Data Protection
May 2 2023 7:51pmTrustworthy takes multiple steps to protect your data:
Encryption
Your Trustworthy data is encrypted to keep it safe, both at rest and in transit. Our security formula starts with Advanced Encryption Standard (AES) 256-bit encryption. We also use multiple techniques to make sure only you have access to your information.
Trustworthy encrypts all customers’ sensitive data to prevent unauthorized access, ensuring that your data stays secure.
Redaction
Our user interface redacts or hides sensitive information by default. To display this information, you can choose to show it to see the redacted information.
Redaction prevents wandering eyes from seeing sensitive information on your screen.
Aliasing/Tokenization
Trustworthy uses an industry-leading security technique called “aliasing” to protect your information. Aliasing removes sensitive data from Trustworthy servers and replaces it with a corresponding alias. This keeps the sensitive information protected and separate from your account.
The alias (token) has no exploitable meaning and can only be “de-tokenized” with the original tokenization platform. For example, if a cybercriminal gained unauthorized access to our database containing tokenized sensitive data, the alias would be useless to the attacker and neutralize the threat.
Logging
Trustworthy creates comprehensive audit logs of the events (by individual users) within each member account. This allows you to account for every change that has occurred within your account (and who made that change).
Having a complete record of events in your account provides transparency around all account changes.
Security Policies
Our security policies, controls, and standards cover a wide range of areas to include:
Information security
Incident response
Access control
Physical security
Network security
Vulnerability management
Software/systems development life cycle
Secure development
Change management
Vendor management
Disaster recovery
Business continuity
These policies ensure that your and your family’s information is kept safe every step of the way.