Here, you can find information about everything related to Schemon’s security and data policies, as well as any security events that have occurred.
No current security events.
✅Servers online.
✅Databases online.
✅Chat channels active.
Below you can find the policies related to security, privacy and your data:
📝Security Policy
📝Cookie Policy
📝Privacy Policy
📝Data Processing Agreement
Your data is stored on our cloud servers and databases in an encrypted format. This means that the information is not kept as plain, readable text. Instead, it is protected using strong encryption before it is stored.
We use the AES-256 encryption algorithm in GCM mode, which is a widely used and highly secure encryption standard. AES-256 helps protect the confidentiality of your data, while GCM mode also helps verify that the data has not been altered or tampered with.
For additional protection, the encryption keys used to secure your data are stored in a Hardware Security Module, also known as an HSM. An HSM is a specialized, highly secure environment designed to protect cryptographic keys from unauthorized access, extraction, or misuse. This adds another layer of security to ensure that your encrypted data remains protected.
When you access your data, our software first retrieves the encrypted information from our cloud servers or databases. The data is then decrypted securely within our system so it can be prepared for delivery to you.
After that, the data is sent to your browser using the TLS protocol. TLS, or Transport Layer Security, is the standard security technology used to protect data while it travels over the internet. This means that even after your data is decrypted inside our secure environment, it is encrypted again before being transmitted to your browser.
Once the encrypted data reaches your browser, your browser decrypts it locally and displays it to you in a readable format. This process helps ensure that your data is protected both while it is stored and while it is being transferred between our systems and your device.
Compliance and certifications are a never ending endeavor. We are currently compliant with and/or working on the following:
✅IEEE 12207
✅IEEE 15288
🎯 ISO 9001
🎯 ISO 14001
🎯 ISO 27001
🎯 SOC2 Type II
We are providing perks for any bug report and prizes for security reports. Please provide a valid email address below so we can reach you properly.