Back

Data Protection

EOT Intel

Your schedules and claims protected like bid submissions.

Legal

Written by

EOT Intel

Back

Data Protection

EOT Intel

Your schedules and claims protected like bid submissions.

Legal

Written by

EOT Intel

Back

Data Protection

EOT Intel

Your schedules and claims protected like bid submissions.

Legal

Written by

EOT Intel

Quick Links

1 — Security Infrastructure

  • Multi-layer encryption

  • Tenant data isolation

  • Data residency configurable

  • Row Level Security of Data

  • 24/7 security monitoring

  • Forensic audit trails

2 — Access Control

  • Granular Role-based permissions

  • Session management

  • Access logging

  • Automated revocation

  • Suspicious Login detection

  • IP Address whitelisting

3 — Encryption Standards

  • AES-256 encryption for project files

  • TLS 1.3 protocols

  • End-to-end encryption

  • Data-at-rest protection

  • Evidence chain protection

  • Secure API endpoints

  • Zero-knowledge architecture

4 — Network Security

  • DDoS protection

  • Web application firewall

  • Network segmentation

  • Traffic monitoring

  • Port security

  • Real-time threat blocking

5 — Infrastructure Security

  • Automated security patches

  • Vulnerability scanning

  • Penetration testing

  • Container isolation

  • Resource sandboxing

  • Regular security audits

6 — Monitoring & Detection

  • 24/7 project access logs

  • Unusual export detection

  • Bulk download alerts

  • Data exfiltration prevention

  • Insider threat monitoring

  • Incident response

  • Audit logging

7 — Backup & Recovery

  • Daily P6 schedule backups

  • 90-day claim history

  • Evidence versioning

  • Automated backups

  • Disaster recovery

  • Business continuity

  • 99.9% uptime guarantee for SLA holders

8 — Framework

  • PIPEDA ready (Canadian privacy)

  • CCPA ready (California)

  • Construction industry standards

  • ISO 27001 aligned

  • Legal hold capable

  • Court-admissible logs

  • Regular audits