Data Protection

May 2 2023 7:51pm

Trustworthy takes multiple steps to protect your data: 

Encryption

Your Trustworthy data is encrypted to keep it safe, both at rest and in transit. Our security formula starts with Advanced Encryption Standard (AES) 256-bit encryption. We also use multiple techniques to make sure only you have access to your information.


Trustworthy encrypts all customers’ sensitive data to prevent unauthorized access, ensuring that your data stays secure. 


Redaction

Our user interface redacts or hides sensitive information by default. To display this information, you can choose to show it to see the redacted information.


Redaction prevents wandering eyes from seeing sensitive information on your screen.


Aliasing/Tokenization

Trustworthy uses an industry-leading security technique called “aliasing” to protect your information. Aliasing removes sensitive data from Trustworthy servers and replaces it with a corresponding alias. This keeps the sensitive information protected and separate from your account. 


The alias (token) has no exploitable meaning and can only be “de-tokenized” with the original tokenization platform. For example, if a cybercriminal gained unauthorized access to our database containing tokenized sensitive data, the alias would be useless to the attacker and neutralize the threat.


Logging

Trustworthy creates comprehensive audit logs of the events (by individual users) within each member account. This allows you to account for every change that has occurred within your account (and who made that change).


Having a complete record of events in your account provides transparency around all account changes.


Security Policies

Our security policies, controls, and standards cover a wide range of areas to include: 

  • Information security

  • Incident response

  • Access control

  • Physical security

  • Network security

  • Vulnerability management

  • Software/systems development life cycle

  • Secure development

  • Change management

  • Vendor management

  • Disaster recovery

  • Business continuity


These policies ensure that your and your family’s information is kept safe every step of the way.

See Related