Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Initial Setup Tasks

When you subscribe to Taskmonk, we send you separate emails containing the required credentials to log into your account. This is an Super-Administrator login. Once you log into your instance, you must perform the following tasks to get started:

Security in Taskmonk

Role-Based Access Control

  • Taskmonk enables you to allow access to granular data and functions based on the role assigned to a user.

  • Your organization's data governance standards can easily be mapped onto Taskmonk.

Privacy

  • Taskmonk has no in-built tracking.

  • We do not use cookies or any other fingerprinting technology.

  • Serverless Authentication: All our key management is done through Google Firebase, ensuring that Taskmonk never has access to your passwords.

Data Security

  • By default, users are denied access to all data and functions.

  • With Taskmonk, your data stays where you want it to be. Taskmonk can render data directly on to the platform from your database, without it ever reaching Taskmonk’s servers.

  • If you choose to host your data with us, we ensure that all our data centers are SOC 2, ISO 27001, and HITRUST compliant.

Secure and Scalable Infrastructure

  • All our data is stored in physically secure Microsoft Azure facilities that include 24X7 onsite security, camera surveillance, and more. For more information see Azure security documentation.

  • All our databases operate in a cluster configuration ensuring data redundancy and resilience.

  • Taskmonk’s application tier uses load balancing, allowing us to meet variable demand without any hiccups.

  • All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACLs) that prevent unauthorized requests from getting to our internal network.

Security Compliance

  • SOC 2, Type 1: Taskmonk’s SOC 2 Type I report covers the trust services categories of
    Security, Confidentiality, and Availability, and is audited annually.

  • All our data centers are SOC 2, ISO 27001 and HITRUST compliant.

Additional Security Measures

  • Training: All employees of Taskmonk undergo mandatory annual Security and Awareness training.

  • Policies: Taskmonk has developed a comprehensive set of security policies covering a range of
    topics that are shared with all employees.

  • Employee Vetting: Taskmonk performs background (employment and criminal) checks on all new employees in accordance with local laws.

  • Confidentiality: All employee contracts include a confidentiality agreement.

  • No labels