How We Protect Your Data

All data in kinops is written to one of two subsystems: filesystem or database. Both scenarios are designed so that we are writing to multiple disks before success is returned. These underlying disks are backed up multiple times daily and stored in different locations. Files that customers upload are using the same system. These are designed for replication, performance, and to avoid single points of failure.

Network Traffic

Data in transit between you and kinops is encrypted, and sent using HTTPS. Traffic within kinops is also encrypted (end-to-end encryption). Our products run on restricted networks which are locked down with firewalls.

Filesystem Data at Rest

Attachments, configuration files, etc... are encrypted at rest. Backups of your data are also encrypted.

Database Data at Rest

Active database data: submissions, work orders, comments, etc... are encrypted at rest. Backups of your data are also encrypted.

Redundancy for All Major Systems

We leverage technologies and service providers to bring redundancy to our system. Our systems are engineered to stay up even if multiple servers fail.

Sophisticated Physical Security

Only authorized personnel have access to the data center.

Regularly-Updated Infrastructure

Our infrastructure is updated regularly with known security patches. Security is a moving target, we work to keep up with the state-of-the-art in web and server security.

Billing Information

Credit card transactions are processed using industry trusted 3rd parties and are not handled by the kinops system.

Identity & Access Controls

The Kinetic Platform has a robust security framework that allows customers to define security policies that dictate who has access to what data. These policies are the responsibility of our customers to maintain. If customers have Multi-Factor Authentication (MFA) or password complexity requirements, they can leverage their own identity provider (IDP) to enable these types of features. It's the responsibility of our customers to work with Kinetic Data to setup this integration. Additionally, It is the responsibility of our customers to manage the rotation of passwords for system/integration accounts within their environment. 

Nearly Two Decades in Business

Security isn’t just about technology, it’s about trust. We have been in business nearly 20 years. Our customers are some of the largest companies or government organizations in the world. We routinely deliver the professionalism, quality of solution, and security practices you expect from a company who intends to stay in business for the next 2 decades. We’ll continue to work hard everyday to maintain that trust.

Have a Concern? Need to Report an Incident?

Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please submit your finding immediately to

Changes & Questions

Kinetic Data may update this policy — we’ll notify you about significant changes by emailing the account owner or by placing a prominent notice on our site.