Thank you for your questions!
I would like to reply as follow:
1. About the protection of password, personal profiles data and main data:
*How do you back up accumulated data? Using cloud service such as Google Cloud Platform, for example?
-- We use Amazon.
*How do you prevent viruses to attack Web programs and Apps? Running some security programs?
-- We don't install any unnecessary program on our server, so there is no virus problems.
*How do you build structures for any users not to gain access to others' data?
-- Every single user's data are separate from others, so any user is unable to get access to others' data.
*What kind of encryption algorithm do you adopt? Using codes such as AES-256, for example?
-- We apply SHA1 and SHA512-CRYPT.
2. About the physical security of your Data Center:
*Do you have any objective certificates, for example, the SOC inspection proof?
-- Sorry we're not sure what SOC is.
*How do you regulate and educate your employees to be away from the customers' data?
-- Only when both of the two administers (the only two) provide their own passcode and password can they operate to the database, and the only operation they can do is for maintenance. No one is able to access any user's data.
3. About the encryption of data transfer of webs and emails:
*What kind of protocol do you use? Adopting codes safe enough such as HSTS and TLS?
-- We use TLS.
*What kind of encryption algorithm do you adopt? Using codes such as AES-256, for example?
-- We apply SHA1 and SHA512-CRYPT.
If any further questions, please feel free to contact us.
Nice day!
This is the question I wrote in Japanese before.
Once again I will question in English. Excuse my poor English.
********************
1. About the protection of password, personal profiles data and main data:
*How do you back up accumulated data? Using cloud service such as Google Cloud Platform, for example?
*How do you prevent viruses to attack Web programs and Apps? Running some security programs?
*How do you build structures for any users not to gain access to others' data?
*What kind of encryption algorithm do you adopt? Using codes such as AES-256, for example?
2. About the physical security of your Data Center:
*Do you have any objective certificates, for example, the SOC inspection proof?
*How do you regulate and educate your employees to be away from the customers' data?
3. About the encryption of data transfer of webs and emails:
*What kind of protocol do you use? Adopting codes safe enough such as HSTS and TLS?
*What kind of encryption algorithm do you adopt? Using codes such as AES-256, for example?
All the above questions were made with referring to the security specifications of EVERNOTE.
Of course I'd much appreciate your explanation on security measures that you adopt other than the aboves!
-
05/16/2018 02:39#1Doit.im
-
05/18/2018 10:35#2PRO
Thank you for your clear explanation. I am almost satisfied.
"SOC inspection" is one example of business operating audit including security assurance that might be common in US. (Sorry if my wording was insufficient.)
I found the following English articles in Evernote company's website and Wikipedia.
I'd be happy if you have passed any similar audit.
https://help.evernote.com/hc/en-us/articles/209005197-Is-Evernote-or-Evernote-Business-SSAE-16-compliant-
https://en.wikipedia.org/wiki/SSAE_16
https://en.wikipedia.org/wiki/Statements_on_Auditing_Standards_(United_States)
-
05/21/2018 08:12#3PRO
I have one more question.
I understood that you applied SHA1 as an encryption algorithm, however, do you have any plan to shift it to SHA2?
-
07/19/2018 02:13#4Doit.im
@huizijian This will be shifted later. Thank you very much for your proposal!
Nice day!