ObituaryData.com
Username: Password: login-to-ObituaryData.com
    Not a Subscriber? Try it for Free!
corner1
round2.png

security-obituarydata.com Security
  ObituaryData.com ensures you are protected and your privacy is secure. The foundation of our security is based on strict access policy. Our data systems are protected by the most up to date firewall hardware and software. Multiple layers of security and real-time activity monitoring allows us to detect and prevent any intrusions. See below for more details:

Web and User Security
 
 
  • SSL Encryption: Users can determine whether to transmit and/or receive lists and result reports over secured, encrypted SSL connections. All other communications to www.ObituaryData.com are sent over SSL connections. Secure Sockets Layer (SSL) protects communications by using both server authentication and data encryption. This ensures that user data in transit is safe, secure, and available only to intended recipients.
 

  • SSL Certificate: ObituaryData.com is protected by Verisign┬« SSL Certificates. Verisign is the industry leader in SSL security certificates. The Verisign seal means that your transactions are safe. Click the Verisign seal for more information.

 

ABOUT SSL CERTIFICATES
 
 
  • Authentication: Our user data is stored by account-based access rules. User accounts have unique usernames and passwords that must be entered each time a user logs on. We also use session cookies to temporarily hold user authentication information for the duration of your session, however, we do not include the password of the user.  Users' passwords are generated by ObituaryData.com and can only be changed by the user once successfully logged in. The password must meet certain complexity requirements.
 
 
  • Privacy: Your List Data is not shared or retained on our servers. If a client submits data to ObituaryData.com for matching purposes, the data submitted by the client and the matched result files are immediately deleted from our servers once the client has confirmed receipt of results.
 
  Physical Security  
 
  • Data Centers: Our information systems infrastructure (servers, networking equipment, etc.) is located at third party SSAE 16/SOC 2 audited data hosting center in the United States.
 
 
  • Data Center Security: Our data center is manned by on-site, trained professional staff 24x7x365, ensuring responsiveness and reliability. Personnel are trained to follow policies and procedures to meet various audit criteria and security measurements. Our equipment is kept in locked cages.
 
 
  • Environmental Controls: Designed for efficiency and cost savings, our data center incorporates highly efficient cooling solutions to ensure consistent temperature and humidity levels at all times to protect mission critical technology. Our data center has raised floor cooling with cold aisle containment.
 
  Availability  
 
  • Power & Connectivity: All facility components (i.e. generators, UPS and cooling systems) throughout our data center are redundant. With this level of redundancy, we can perform regular preventative maintenance on the equipment with no impact to the customer. We also offer redundant network connections with multiple independent connections to the Internet.
 
 
  • Continuous Uptime: Continuous uptime monitoring, with immediate escalation to our staff for any downtime.
 
  Network Security  
 
  • Testing: System functionality and design changes are verified in an isolated test environment and are tested for functionality and security prior to deployment to production.
 
 
  • Firewall: Firewall restricts access to most ports.  SFTP access is restricted to only approved IP addresses.
 
 
  • Intrusion Detection/Intrusion Prevention: Intrusion detection systems and intrusion prevention systems detect, mitigate and/or prevent interference or access from outside intruders.
 
 
  • Patching: Latest security patches are applied to all operating system and application files to mitigate newly discovered vulnerabilities
 
 
  • Access Control: Secure VPN, multifactor authentication, and role-based access is enforced for systems management by authorized engineering staff.
 
 
  • Logging and Auditing: Central logging systems capture and archive all internal systems access including any failed authentication attempts.
 
  Storage Security  
 
  • Backup Frequency: Backups occur daily to a centralized backup system for storage in multiple sites.
 
  Organizational & Administrative Security  
 
  • Employees: We perform background screening on all new employees and provide proper training in security and technology.
 
 
  • Service Providers: We screen our service providers and bind them under contract to appropriate confidentiality obligations if they deal with any user data.
 
 
  • Access: Access controls to sensitive data in our databases, systems and environments are set on a need-to-know / least privilege necessary basis.
 
 
  • Audit Logging: We maintain and monitor audit logs on our services and systems.
 
 
  • Information Security Policies: We maintain internal information security policies, including incident response plans, and regularly review and update them.
 
  Software Development  
 
  • Coding Practices: Our engineers use best practices and industry-standard secure coding guidelines to ensure secure coding.
 
  Client Security Responsibilities  
 
In order to keep your data protected you must maintain the security of your account.  Remember to create unique passwords that are not easy to guess and store them in a safe place.
 
 
Click Here to view our Privacy Policy.

Click Here to view our Terms of Service
 
corner3
corner4