Security overview

Introduction

One of the key objectives of Karenapp is to provide the complete data security and information security to our customers. The information on this page is intended to provide transparency about how we store and protect that data. We will continue to expand and update this information as we add new security capabilities and make security improvements to our products.

Security Program

We have a security program in place that includes the following focus areas: product security, infrastructure controls (physical and logical), policies, employee awareness, intrusion detection, and assessment activities.

Our team has procedures and tools in place to respond to security issues and continues to evaluate new technologies to improve our ability to detect attacks against our infrastructure, service, and employees.

We periodically assess our infrastructure and applications for vulnerabilities and remediate those that could impact the security of customer data. Our security team continually evaluates new tools to increase the coverage and depth of these assessments.

Network Security

Karenapp defines its network boundaries using a combination of load balancers, firewalls, and VPNs. We use these to control which services we expose to the Internet and to segment our production network from the rest of our computing infrastructure. We limit who has access to our production infrastructure based on business need and strongly authenticate that access.

Karenapp follows Single sign-on token based authentication system – This ensures “One sign on in One device at Onetime”

Account Security

Customer’s Account Security is one of the key concern of Karenapp, as customers store their data in that account only. If the Account is secure, then the data will be secure. To improve the account security, Karenapp uses Secured Hash Algorithm – 256 Bit encrypted which ensure that the passwords used by the Karenapp customers will be known to them only. Even Karenapp team who handles the back end support will not know your passwords

You data belongs to your login generated at the time of registration. Authorized person who are eligible to view and to use the data will be verified by their e-mail id at registration time itself. Each time sign-on will ensure that Karenapp blocks any unauthorized entry. As long as your email is secure, you data is also secure.

DATA DESTRUCTION/DATA PORTABILITY

If a customer wants to leave Karenapp, they can leave the service quickly and easily.

The customer can get all of their data into, and out of, Karenapp at any time.

Karenapp desktop app let the customer to export all of their data in .CSV, .XLS or .PDF Formats. Karenapp mobile app let the customer to export all of their data in .CSV Format

Once the customer exports all their data and they can also delete their data

Customers may request Karenapp to delete their Account, Then the account will be deleted. Any account that is inactive for more than 6 months will be deleted automatically after informing the respective account holders.

CLOUD DATA SECURITY

Karenapp has partnered with AMAZON Cloud Services for Data Storage. As we all know, Amazon Cloud Services is one of the most secured cloud services in the globe. To Know more of AMAZON’s Cloud Security, Please follow,Amazon Security

The data stored in Amazon cloud has been stored on multiple devices across multiple facilities for a specific region. So More than 99.99% it is assured that there won’t be any total data loss, as the data is stored in multiple geographies across multiple servers and can be recovered from any of the facilities that is not affected by any natural calamity, cloud crash or security breach etc.

PRIVACY

Please see our privacy policy for more information