How Jesmond handles your data.
We take data security seriously. Complete information security documentation is in preparation and will be published before any production deployment. The headline points are set out below as a placeholder.
Hosting. Jesmond is hosted on UK or EU infrastructure as agreed with each client.
Data segregation. Each client tenant is logically separated. No cross-tenant access is permitted.
Encryption. All data is encrypted in transit and at rest.
Retention. Retention policies are configurable. The default is to retain investigation records for the period required by the client’s policies, then delete.
Subprocessors. A current list of subprocessors will be available on request and is included in the data processing agreement.
Penetration testing. Independent penetration testing will be commissioned before the production launch.
If you need information now, write to gus@defendthis.co.uk.