SBS Security Features

Secure Processes and Software

  • Design and customization of forms to client specifications
  • Disaster recovery plan
  • SOC 2 compliant
  • Field-tested, reliable, hardened software

Constant Monitoring and Auditing

  • Ongoing vulnerability assessments including daily malware scans for all web applications
  • Infrastructure secured and managed by highly trained and certified engineers
  • 24/7 monitoring and response – immediate response and resolution to any issue that might arise
  • Third-party audits

Top-Level Web Hosting and Encryption

  • Online elections hosted in Flexential’s datacenter with secure private cloud availability of 99.999%
  • Symantec® TLS industry-leading encryption and authentication protection
  • Data co-location in redundant datacenters 900 miles apart ensuring power grid distribution protection

Hosting Providers

How will you secure my member database?

It’s imperative you know what happens to member data once it’s out of your hands. Ask your partner to demonstrate how your database will be fully protected against loss, intrusions and breaches of confidentiality. Ask for a description of the physical location where data will be stored and how the location is protected by firewalls, hard passcode policies, active monitoring processes, encryption and limited access by credentialed experts. Each step in this protection process should be documented to allow for accountability and tracing history. SBS systems employ Transport Layer Security (TLS) encryption to secure traffic between client election systems and voters’ computing devices. These are the same encryption techniques utilized by U.S. financial and banking institutions.

SOC 2 Compliant logo

How will your digital security infrastructure protect me?

When a vendor manages an election project for you, the member and voting data is usually out of your hands until results are delivered. Be sure to ask the vendor to trace the paths your data will take – where it will reside, who will have access to it and what will be done to protect it at each step. This is a 24/7/365 process that is best handled by experts within an Enterprise Data Center operation. A qualified data center can provide physical security from monitoring who is on the premises to hardware and network security. They can also manage a wide array of important operational details including reliable power sources, climate control, connectivity and redundancy systems with both active and passive monitoring processes.

How will your digital security infrastructure protect me

How will you secure and verify the accuracy of my physical documents?

When working with third-party vendors, you should be assured there are checks and balances that guarantee the integrity and accuracy of all final and certified results. Look for procedures, chain-of-custody and accountability policies that ensure accurate results while providing defensibility in the event of any questions after the project. Policies and procedures should include check-ins, daily counts (or delivered counts) and locked vaults for storing the documents with limited access by credentialed staff.

It’s crucial that the entire flow of data is tested and proven accurate. Any partner should be able to demonstrate their accuracy rates at points before, during and after the counting is done.

SBS employs staff solely dedicated to measuring and improving the accuracy of our voting processes. Always inquire about a vendor’s quality assurance staff and ask how you can reach them during the election process.

Contact us for more information on SBS security processes.