Do you capture or store my data? Follow
In short, yes, we capture and store this data, but we do so with privacy and security at the forefront. We have the ability to not store data if absolutely necessary as part of an InfoSec requirement, but by default, this data is hashed anonymously and used for only a couple critical functions.
Maintaining the privacy and security of personal data is paramount to Ekata. To ensure the privacy of
our customers and their sensitive data, the Ekata Identity Network operates on highly obfuscated
data. Ekata utilizes state-of-the-art controls to protect and process personal information:
- Encryption protects data in transit to and from customers
- Personal Data is obfuscated using cryptographic hashing and encryption algorithms
recommended by the NIST
- Annual third-party SOC 2 Type II audit for privacy, security, and confidentiality practices
All interactions between our customers and Ekata services are encrypted to meet or exceed the
Payment Card Industry standards. Within our secure cloud environments, personal information is
securely hashed and encrypted using NIST recommended methodologies.
- Encryption in Transit
- TLS 1.1 or higher
- Personal Information Anonymization
- SHA-2 512 hashing
- Encryption at rest
- KMS managed AES-256
If you have any questions or for more information, contact us at email@example.com.