Protecting our client's data is fundamental to everything we do.
You control access
As a Timetabling Solutions client, you have the flexibility to invite users into your account to collaborate on your data. The person holding the subscription has control over who has access and what they can do. Our support staff cannot access your information unless you invite them to help. Please see our privacy policy for further information.
Data encryption
We encrypt all data between you and Timetabling Solutions using industry-standard TLS (Transport Layer Security), protecting your personal and timetabling data. Your data is also encrypted at rest when it is stored on our servers and encrypted when we transfer it between data centres for backup and replication.
Network protection
We have multiple layers of security controls protect access to and within our environment, including firewalls, intrusion protection systems and network segregation. Timetabling Solution’s security services are configured, monitored and maintained according to industry best practice. We partner with industry-leading security vendors to leverage their expertise and global threat intelligence to protect our systems.
Secure data centres
We use Microsoft Azure, South East Data Centre, which employs robust physical security controls to prevent physical access to the servers they house. These controls include 24/7/365 monitoring and surveillance, on-site security staff and regular ongoing security audits.
Security monitoring
Timetabling Solution’s security team continuously monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.
Custom Azure Storage
Our cloud applications allow a school to store all data files, log archives and export files in their own Azure Storage Account. This is configured by the school, in our Management Portal on https://timetabling.education (When using Azure Custom Storage, their is no visiable difference in the user interface)
What security measures do you have in place to protect data? Print
Modified on: Mon, 21 Oct, 2024 at 10:43 AM
Did you find it helpful? Yes No
Send feedbackSorry we couldn't be helpful. Help us improve this article with your feedback.