As a SaaS platform, Rever is committed to the highest level of security when it comes to our customer’s data, users and activity.
Our Cloud infrastructure provider ensures continual service availability and access to Rever in addition to native security measures that protect against external threats, including firewalls and other security services.
All access to Rever services is logged and registered in alternate systems.
All your communications are secured within the application.
Alerts are generated for all unusual and suspicious activity within the application. Access to core services is restricted and can only be accessed upon request.
Data and Backup Procedures
You own all your data on our systems and can request to view, modify and delete it at any time.
Your data is encrypted both in data and at rest, including all backups generated by Rever.
We also protect all data from unauthorized access with multiple security controls.
Penetration Tests and Vulnerability Assessments are conducted regularly to ensure Rever continues to maintain the highest standards of security against unauthorized access. Security measures and procedures are regularly updated.
All changes to the Rever application go through a strict deployment process to ensure quality and security are never compromised when new code is deployed. Actual deployment of new code features and updates are done through an automated process to minimize errors.
Rever maintains records of all access, activity, and transactions in a separate and isolated system from the Rever application. These records are kept for compliance and auditing purposes and can be requested at any time by the customers.
All information related to ideas is securely stored within Rever, and not on any smartphones, tablets, or other local devices. This includes pictures, drawings, text, and any other information related to ideas created in Rever. Only the application and authorized personnel have access to this information.
Candidates undergo security background checks and are required to sign an NDA as part of our hiring process. Rever offers constant training to all employees specialized in security measures, data protection, and other specific topics.
All Rever partners and service providers meet the highest security guidelines. These guidelines include AICPA SOC 2, ISO 27001 certifications and GDPR compliance.
Rever policies are created and regularly updated to comply with the highest security and privacy standards. These include Incident Management and Response policies and Disaster Recovery procedures to ensure continuous service delivery.
- We will acknowledge your email within five business days.
- Provide us with a reasonable amount of time to resolve the issue before disclosing it to the public or a third party. We aim to resolve critical issues within ten business days of disclosure.
- Make a good faith effort to avoid violating privacy, destroying data, or interrupting or degrading the Rever service.
- Please only interact with accounts you own or for which you have explicit permission from the account holder.
- Distributed Denial of Service (DDoS)
- Social engineering or phishing of Rever employees or contractors
- Any attacks against Rever’s physical property or data centers