Easy to Deploy, Easy to Integrate

Security is paramount at CourtCorrect

See additional details on how we keep your data safe below. Further details and supporting evidence is available on request.

Physical Security Control

CONTROL

STATUS

Secure Office Facilities in London Fitzrovia

Access requires multiple keys and keycard systems. Only permanent employees are provided with access.

CCTV Monitoring & Alarm System

Our offices are monitored by CCTV 24/7 and have automatic alarm triggers.

Minimising sensitive information within the office environment

We do not store important data & hard drives at the office, but instead store these in remote safes accessible only by Senior management.

OVH Cloud Servers

Our customer data is stored exclusively in the cloud and hence we benefit from the high security access controls of OVH Cloud:https://www.ovhcloud.com/en-gb/personal-data-protection/security/.

CONTROL

STATUS

Secure Office Facilities in London Fitzrovia

Access requires multiple keys and keycard systems. Only permanent employees are provided with access.

CCTV Monitoring & Alarm System

Our offices are monitored by CCTV 24/7 and have automatic alarm triggers.

Minimising sensitive information within the office environment

We do not store important data & hard drives at the office, but instead store these in remote safes accessible only by Senior management.

OVH Cloud Servers

Our customer data is stored exclusively in the cloud and hence we benefit from the high security access controls of OVH Cloud:https://www.ovhcloud.com/en-gb/personal-data-protection/security/.

CONTROL

STATUS

Secure Office Facilities in London Fitzrovia

Access requires multiple keys and keycard systems. Only permanent employees are provided with access.

CCTV Monitoring & Alarm System

Our offices are monitored by CCTV 24/7 and have automatic alarm triggers.

Minimising sensitive information within the office environment

We do not store important data & hard drives at the office, but instead store these in remote safes accessible only by Senior management.

OVH Cloud Servers

Our customer data is stored exclusively in the cloud and hence we benefit from the high security access controls of OVH Cloud:https://www.ovhcloud.com/en-gb/personal-data-protection/security/.

Systems Access Controls

CONTROL

STATUS

Strong Passwords and 2-Factor Authentication

Strong password & Two-Factor Authentication required across users: all employees and staff must follow our internal password and authentication requirements, including setting a non-trivial, non-English, random, alphanumeric password and enforcing two-factor authentication across devices.

Password Manager

We use a password manager to store and share passwords internally.

Remote disconnect and logout

 In the event of an employee leaving the business or losing a device, we have the ability to terminate access and sessions to our internal systems remotely and do so within 24 hours of an employee leaving the business or ad-hoc when notified of a lost device.

Device Management

We maintain a list of all company devices and periodically review these when access needs to be terminated or changed.

CONTROL

STATUS

Strong Passwords and 2-Factor Authentication

Strong password & Two-Factor Authentication required across users: all employees and staff must follow our internal password and authentication requirements, including setting a non-trivial, non-English, random, alphanumeric password and enforcing two-factor authentication across devices.

Password Manager

We use a password manager to store and share passwords internally.

Remote disconnect and logout

 In the event of an employee leaving the business or losing a device, we have the ability to terminate access and sessions to our internal systems remotely and do so within 24 hours of an employee leaving the business or ad-hoc when notified of a lost device.

Device Management

We maintain a list of all company devices and periodically review these when access needs to be terminated or changed.

CONTROL

STATUS

Strong Passwords and 2-Factor Authentication

Strong password & Two-Factor Authentication required across users: all employees and staff must follow our internal password and authentication requirements, including setting a non-trivial, non-English, random, alphanumeric password and enforcing two-factor authentication across devices.

Password Manager

We use a password manager to store and share passwords internally.

Remote disconnect and logout

 In the event of an employee leaving the business or losing a device, we have the ability to terminate access and sessions to our internal systems remotely and do so within 24 hours of an employee leaving the business or ad-hoc when notified of a lost device.

Device Management

We maintain a list of all company devices and periodically review these when access needs to be terminated or changed.

Data Access Controls

CONTROL

STATUS

Restricted access to data systems

Restricting access to data systems on a “need-to-know” basis, ie only giving access to data where strictly required for the performance of our contractual obligations.

Automatic Backups

To ensure redundancy and backups, we have configured automatic backups with our cloud partner, OVH Cloud, and additionally benefit from their redundancy policy: https://blog.ovhcloud.com/disaster-recovery-and-geographical-redundancy-solutions-using-ovhcloud-dedicated-servers/.

Audit Trails

We have configured automatic audit trails to ensure that there is a complete record of any user accessing any data asset across our systems.

Data Classification

We categorise data based on sensitivity, confidentiality and risks to the rights of individuals under GDPR and further restrict access to such data on a “strictly necessary” basis.

Encryption

Sensitive information, like passwords, authentication codes or payment information, is encrypted at rest to ensure that it cannot be exploited in the event of a data breach.

Automated scans

We perform automated scans in real-time on an application layer and code level using best-in-class tools.

CONTROL

STATUS

Restricted access to data systems

Restricting access to data systems on a “need-to-know” basis, ie only giving access to data where strictly required for the performance of our contractual obligations.

Automatic Backups

To ensure redundancy and backups, we have configured automatic backups with our cloud partner, OVH Cloud, and additionally benefit from their redundancy policy: https://blog.ovhcloud.com/disaster-recovery-and-geographical-redundancy-solutions-using-ovhcloud-dedicated-servers/.

Audit Trails

We have configured automatic audit trails to ensure that there is a complete record of any user accessing any data asset across our systems.

Data Classification

We categorise data based on sensitivity, confidentiality and risks to the rights of individuals under GDPR and further restrict access to such data on a “strictly necessary” basis.

Encryption

Sensitive information, like passwords, authentication codes or payment information, is encrypted at rest to ensure that it cannot be exploited in the event of a data breach.

Automated scans

We perform automated scans in real-time on an application layer and code level using best-in-class tools.

CONTROL

STATUS

Restricted access to data systems

Restricting access to data systems on a “need-to-know” basis, ie only giving access to data where strictly required for the performance of our contractual obligations.

Automatic Backups

To ensure redundancy and backups, we have configured automatic backups with our cloud partner, OVH Cloud, and additionally benefit from their redundancy policy: https://blog.ovhcloud.com/disaster-recovery-and-geographical-redundancy-solutions-using-ovhcloud-dedicated-servers/.

Audit Trails

We have configured automatic audit trails to ensure that there is a complete record of any user accessing any data asset across our systems.

Data Classification

We categorise data based on sensitivity, confidentiality and risks to the rights of individuals under GDPR and further restrict access to such data on a “strictly necessary” basis.

Encryption

Sensitive information, like passwords, authentication codes or payment information, is encrypted at rest to ensure that it cannot be exploited in the event of a data breach.

Automated scans

We perform automated scans in real-time on an application layer and code level using best-in-class tools.

Transmission Controls

CONTROL

STATUS

Encrypting all traffic

All data sent to and from our systems is encrypted using TLS/SSL certificates.

Hidden internal API structure

We ensure that any internal network traffic is hidden from the public.

Regular review of transmission data

All transmission data logs are scanned regularly by automated tools and manual spot-checks to ensure that transmissions is occurring normally. Suspicious activity is reviewed and investigated on an ongoing basis.

CONTROL

STATUS

Encrypting all traffic

All data sent to and from our systems is encrypted using TLS/SSL certificates.

Hidden internal API structure

We ensure that any internal network traffic is hidden from the public.

Regular review of transmission data

All transmission data logs are scanned regularly by automated tools and manual spot-checks to ensure that transmissions is occurring normally. Suspicious activity is reviewed and investigated on an ongoing basis.

CONTROL

STATUS

Encrypting all traffic

All data sent to and from our systems is encrypted using TLS/SSL certificates.

Hidden internal API structure

We ensure that any internal network traffic is hidden from the public.

Regular review of transmission data

All transmission data logs are scanned regularly by automated tools and manual spot-checks to ensure that transmissions is occurring normally. Suspicious activity is reviewed and investigated on an ongoing basis.

Input Controls

CONTROL

STATUS

Data validation

We configure data validation on a component level and block malicious attempts to insert data.

Required fields

We ensure that all data that is necessary for the system to perform as intended is required on the component level.

Sanitisation

We sanitise all user input using a variety of automated checks in order to ensure no malicious data can be inserted or scripts executed.

Error handling and messaging

We ensure that all errors have clear error response messages so that users understand where corrections need to be made before proceeding.

File type restrictions

We restrict the types of files that can be uploaded to our system in order to prevent malicious files to be uploaded to our systems.

CONTROL

STATUS

Data validation

We configure data validation on a component level and block malicious attempts to insert data.

Required fields

We ensure that all data that is necessary for the system to perform as intended is required on the component level.

Sanitisation

We sanitise all user input using a variety of automated checks in order to ensure no malicious data can be inserted or scripts executed.

Error handling and messaging

We ensure that all errors have clear error response messages so that users understand where corrections need to be made before proceeding.

File type restrictions

We restrict the types of files that can be uploaded to our system in order to prevent malicious files to be uploaded to our systems.

CONTROL

STATUS

Data validation

We configure data validation on a component level and block malicious attempts to insert data.

Required fields

We ensure that all data that is necessary for the system to perform as intended is required on the component level.

Sanitisation

We sanitise all user input using a variety of automated checks in order to ensure no malicious data can be inserted or scripts executed.

Error handling and messaging

We ensure that all errors have clear error response messages so that users understand where corrections need to be made before proceeding.

File type restrictions

We restrict the types of files that can be uploaded to our system in order to prevent malicious files to be uploaded to our systems.

External Accreditations

CONTROL

STATUS

External penetration tests

This includes a full source code review and attempted penetration by giving remote access to our systems in a secure environment.

ISO & SOC Accredtiations

Through our cloud provider, we benefit from a variety of external accreditations, such as ISO27001, ISO27017, ISO27018, ISO27701 and SOC 3 Type 2.

CONTROL

STATUS

External penetration tests

This includes a full source code review and attempted penetration by giving remote access to our systems in a secure environment.

ISO & SOC Accredtiations

Through our cloud provider, we benefit from a variety of external accreditations, such as ISO27001, ISO27017, ISO27018, ISO27701 and SOC 3 Type 2.

CONTROL

STATUS

External penetration tests

This includes a full source code review and attempted penetration by giving remote access to our systems in a secure environment.

ISO & SOC Accredtiations

Through our cloud provider, we benefit from a variety of external accreditations, such as ISO27001, ISO27017, ISO27018, ISO27701 and SOC 3 Type 2.

Incident Response Plans

CONTROL

STATUS

24/7 Internal Emergency Hotline

We provide 24/7 internal emergency hotline staffed by a Senior engineer to ensure immediate remediation.

Transparent communication

Transparent communication to customers and staff as soon as an issue has arisen.

Collaboration with regulatory authorities

We collaborate with external regulatory authorities, like the ICO and the National Cyber Security Centre to ensure best practices are followed and legal disclosures are made where appropriate.

CONTROL

STATUS

24/7 Internal Emergency Hotline

We provide 24/7 internal emergency hotline staffed by a Senior engineer to ensure immediate remediation.

Transparent communication

Transparent communication to customers and staff as soon as an issue has arisen.

Collaboration with regulatory authorities

We collaborate with external regulatory authorities, like the ICO and the National Cyber Security Centre to ensure best practices are followed and legal disclosures are made where appropriate.

CONTROL

STATUS

24/7 Internal Emergency Hotline

We provide 24/7 internal emergency hotline staffed by a Senior engineer to ensure immediate remediation.

Transparent communication

Transparent communication to customers and staff as soon as an issue has arisen.

Collaboration with regulatory authorities

We collaborate with external regulatory authorities, like the ICO and the National Cyber Security Centre to ensure best practices are followed and legal disclosures are made where appropriate.

Training

CONTROL

STATUS

Having bi-weekly cybersecurity sessions with staff

In these sessions  the entire company is reminded of our internal guidelines, industry best practices and relevant recent public and internal activity.

Monthly meeting within our Engineering team

We conduct monthly meetings within our Engineering team to review any updates to our environments or packages and to review any risks within our architecture. Remedial action is scheduled based on a risk assessment and urgent items are resolved within 24 hours.

CONTROL

STATUS

Having bi-weekly cybersecurity sessions with staff

In these sessions  the entire company is reminded of our internal guidelines, industry best practices and relevant recent public and internal activity.

Monthly meeting within our Engineering team

We conduct monthly meetings within our Engineering team to review any updates to our environments or packages and to review any risks within our architecture. Remedial action is scheduled based on a risk assessment and urgent items are resolved within 24 hours.

CONTROL

STATUS

Having bi-weekly cybersecurity sessions with staff

In these sessions  the entire company is reminded of our internal guidelines, industry best practices and relevant recent public and internal activity.

Monthly meeting within our Engineering team

We conduct monthly meetings within our Engineering team to review any updates to our environments or packages and to review any risks within our architecture. Remedial action is scheduled based on a risk assessment and urgent items are resolved within 24 hours.

Get In Touch

Request a demo.

Request a demo.

Request a demo.