Security
Learn about Middle's security protocols
Last updated
Was this helpful?
Learn about Middle's security protocols
Last updated
Was this helpful?
We have the following security policies in place and can make them available upon request: Acceptable Use, Asset Management, Backup, Business Continuity Plan, Change Management, Code of Conduct, Cryptography, Data Classification, Data Deletion, Data Protection, Disaster Recovery Plan, Incident Response Plan, Information Security, Password, Physical Security, Responsible Disclosure, Risk Assessment, System Access Control, Vendor Management, and Vulnerability Management.
We use to track compliance with our security policies.
All employees undergo a complete background check and sign an Employee Invention Assignment and Confidentiality Agreement when they join the company. We also track that all employees do the following:
Review and accept security policies
Install the agent to monitor their computers
The app checks several security-relevant settings, such as whether the hard drive is encrypted and if a password manager is installed.
Complete security training
Middle is hosted on Amazon Web Services (AWS). More information on their security can be found on the . We take the following security steps on AWS:
Data is encrypted at rest. It is also encrypted in transit with TLS/SSL.
Every customer’s data is stored on its own database instance separate from other customers’ data.
Passwords must be a minimum of eight characters and passwords on the Pwned password list cannot be used to create an account.
Middle monitors sessions by IP address and time.
Access can be granted at the account or sub-account level.
Middle complies with CCPA and GDPR. Requests to review, correct, update, suppress, or delete personal information that Middle maintains about a person can be sent to privacy@middle.app.
Middle is working towards SOC2 certification.