Graviton
Linh Community
  • What is Graviton?
  • Getting Started
    • Work Flow
    • First Steps
  • Administration
    • Manage Account
    • Manage Team
  • Dataset
    • Create Dataset
      • Upload data to dataset
      • Prerequisite: Upload data to S3
    • Export Data
      • Appendix: Download data from S3
    • Access Dataset
    • Import Data
    • Dataset Insights
  • Annotation
    • 2D Workspace
    • 3D Workspace
    • Task Inspection
    • Export Annotation Task
  • Accelerate
    • Instruction
    • Assign By Labels
    • Feedback
  • Other
    • Integration
    • FAQ
    • What's next
  • 🆕Release notes
    • Changelog
  • 🔒Data Security
    • Company Security
    • Cloud Security
    • Access Security
    • Workforce Risk Management
    • HIPAA (In Progress)
    • PDPA (In Progress)
    • GDPR (In Progress)
Powered by GitBook
On this page

Was this helpful?

  1. Data Security

Cloud Security

If you’ve identified a potential security flaw in our infrastructure or software, please let us know at g@linh.ai. We will look into the issue and get back to you.

1. Cloud infrastructure and data hosting security

We host all of our services through Amazon Web Services (AWS) that employs a robust security program with multiple certifications. Visit AWS Security to learn more about our provider's security processes.

2. Data Hosting Security

We host all of our data on Amazon Web Services (AWS) Singapore. Please reference the above vendor specific documentation linked above for more information.

3. Encryption at rest

All databases are encrypted at rest.

4. Encryption at transit

Our applications encrypt in transit with TLS/SSL only.

5. Vulnerability scanning

We perform vulnerability scanning and actively monitor for threats with ClamAV.

6. Logging and monitoring

We actively monitor and log various cloud services.

7. Business Continuity and Disaster Recovery

We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.

8. Incident Response

We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.

PreviousCompany SecurityNextAccess Security

Last updated 2 years ago

Was this helpful?

🔒