Intelligence, Inc. takes cyber security and data protection seriously, including our network and all Intelligence, Inc. owned websites. Please see our documentation below and reach out with any questions.
Sessions between you and our websites operate over HTTPS and are protected with Secure Sockets Layer (SSL) encryption using 2,048-bit or better keys and Transport Layer Security (TLS) 1.2 or above. Intelligence, Inc. takes regular steps to maintain PCI compliance, a rigorous data security standard for organizations that process credit card transaction.
Intelligence, Inc. servers and network are kept secure behind a commercial grade firewall with intrusion protection technology and real-time packet-by-packet anti-virus and anti-malware scanning. The Intelligence, Inc. network contains Distributed Denial of Service (DDoS) prevention defenses to help keep our services active at all times.
Software Development Lifecycle (SDLC) Security
Intelligence, Inc. implements human review processes, including architecture analysis during design and code review during coding and build, to ensure consistent quality in our software development practices. Development staff is familiar with and mitigates against the OWASP Top 10 Web Application Security Risks.
Sensitive User Information
We do not store any credit card information on our servers. Payments on all Intelligence, Inc. websites are posted directly to our processor and no digital copies are retained. Additionally, we do not require any personally sensitive information for any of our services, such as your birthdate, social security number, or medical information.
User Account Access
User accounts on Event Intelligence
(AKA DJ Intelligence
) and Party Blast
are only accessible to the account holder (anyone with the correct email and password), and select members of the Intelligence, Inc. staff as needed for technical support and fulfillment of services.
Intelligence, Inc. hosts its own applications at its datacenter in a western suburb of Chicago, USA. This datacenter features strictly managed physical access control, video surveillance, security systems, among other protective measures.
Intelligence, Inc.'s patch management process ensures the latest patches and appropriate software versions are installed on all systems at regular intervals.
Security Incident Response
Intelligence, Inc.'s security incident response processes are defined during routine preparation activities and are refined through investigation follow-ups. We use standard incident response process structures to ensure that the right steps are taken at the right time.
Vulnerability Assessment & Penetration Testing
Intelligence, Inc. tests for potential vulnerabilities on a recurring basis. We run static code analysis and external vulnerability scans.
Intelligence, Inc. leverages 3rd party penetration testing sites several times a year to test the Intelligence, Inc. websites and network infrastructure.
Employee Operations Security
All Intelligence, Inc. employees undergo background checks prior to gaining substantial access to customer data systems. Intelligence, Inc. may rescind an employee's employment offer if their background check is found to be falsified, erroneous, or misleading.
Intelligence, Inc. employees are provided training on the company's technologies policies during the onboarding process. All Intelligence, Inc. personnel are then required to acknowledge that they have received and understand the technology policy.
All remote work must be performed in a manner consistent with Intelligence, Inc.'s security policies. VPN must be used for all connections with the Intelligence, Inc. network. All of Intelligence, Inc.'s security settings must be followed for any equipment used to perform work. Employees must ensure no unauthorized individuals may view, overhear, or otherwise have access to Intelligence, Inc.'s customer data.
Questions, comments, or feedback can be directed to:
900 Ogden Ave, Suite 437
Downers Grove, IL 60515