<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=520757221678604&amp;ev=PageView&amp;noscript=1">

Security Policy

HighRoad Solutions has implemented the highest levels of security technology throughout all of our applications and solutions. Information exchanges, transactions, passwords, contact lists, reporting data and billing data are protected using best of breed technologies that are routinely updated and evaluated. This ensures a very high degree of security and protection for all of HighRoad’s customers.

Security Objectives:

Each employee at HighRoad Solutions is responsible for the security of our customer’s information and data. Resources such as networks, computers, software, and data must also be secured in order to achieve our objectives. The security must protect against threats such as unauthorized intrusions, malicious intent, or inadvertent access. In addition to HighRoad’s initiatives and policies, partner organizations must also have stringent security policies in place.

Security Roles and Responsibilities:

Responsibilities will range in scope and per employee from security controls to the protection of individual user names and passwords.

  • Internal Employees (HighRoad Staff) must identify and establish acceptable levels of security for resources and data. HighRoad staff must understand the importance of security and proactively improve the level of protection.
  • Partners (Consultants & Vendors) must strengthen HighRoad’s emphasis on security as they represent an extension of our company and reputation. Partners are expected to analyze potential threats and provide recommendations to HighRoad and its customers. In addition, partners are expected to implement security measures that mitigate threats and maintain the highest possible level of network and data protection.
  • Users (HighRoad Customers) must comply with security guidelines set by HighRoad and its partners. These guidelines include user’s responsibilities for protecting resources under their control. This including user names, passwords and reported data.

Security Elements:

Hardware including computers, servers and routers must have the most current software programs and security updates. Attention must be given to smaller devices such as laptops and mobile devices that constitute an equal threat. Software and user interfaces are also at risk and treated with equal importance. Adequate encryption, authentication and authorization functions must be limited and monitored at all times.

Appropriate security must be standard at all key locations and facilities. The security demands and levels will vary based on the type of facility.

Please direct questions to security@highroadsolution.com