Data Security

Application Security

By using the highest level of encryption technology available, data transmitted to and from the server is locked in an unrecognisable format ensuring complete confidentiality during transit. A finely grained capabilities system provides strong application level security. Individual users are granted access to various parts of individual logbooks, based on their role and responsibilities. Extensive audit trails capture date, time and username for every login and data entry.


High security hosting environment

Aqualog hosts all operations at a leading IT services organisation, providing a highly reliable and secure environment that includes the following features:

  • Climate-controlled space
  • Closed-circuit video surveillance
  • Access cards and secure identification
  • Uninterrupted power source
  • 24 x 7 network monitoring

Our hosting partner provides a fast, reliable connection straight to a global network and interconnection with other backbone providers is guaranteed.


Multiple User Security

For particular water systems,many people from a variety of organisations may require access to the hub in order to plan and implement activities and corrective actions which are necessary to ensure the continued supply of good quality water. All of this is done in such a way as to safeguard the data collected, and access to specific logbooks is secure and password protected. As you would expect from the technology leader in this field, there is no software maintenance to worry about, the system is easy to use and PDA updates are fully automated with no necessity to perform synchronization tasks with a PC. All data is presented within the logbooks to comply with the relevant legislation.


Rigorous operational procedures

Data is subject to regular multilevel backups and diligent system monitoring. Backups are stored in secure premises and managed as part of the daily operations of the systems administration staff.


System Stability

Aqualogs system architecture provides a robust industrial strength environment and employs the latest Java technologies – this means the system is very stable ensuring you always have access to your data.


Disaster recovery

In the unlikely event that Aqualog was to dissappear into cyberspace in a clowd of silver stardust or even just go broke, we have systems inplace to ensure that your data is safe and accessable. All our source code and data backups are held in escrow. This means that by subscribing to our third party escrow agreement you have legal access to both the software and the data.