LOGIN

Information Security is Essential to our Business and your Consideration!

Information security refers to protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The goals of information security include protecting the confidentiality, integrity and availability of information".

Contract Guardian Support Team

 Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement that we take very seriously.  Below is a discussion of what we consider some of the most aggressive contract management security efforts in the industry  to protect your data both in the Cloud and On Premise.

Contract management security for healthcare

  • E-Verify - Contract Guardian E-Verifies all new employees
  • BAA - We offer to sign a comprehensive Business Associate Agreement
  • Multilevel application security
  • Two-Factor Authentication
  • Redundant Backup and Archives (See Data Center)
  • Own Your Data - It is your data and can access/download at your discretion
  • Document Retention Policies - Unlimited for your requirements
  • High Availability and Failover
  • Disaster Recovery to Remote Centers
  • Physical Security Systems
  • Biometric
  • Card and PIN Access
  • Combination Lock Access for Cabinets
  • 24/7/365 Video Surveillance
  • Environment Controls (HVAC, Generators, Fire Retardation)
  • Antivirus - operates bi-directionally and will detect and quarantine viruses
  • Web Filtering
  • Intrusion Prevention
  • SSAE 16 (SAS 70) - Compliant Facilities for Increased Security
  • EU Safe Harbor - the European Commission's Directive on Data Protection
  • Contract Vaulting - In addition to normal backups, all of the contracts are vaulted at a second data center. Contract Guardian uses the services of UCG Technologies.  UCG Technologies Cloud Backup, DR & HA is a premier managed risk mitigation and business continuity planning service for secure online backup and recovery.  UCG Technologies backs up an entire organization's business-critical data to their secure data centers.  Safe and Off-site, the Encrypted Data is Available online at all times for Immediate, user-initiated Recovery.
  • Frequent vulnerability scanning: OS command injection, SQL injection, ASP.NET tracing enabled, File path traversal, XML external entity injection, LDAP injection, XPath injection, XML injection, ASP.NET debugging enabled, HTTP PUT enabled, Cross-site scripting (stored), HTTP header injection, Cross-site scripting (reflected), Flash cross-domain policy, Silverlight cross-domain policy, HTML5 cross-origin resource sharing, Cleartext submission of password, Referer-dependent response, User agent-dependent response, Password returned in later response, Password field submitted using GET method, Password returned in URL query string, SQL statement in request parameter, Cross-domain POST, ASP.NET ViewState without MAC enabled, Open redirection, SSL cookie without secure flag set, Cookie scoped to parent domain, Cross-domain Referer leakage, Cross-domain script include, Cookie without HttpOnly flag set, Session token in URL, Password field with autocomplete enabled, Password value set in cookie, File upload functionality, Frameable response (potential Clickjacking), Browser cross-site scripting filter disabled, TRACE method is enabled, Database connection string disclosed, Source code disclosure, Directory listing, Email addresses disclosed, Private IP addresses disclosed, Social security numbers disclosed, Credit card numbers disclosed, Robots.txt file, Cacheable HTTPS response, Multiple content types specified, HTML does not specify charset, HTML uses unrecognized charset, Content type incorrectly stated, Content type is not specified, SSL certificate,

Contact and Support


REQUEST DEMO
800.211.8798 Ext. 140

CONTACT US
800.211.8798

SUPPORT
800.211.8798 Ext. 201


Famous Contract Quotes

"The only chains you should wear in life are the chains of commitment."

Shannon L. Alder

Contract Management Technology