Your data is stored on protected, enterprise level servers

Secure

Your Data is Safe

As a Canadian company, i-Sight adheres to Canada’s stringent regulations for information privacy and security, allowing data to be transferred from EU locations.

Hundreds of companies around the world trust i-Sight to keep their most sensitive data secure. Our reputation for security and our stringent data protection regulations make i-Sight the best choice for secure investigative case management solutions.

Every year i-Sight is audited by a third-party security firm to validate compliance and obtain SSAE SOC Type II accreditation.

Request an i-Sight Demo

Complete the form to request a free i-Sight Demo

Request a Demo
Questions
1-800-465-6089 | info@i-sight.com

Encryption

With i-Sight, everything is password protected and encrypted. Your data is automatically backed up daily and stored in multiple locations to ensure data is never lost. Any information added to i-Sight is stored in an encrypted format and uses SSL to move transmit data across the Internet.

i-Sight Fact

i-Sight complies with the most stringent data privacy laws in the world

Secure


Centralized File Storage

During the course of an investigation, investigators collect and generate hundreds, even thousands, of documents and files. Notes, evidence, audio and video files, investigation interviews, photos and scanned documents, etc, can clutter an investigator’s computer and make protection and retrieval challenging. i-Sight keeps them all organized and secure in one central location on our servers, dated and time-stamped, protected and inaccessible to anyone who shouldn’t have access to them.

When your files are hosted on our secure servers, they are protected from unauthorized deletion, copying, alteration, theft, corruption and curious co-workers.

Regulatory Compliance

Most jurisdictions around the world have implemented legislation to govern the handling and use of personal information.

We understand that many organizations operate across multiple jurisdictions and we follow a set of procedures to ensure compliance with:

  • (HIPAA) Healthcare Insurance Portability and Accountability Act
  • (GLB) Financial Modernization Act of 1999 or Gramm-Leach-Bliley
  • (PIPEDA) Personal Information Protection and Electronic Documents Act of 2000
  • EU Data Protection Directive
  • EU E-Privacy Directive

i-Sight is responsible for protecting all personal information under its custody or control and has designated a privacy officer who is responsible for our compliance with privacy principles.

Privacy for the Global Enterprise

i-Sight is responsible for protecting all personal information under its custody or control and has designated a privacy officer who is responsible for our compliance with privacy principles.

Many of our clients are conducting investigations around the world. i-Sight employs access roles to ensure access to personal information is only available to people within the appropriate jurisdictions. Data masking is employed to ensure managers can view aggregate case trends and even case details without exposing personal information.


Data Centers

i-Sight maintains state-of-the-art data centers that provides security, redundancy in all critical systems and an on-site network operation center ensuring 24 X 7 support.

Data center access control and physical security includes:

  • Biometric security enforced through an iris scanner
  • Guarded entrances with security cameras to scan and digitally record the interior and exterior of the facility 24 hours a day
  • Video surveillance that incorporates low-light technology to allow clear visibility at night
  • Unified security breach alarm with access monitoring
  • Client security escort
  • Electronic motion detectors
  • Reinforced exterior and interior walls
  • Raised floors for secure routing of cables
  • Secure staging rooms for setup and maintenance of equipment

Only i-Sight’s network and application server personnel have access to the hosting environment. Logs are maintained of all visits and the purpose of those visits.

Other security features at the data center include:

  • Environmental controls
  • Enhanced power backup
  • Fire detection and suppression systems
  • Secure transmission of data
  • Network protection
  • Disaster recovery program
  • Daily backup

Third Party Audits

Every year i-Sight is audited by a third-party security firm to validate compliance and obtain SSAE SOC 2 Type II accreditation.

Procedures

Your data is stored on secure, enterprise level servers in state-of-the-art, highly secure data centers. With traditional software, employees save data on their desktop, laptop or USB drives. Laptops are stolen, desktops aren’t backed up properly and it’s difficult to keep up with security patches and updates.

aicpa-soc-logo

Scalable →

Configure i-Sight for any number of users across departments, regions and countries.

Web Enabled & Mobile Optimized →

Access files from anywhere with an internet connection, at any time and on any device that can access the web.

Integrate with Existing Systems →

Integrate i-Sight with existing systems to pull information and feed data into systems for updating and analysis.