RSVPify employs a series of technical and procedural tools and processes to protect our systems and data (servers, databases, etc). We regularly monitor and review these measures and related reports to ensure a safe and secure environment for our users and their guests.
Will my sensitive data be encrypted?
Quite simply, yes. Of course.
What type of encryption and key length will be used? How do you handle sensitive information?
We encrypt all web traffic across the RSVPify application using enterprise and military grade AES-256 encryption.
All sensitive information (e.g. passwords) that must be stored is done so in an encrypted ("hashed") state.
Can I ask my guests to provide sensitive information and data through RSVPify?
RSVPify does not recommend requesting that guests provide sensitive proprietary, confidential, or classified information or potentially sensitive personal data (e.g. credit card number, social security number (SSN), passwords, etc.) in custom data fields ("Custom Questions").
While RSVPify fully encrypts and ensures the secure transfer and communication of data in designated fields such as password and credit card fields, and all data transfers and exchanges occur over a SSL connection, custom data fields are not hashed and the contents of these fields may be visible through non-secure means such as confirmation emails or downloadable reports.
While RSVPify does not restrict the use of custom data fields, the decision of what data fields to require during event registration is exclusively up to the account owner and event host(s). RSVPify is not responsible for the external use, safety or security of any custom data collected by event hosts and stored or otherwise exposed external to the RSVPify platform (e.g. 3rd-party email clients, exported spreadsheets, 3rd-party databases, physical print outs, etc).
Does RSVPify store my credit card information?
RSVPify does not store credit card information. Credit card transactions are managed by trusted and independently verified 3rd party payment providers who comply with international security and compliance standards.
How will ID’s, authentication and authorization be managed?
Our systems are secured using industry standard Identity & Access Management (IAM) protocols.