Security

The core of information security is information assurance, the act of maintaining the confidentiality, integrity and availability of information, ensuring that information is not compromised in any way when critical issues arise.

DATA RELIABILITY

INFORMATION SECURITY & MONITORING

ACCESS CONTROLS

DATA OWNERSHIP

Data provided by customers is kept safe with multiple security layers. If a customer wishes to leave UZIO, then upon request, all the data and account information or any other reference can be deleted within 30 business days. Snapshot of final data before deletion (in some export files) can also be shared upon request.

Security

The core of information security is information assurance, the act of maintaining the confidentiality, integrity and availability of information, ensuring that information is not compromised in any way when critical issues arise.

DATA RELIABILITY

INFORMATION SECURITY & MONITORING

ACCESS CONTROLS

DATA OWNERSHIP

Data provided by customers is kept safe with multiple security layers. If a customer wishes to leave UZIO, then upon request, all the data and account information or any other reference can be deleted within 30 business days. Snapshot of final data before deletion (in some export files) can also be shared upon request.