004-encryption.png

Data Encryption

We are committed to maintaining the security of personal information. We have put in place appropriate security procedures and technical and organisational measures to safeguard your personal information such as Secure SSL encryption of data transfers, Data protection using encrypted passwords, and secure cloud storage.

 
005-data-privacy.png

Data Security

Data security at Lean Station is the highest priority. Securing systems, applications, and data begins with identity-based access controls. The identity and access management features that are built into Lean Station products and services help protect your organizational and personal information from unauthorized access while making it available to legitimate users whenever and wherever they need it.

 
organization.png

Employee Access

Strict controls have been placed over employees' access to user data. From time to time, for debugging purposes, we might need to access sensitive user data. Any such access only takes place after obtaining consent.

 
001-user.png

Privacy policy

For details, please refer to our privacy policy.

 

Cloud & Infrastructure Security

We take Cloud and infrastructure security very seriously at Lean Station. We have our cloud servers hosted with Amazon's AWS. As an Lean Station customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations.  More details can be found on the  AWS Cloud Security Page

 
 
003-computer-secure.png

Software Security

Software is secure by design. All our software is designed from the ground up to be secure. Care has been taken to minimize impact in case a security vulnerability is discovered.

 
002-secure-smartphone.png

Security Assurance

Our security assurance process ensures that security requirements have been established for all software used in Lean Station's products and services, whether on the client or on the server. Security requirements are established for software development and operations & maintenance processes. Each code review includes an evaluation of the security requirements. We regularly perform an evaluation of software security and requirements