At ItaQuod, the security of our application and your data is a top priority. That’s why we devote significant resources to continually develop our security infrastructure.  We use industry best practices to establish and maintain a secure online experience. And we always remember that your data…is your data. We never touch your data without your explicit permission, and we make it easy to export whenever needed.

Data Encryption
ItaQuod leverages the strongest encryption products to protect customer data and communications, including 256 bit extended-validation security certificate provided by GoDaddy. This type of secure connection is comparable to the online security provided by many major banks and financial institutions. You can verify that you are indeed connected to ItaQuod via a secure connection. The lock icon in the browser indicates that data is fully shielded from access while in transit.

Secure Data Centers  
ItaQuod’s data is stored in Microsoft Azure Services Data Centers. Microsoft’s services are provided in accordance with security best practices both online and offline. Learn more about Microsoft’s security practices.

User Authentication
Users access ItaQuod only with a valid username and password combination, which is encrypted via TLS while in transmission.  An encrypted session ID cookie is used to uniquely identify each user.  For added security, the session key is automatically scrambled and re-established in the background at regular intervals.

Application Security
Our robust application security model prevents one ItaQuod customer from accessing another’s data.  This security model is reapplied with every request and enforced for the entire duration of a user session.

Redundant Backups
All customer data is automatically backed up intra-day in geographically redundant locations.

Server Management Security
All data entered into the ItaQuod application by a customer is owned by that customer.  ItaQuod employees do not have direct access to the ItaQuod production equipment, except where necessary for system management, maintenance, monitoring, and backup.