Thousands of organizations have entrusted GoodDay with their work data, and we make it a priority to take our users’ security and privacy concerns seriously. We strive to ensure that user data is handled securely. GoodDay uses some of the most advanced technology for Internet security that is commercially available today. This Security Statement is aimed at being transparent about our security infrastructure and practices, to help reassure you that your data is appropriately protected.
All GoodDay information systems and infrastructure are hosted in world-class data center at Equinix and AWS facilities. These facilities feature 24/7 manned security, fully redundant power backup systems, physical access controls, biometric authentication systems, extensive seismic bracing, the latest in early-detection smoke and fire alarms, and digital surveillance systems. All server and network components are constantly monitored by internal GoodDay staff and by the colocation providers.
Over years of service, GoodDay has consistently met or exceeded 99.9% uptime, ensuring customers can access their work data without interruption. Our systems have built-in redundancy to withstand failures and are constantly monitored to keep your work uninterrupted.
GoodDay is running real-time database replication, to ensure that customer data is both backed up and available on redundant and geographically dispersed servers, physically separated from the application servers, aiming to ensure fault tolerance.
Access Control: Secure VPN, 2FA (two-factor authentication), and role-based access is enforced for systems management by authorized engineering staff.
Encryption in Transit: By default, our survey collectors have Transport Layer Security (TLS) enabled to encrypt respondent traffic. All other communications with the GoodDay platform are sent over TLS connections, which protects communications by using both server authentication and data encryption. This ensures that user data in transit is safe, secure, and available only to intended recipients
Logging and Auditing: Central logging systems capture and archive all internal systems access including any failed authentication attempts.
Testing: System functionality and design changes are verified in an isolated test “sandbox” environment and subject to functional and security testing prior to deployment to active production systems.
GoodDay uses proven transport layer security (TLS) technology from the most trusted providers to encrypt all data transmissions between your device and our servers, commonly referred to as on-the-wire encryption. TLS technology is designed to protect your information by establishing trust of our servers through a trusted third party, and GoodDay.work – Security Statement / July 2017 then creating a secure channel through which your data can pass to our servers protected from malicious actors. We also use AES 256 encryption before data is durably stored, commonly referred to as at-rest-encryption. A dedicated firewall provides a strong barrier of network security from the internet and we utilize Amazon’s S3 service to store and serve uploaded files.
Single Sign-On: For Enterprise accounts GoodDay supports SAML 2.0 integration, which allows you to control access across your organization and define authentication policies for increased security.
We have implemented policies and procedures designed to ensure that your data is secure and backed up to multiple physical locations. Our team is continually evaluating new security threats and implementing updated countermeasures designed to prevent unauthorized access to or unplanned downtime of the Subscription Service. Access to all production systems and data is limited to authorized members of the GoodDay Technical Operations team.
If you have any question or security concerns please contact us at email@example.com