Last Updated: 27 September 2017
Aspose Cloud uses Amazon EC2 cloud servers. Using an industry standard like Amazon helps guarantee the security and resilience of the service. Amazon has attained a number of certifications that affirm that they have stringent, working internal controls.
Amazon safeguards the physical security of their servers. Servers are located in non-descript facilities, and critical facilities have extensive setback and military grade perimeter control. Access to data centers requires two-factor authentication at three points.
The host operating system is kept secure by internal processes and procedures. The guest operating system is entirely controlled by Aspose Cloud. Amazon administrators do not have access to it. By default, an inbound firewall denies all traffic to the host servers.
Amazon systems are built with extensive redundancy. Aspose Cloud backs up data on a daily basis. All access is logged and tracked for auditing purposes.
Account passwords are encrypted and filtered out from all application and system logs. Passwords are not visible to anyone.
After 30 minutes of inactivity, you are automatically signed out of your user account.
Sign out from your account to prevent someone from using your computer to access your account without your authorization. Keep your user name and password secure and not to disclose it to any third-party. In case a third-party gains unauthorized access to your account due to any act or omission on your part, you are solely responsible for any loss caused.
Credit Card Safety
Aspose Cloud does not retain any credit card information provided by you. When we charge, such information is transferred directly to, and processed by, our payment gateway.
To protect user information, Aspose Cloud’s payment gateway uses the latest 256-bit Secure Socket Layer (SSL) technology for secure transactions. The payment gateway is certified as compliant with card association security initiatives including Payment Card Industry (PCI) and Cardholder Information Security Program (CISP) standards for data protection.
File Retention Policy
Aspose Cloud allows customers to optionally upload files to Aspose Cloud’s own storage. None of these files are accessible to any person other than the customer himself. The rules behind how long files are retained is explained in the File Retention Policy.