Idera-Inc-Facelift-logo

FusionCharts Security Statement

FusionCharts, Inc. (“FusionCharts”), is committed to respecting and protecting the privacy of its customers, partners and website visitors (collectively “You” or “Your”). For more information about our Privacy Statement, click here..

The security of your personal information is very important to FusionCharts. We use robust security measures, which encompass both technical and organizational security controls, to prevent data loss, information leaks, or other unauthorized data processing operations. For example, FusionCharts requires that its processors and sub-processors (collectively, “Vendors”) have implemented and maintain a security program in accordance with industry standards, specifically FusionCharts Vendors shall include the following security program:

I - Physical Access Control: Unauthorized persons shall be prevented from gaining physical access to premises, buildings or rooms where personal data processing systems are located. Vendors have implemented the following controls:

  1. prevent unauthorized individuals from gaining access to the processor’s premises.
  2. restrict access to data centers were data servers are located.
  3. use video surveillance and intrusion detection devices to monitor access to data processing facilities.
  4. ensure that individuals who do not have access authorization (e.g. technicians, cleaning personnel) are accompanied at all times when accessing data processing facilities.

II – System Access Control: Data processing systems must be prevented from being used without authorization. Vendors have implemented the following controls:

  1. implement measures to prevent unauthorized personnel from accessing data processing systems.
  2. provide dedicated user IDs for every authorized personnel accessing data processing systems for authentication purposes.
  3. assign passwords to all authorized personnel for authentication purposes.
  4. ensure that all data processing systems are password protected to prevent unauthorized persons accessing any personal data: (a) after boot sequences; and (b) when left unused for a short period.
  5. ensure that access control is supported by an authentication system.
  6. implement a proper process to adjust administrator permissions when an administrator leaves the processor (or processor function).

III – Data Access Control: Persons entitled to use a data processing system shall gain access only to the data to which they have a right of access, and personal data must not be read, copied, modified or removed without authorization in the course of processing or use and after storage. Vendors have implemented the following controls:

  1. ensure that personal data cannot be read, copied, modified or removed without authorization during processing or use and after storage.
  2. ensure that the personnel who use the data processing systems can access only the data to which they have a right of access.
  3. restrict access to files and programs based on a "need-to-know-basis".
  4. store physical media containing personal data in secured areas.

FusionCharts incorporates encryption, incident management, network and system integrity, and availability and resilience requirements into its security program.

FusionCharts uses standard security protocols mechanisms to exchange the transmission of sensitive data such as credit card details. When you enter sensitive personal information such as your credit card number on our site, we encrypt it using secure socket layer (SSL) technology.

In the event that your personal information is acquired, or is reasonably believed to have been acquired, by an unauthorized person and applicable law requires notification, FusionCharts will notify you by e-mail or mail. FusionCharts will give you notice promptly, consistent with the reasonable needs of law enforcement and/or FusionCharts to determine the scope of the breach and to investigate and restore the integrity of the data system.

If you have additional questions about privacy, please contact us at [email protected]