Information Security Policies
Last Updated: April 15th 2020
Argyle takes our security as a number one priority. If you have specific questions or concerns, contact us at email@example.com
Specific role enabled access controls are enforced at each layer of infrastructure. Multi-factor authentication is required for access to Argyle infrastructure. All application and user access logs are stored centrally and monitored.
All operations on personally identifiable information (PII) are recorded in tamper proof write-only audit logs. The logs are stored indefinitely and are regularly checked for unexpected activity.
Argyle regularly undergoes both internal network penetration tests and security audits. All code is reviewed by a peer review system.
The Argyle API only allows client requests using strong TLS protocols and ciphers. Communication between Argyle infrastructure and data platforms is transmitted over encrypted tunnels.