, Please click here for the Service Level Availability Policy (SLA) and it has been posted on our website (Tekion Home page >> Legal >> Tekion® ARC Service Level Agreement)
How will Tekion notify me if there's a security incident affecting my data?
In the event of a confirmed security incident affecting your data, Tekion will:
1. Notify you promptly via email to your designated contacts, within any timeframes required by applicable law
2. Provide incident details including what happened, what data was affected, potential harm, and remediation steps taken
3. Support your notification obligations by providing information you need to notify your customers, if required
To ensure timely notification, please keep your contact information current in our system. For details, see our Data Processing Addendum.