Tegsoft Security Policies
- 01 Feb 2022
- 1 Minute to read
- Print
- DarkLight
Tegsoft Security Policies
- Updated on 01 Feb 2022
- 1 Minute to read
- Print
- DarkLight
Article summary
Did you find this summary helpful?
Thank you for your feedback
- Tegsoft is a system accessed securely with HTTPS protocol.
- There is an integrated firewall on the server that allows network access only from allowed IP address blocks. Network access from unauthorized IP address blocks is not allowed.
- All accesses by Administrator, User or API based are logged.
- In data update made by Administrator or API authority, only the audit logs are recorded.
- There are authorization levels for users. Users can only access authorized data.
- Phone number, personal information etc. can only be accessed for authorized users. Personal data security is ensured without affecting the way of use.
- IP subscribers’ access requires authorization. IP subscribers are not able to access the numbers or call routes to which they are not authorized.
- IP address spoofing are blocked by Tegsoft's released versions periodically which increases the IP security level.
- Security protocols and recommended protection measures are updated in Tegsoft's released versions periodically and announced to the technical teams.
- Security audit tests are carried out annually and necessary updates are provided by taking the results of these tests into consideration.
- Tegsoft software is updated periodically.
Was this article helpful?