Tempora Data Protection and Privacy

What features you can look forward to soon!

Data Protection
Data Access

At Tempora our client data is a matter we take seriously. All Tempora data is stored locally to the relevant client, for example our UK clients will have their data stored within the UK, unless they request otherwise. All data in motion is protected with HTTPS protocols, to ensure it can't be intercepted.  Real-time intrusion detection is used by both Tempora and Microsoft Azure to ensure integrity of the network infrastructure. 

Whilst using Tempora, all data, whether it is sensitive or not, is encrypted with 128-bit AES encryption, which is currently one of the most secure encryption methods used and considered logically unbreakable. 

Tempora operates an ‘as long as necessary’ data approach, data deletion will be done so immediately upon request, unless instructed to store the data, which otherwise means we will store it securely for a few months, before promptly destroying the data.

 

Tempora Data Storage

Tempora utilises Microsoft Azure as a cloud computing platform. Azure has been accredited to ISO/IEC 27000, 27001 and 27018 standards. This means that Tempora clients can relax, knowing that their data will not be used for commercial ends or targeted advertising. The data will also be returned or transferred to the owner if required and securely disposed of within a short period of time of request. 

Using Azure means that we can geocache client's data in a region of their choice, with two back-up drives running at all time, to ensure >99% uptime and prevent any data loss in the unlikely event. 

 

Data Privacy

 

Data Held In Tempora

Tempora can guarantee that stored information won’t be provided to or sold to 3rd parties, or used for unsolicited marketing.

As well as using cutting edge security software, Tempora also ensure that no more than 3 people have access to your data at any one time, 2 of which are account directors. We have a full time security employee for grants procedural access to the data when required, with permission from the client. As an extra countermeasure, we also keep audit logs of data, the audit logs cannot be changed by anybody without a two-step verification from both our Technical and Managing Directors.