|We value the trust you have placed in us by relying on the BUGtrack online service.|
Because issue tracking and project management information is highly confidential,
the protection of your data is extremely important to us.
It is ForeSoft's policy to maintain confidentiality over your information.
Once your information reaches us, it resides on servers that are heavily guarded both physically and electronically.
Physical security: BUGtrack is hosted on highly reliable, secure and redundant DELL PowerEdge servers, located in the SteadFast Networks colocation facility (located in the same building as Equinix):
We selected this datacenter as one of the most advanced and secure colocation facilities in the world - this is the famous "350 E Cermak, Chicago" building. This building is the most desired datacenter in the US as it stays right on the internet backbones interconnections:
The data center offers complete redundancy in power, HVAC, network connectivity, and security. The datacenter facility sits atop multiple power grids driven by ComEd, with full UPS battery backup power and a diesel generators onsite. Our network is supplied by several separate networks including, Level(3), Savvis and AT&T. Dozens more third party backbone providers are available in the building via cross connect, such as MCI, Global Crossing, Abovenet, Qwest, XO Communication, Sprint, Williams, and Cogent.
The fiber provided to the Chicago data centers is also provided over redundant paths, with diverse entry points and building riser. These data center facilities have been built to meet the high demands and reliability of telecommunications providers and Fortune 500 companies and have achieved SAS / SSAE compliance.
Please refer to Steadfast audit reports:
SSAE18-type2 audit report: Steadfast-2018-Type_2_SOC_1-Final_Report.pdf
SOC-2 audit report: Steadfast-2018-Type_2_SOC_2-Final_Report.pdf
Our Steadfast colocation facility provides BUGtrack with a world-class datacenter secure infrastructure that works as an integral part of BUGtrack customers' comprehensive HIPAA plan:
Chicago also has an extremely low occurrence of natural disasters such as hurricanes, tornados, floods, and earthquakes compared to most of the rest of the United States, meaning there is a reduced risk of outages due to natural disasters.
Visual confirmation and strict sign-in procedures, both conducted by trained security personnel, along with key cards, and photo ID verification ensure that only authorized personnel have access to our data center. No customers are allowed in the facility space unattended and staff is on-site 24/7. In addition, all aspects of the data center are monitored and recorded via color, hi-resolution digital video cameras. All video footage is kept on hand for a period of at least 30 days.
All Web communications are secured with 256 bit SSL encryption.
All servers are running Windows Server 2016 operating system and are sitting behind electronic firewall. All drives use NTFS partitions.
All Microsoft patches, hot fixes and updates are installed on weekly basis, and the most critical are installed immediately upon release. Our system is always using the latest security technique available from Microsoft.
Cookies are only used to identify user - there is no other information stored in cookies. Cookies are encrypted.
We run continues global database logs backup, and it is copied to a remote datacenter hourly. This would allow us to restore the database to any given moment of time even in an extremely unlikely case of a major disaster in the main datacenter.
ForeSoft Corporation has a very strict Privacy and Security Policy:
ForeSoft Corporation complies with the EU-U.S. Privacy Shield Framework
Please click here to verify:
ForeSoft Corporation has further committed to refer unresolved Privacy Shield complaints to ICDR/AAA, an alternative dispute resolution provider:
ForeSoft Corporation has completed PCI compliance with TrustWawe Holdings, Inc.
Please click here to verify:
ForeSoft database servers are successfully passing "TrustKeeper® PCI Manager" monthly penetrating vulnerability scans: