Rocketbook Corporate Solutions Security Statement

 

Rocketbook Corporate Solutions is dedicated to providing the most secure environment possible for our users documents. Our goal is to protect client and internal data as thoroughly as possible. We work hard to ensure that all data is stored securely and accessed only when needed to provide responsive customer service. This security statement explains how we protect customers. This statement and the security measures explained below are reviewed and updated regularly.

Content Security

Rocketbook Corporate Solutions has no visibility into our users' notes when they are written or uploaded to the Cloud (Evernote, Dropbox, OneNote, etc.). Once scanned, the document is sent directly to the users’ cloud provider and does not pass through Rocketbook Corporate Solutions’ servers. Nor do we intercept any content during the transfer. In addition, we see images only on a voluntary basis and only with users’ permission. While we process user information for identification purposes and scan user e-mail addresses, we have no access to users’ personal information other than as mentioned. From time to time, we collect metadata from visitors, but this is for research purposes with a goal of improving customer service.

Network and Logical Security

Employees accessing Rocketbook Corporate Solutions' network use a secure, encrypted connection at all times. We provide access to our systems based on the principle of the least privilege using role-based access control, which limits the capabilities of individual users. System patches and upgrades are regularly scheduled and completed. We implement patches and upgrades during maintenance windows to avoid impacting normal business operations and lessen any vulnerability that may occur as a result of our activity.

Other features of our network security program include:

Rocketbook Corporate Solutions’ infrastructure comprises three key components: 

Our infrastructure architecture is designed to reduce latency and help ensure users can get data as quickly as possible. While these servers minimally process data to pass along to the application servers, they may in the future handle other functions as well. The delivery servers are from a third party vendor (below) and are also located in the United States. 

Email Security

Rocketbook Corporate Solutions transfers emails using Mandrill, a transactional email API for Mailchimp’s users. Mandrill was developed specifically for sending targeted e-commerce and personalized one-to-one messages. Mandrill's infrastructure is composed of three key components: 

Mandrill locates its relay servers around the word in various Amazon-hosted regions. By using servers located all over the globe, Mandrill reduces latency and boosts transfer speed. Mandrill emails, however, go out through its own managed IP addresses running on its own dedicated hardware in its own data centers.

Mandrill’s application servers are also currently hosted via Amazon AWS and are located in the US-West region of the United States. The delivery servers are also located in the United States and are managed by Mandrill in a secure facility.

Amazon AWS Identity and Access Management is used for authentication to AWS-related resources. You can read more about Amazon's security policy and practices here at http://aws.amazon.com/security

To protect against key security issues, such as Heartbleed and Open SSL vulnerability, Mandrill enables Opportunistic TLS email encryption, which protect sensitive messages and increase compliance with privacy regulations. Opportunistic TLS automatically tries to secure the path that messages take when they travel to recipient email systems. It is rapidly becoming the standard for SMTP message encryption. 

For more information about Mailchimp’s security, go to this page. Much of the information on the page is relevant to Mandrill as well.

Privacy; Internet, Mobile App

Users of the Rocketbook app are required to identify and authenticate themselves before accessing our services. Generally, identification and authentication take place through the use of an individual’s user name and a password.

 Our web services platform is built on a secure infrastructure with multiple layers of protection, including measures ranging from proper physical security of our virtual servers (AWS) to system intrusion detection capabilities. We use industry standard encryption technologies to protect user information from external compromise.

“Clickstream” data (e.g., information regarding which of our web pages’ users access, the frequency of such access, and user product and service preferences) may be collected by us or by service providers using Web beacons, page tags, or similar tools set when users visit our website or when they see an advertisement we’ve placed elsewhere. Clickstream data and similar information may be shared internally within Rocketbook Corporate Solutions and used for administrative purposes to assess the usage, value, and performance of our online products and services, improve an individual’s experience with our website, and as otherwise permitted by applicable law or regulation. This information helps us suggest products or services that may be of interest to visitors. This information may be processed by us for the purposes described above, or on our behalf by third parties, according to our specific instructions.

Rocketbook Corporate Solutions makes available on the mobile app third party applications such as content linking or sharing facilities. Information collected by providers of these applications is governed by their privacy policies. 

 Other Privacy Policies or Statements; Changes to Policy

This policy provides a general statement of the ways in which Rocketbook Corporate Solutions protects visitors’ personal information. Visitors may, however, in connection with specific products or services offered by Rocketbook Corporate Solutions, be provided with privacy or security policies or statements that supplement this policy. This policy may be changed from time to time to reflect changes in our practices concerning the collection and use of personal information. The revised policy will be effective immediately upon posting to our website. 

 

 

Call us if you have any questions or just want to place an order.