Cyber Security
- User Access Management
- How is data encrypted?
- Where is our data stored?
- Data Breach Response Procedure
- How is individual client data isolated/segregated?
- How often are backups scheduled?
- Security Event Logging
- What is the Service Level Agreement (SLA) for the Robot Platform?
- Development Environment Information
- System & Application Patch/Vulnerability Management
- Which region is the solution hosted in?
- Security Incident Management