Warwick Allen joined Accelerated Analytics at the start of 2017 as the Director of Technology. Warwick has spent 25 years working with technology as a developer, project manager, quality assurance engineer, business analyst, IT manager and technology director. His talents lie in working with small companies to plan and execute their growth through collaboration, processes and technology strategy.
As a SaaS solution for retail POS data reporting and analytics, our customers share a vast amount of data with us, much of which is highly confidential. We’re routinely working with sensitive information like product pricing, inventory levels, sales goals and promotion plans. Trust and security are critical components of our customer relationships, which we take very seriously.
During the first several months of my tenure with Accelerated Analytics, I completed a comprehensive security audit of all internal and external technology and data-sharing systems in use at Accelerated Analytics – everything from servers and databases to user access and data transfer protocols. We added technology security policies and procedures to an existing technology and security protocol that was already outstanding.
Our customers’ data is transferred and secured in several different ways. We offer our customers different options for data security including dedicated physical servers, shared physical servers with data separated logically, or cloud options with both dedicated and shared virtual server options. We use data encryption when appropriate and secure data transmission using AS2 and VAN mailboxes. Additionally, we require username and password authentication for websites, servers or data integration tools used by employees and/or customers.
We maintain a detailed technology security program that includes policies and procedures for overall technology security strategy, data backups and handling policies, incident response and business continuity, and personnel security. Our employees participate in regular technology security training sessions, and technology security training is a standard part of all new employee onboarding.
With these data security and confidentiality best practices in place, we ensure that our customers’ data is:
- Complete. We can send acknowledgements for each file that is transmitted to verify it has been received. Clients are alerted if an expected file is not received.
- Correct. Exhaustive processing rules highlight any inaccuracies, duplicates or missing data.
- Processed on time. Automated routines process incoming data files without the need for manual intervention. Alerts are triggered if files are not available or cannot be processed.
- Archived securely. Any file can be retrieved for analysis or reprocessing.
- Secure in our databases and on our servers.
Our customers can continue to have complete confidence in the security and confidentiality of the data they share with Accelerated Analytics.