Skip to content

Home

Welcome

Welcome to the Adminflow Security & Compliance Center, your trusted resource for understanding how we protect and secure your data. Here, you’ll find detailed information on our security practices, compliance standards, and commitment to maintaining the highest levels of data protection. From access control and cloud security to risk assessments and data privacy, we prioritize transparency and resilience at every layer of our operations to keep your information safe.

Terms & conditions

Here are the Terms of use for the Adminflow service, detailing user responsibilities, pricing, account management, data privacy, and device requirements. This document outlines essential terms, such as security protocols, payment procedures, and limitations of liability. It also explains user rights regarding personal data under Norwegian law and includes information on electronic agreements, changes to subscriptions, and service termination processes.

Security Overview

At Adminflow, safeguarding our customers' data is our highest priority. We are fully committed to maintaining the confidentiality, integrity, and availability of the information we handle, and we implement robust measures to ensure that our services operate in a secure and reliable manner. Read more about Security

Bug Bounty

The Adminflow Bug Bounty program invites security researchers and users to responsibly disclose any vulnerabilities they may discover within our platform. Your contributions help us continuously enhance the security and privacy of our systems, ensuring a safer experience for all. By reporting vulnerabilities through our program, you contribute to the integrity of our platform, allowing us to address issues swiftly and maintain high security standards. We value your insights and are committed to acknowledging valid findings that meet our Bug Bounty guidelines.

Data Security Measures

Adminflow employs multiple layers of security to protect your data. This includes:

  • Encryption: All sensitive data is encrypted both in transit and at rest using industry-standard encryption protocols (e.g., TLS and AES-256). This ensures that your data remains protected from unauthorized access.

  • Access Control: Access to systems and data is strictly controlled based on role-based permissions. We enforce strong password policies and suggest two-factor authentication (2FA) to provide an extra layer of security.

  • Data Backup and Recovery: Regular backups are conducted to ensure that all data is safely stored and can be restored in the event of an incident. These backups are stored securely and are subject to the same security protocols as our live data. Snapshot of database is generated daily and stored for 15 days.

  • Network Security: Our network infrastructure is designed with security in mind, utilizing firewalls and other AWS-provided security tools.

Compliance with Regulations

Adminflow ensures full compliance with applicable data protection regulations, including:

  • GDPR: We adhere to the principles of the General Data Protection Regulation (GDPR) to ensure that personal data is collected, processed, and stored in a lawful and transparent manner. Read more: how we handle GDPR and our DPA
  • ISO 27001: We're in a process of aligning our security practices align with the internationally recognized ISO 27001 standards for information security management, guaranteeing that we maintain rigorous controls over the security of your data.

Security Awareness and Training

Security is a shared responsibility, and at Adminflow, we emphasize this through regular training programs for all employees. Our team is equipped with the knowledge and skills necessary to identify potential security risks and follow best practices for data protection. Read more about security

Continuous Improvement

Adminflow is committed to the ongoing improvement of our security processes. We continually assess and refine our security measures to ensure they meet or exceed industry standards and address emerging threats in the cybersecurity landscape.

Incident Response

In the event of a security incident, Adminflow has a comprehensive incident response plan in place. This ensures that we can quickly and effectively manage any security breaches, minimize their impact, and notify affected customers in accordance with regulatory requirements.

For information about how we use cookies to enhance your experience and improve our services, please refer to our full Cookie Policy. This policy provides details on the types of cookies we use, their purpose, and how you can manage or disable cookies if desired. By continuing to use Adminflow, you agree to our use of cookies as outlined in our policy.

Conclusion

Security is an integral part of Adminflow’s mission to provide reliable and secure services. We work tirelessly to ensure that our customers’ data is protected at every level, and we continuously invest in new technologies and practices to stay ahead of potential threats.

For further information on Adminflow’s security practices, please contact us at Adminflow Support.