Trust Center

We take security seriously at cadasio. We understand how important data protection is to our customers and we work hard to maintain your trust. To help you feel comfortable using our software we aim to be as transparent as possible about our data management practices.

Have questions? Contact Us

3D Data

Since we are a cloud based solution it is sensible to raise questions about how we work with your 3D CAD data. We convert your CAD files into mesh display data, which is a series of triangular faces that gives us a "3D picture". A mesh does not distinguish between different features, such as faces or holes. The sketches and features used to create the model are of no interest to us. The resulting file is also a different scale to the original.

Cadasio addin data flow

When you use one of our addins, the conversion to a mesh takes place on your machine (or on the Onshape servers), and it is only the converted files that are uploaded securely to our servers. If you upload via our website, then the conversion takes place on our servers and as soon as it has been completed your original data is discarded securely.

These converted files do not have any of the clever parametric data of your original files, and it is optional whether you want to include any meta data (also known as custom properties). Don't forget that you only need to convert the components that you actually want to be seen and worked with, so you may find that you also remove detail from your assemblies.

Compliance

We ensure that only necessary data is collected, and make it easy to see and manage your data. This can be done with the Dashboard when you login. We partner with carefully selected industry leaders with first-rate security practices.

Encryption

We apply the most advanced encryption technology publicly available to secure data. We encrypt all data at rest and all network traffic, including on payment pages, and into and out Amazon Web Services (AWS).

Hiring & training policies

We only hire people with exceptional track records and references to be part of our team. We provide extensive internal and external training opportunities to all of our developers.

Engineering practices

Only a limited number of trusted, qualified staff can access customer data, and we have multiple protections in place to protect access to production servers. If the need arises to look at customer data, for example to assist during a support call, permission is first obtained from the customer.

Technology advancement

We partner with third party testing companies to continuously monitor our security infrastructure for vulnerabilities and implement fixes immediately. We also closely monitor developments in the infrastructure sector to address emerging vulnerabilities rapidly.

Hosting

We partner with industry-leading hosting providers to create redundant and reliable hosting infrastructure. We host our data on Amazon Web Services (AWS) located in the United States. We make frequent automated backups of customer data and have implemented up-to-the-minute recovery options where feasible. We store backups in a redundant way and test our recovery frequently to reduce the likelihood of data loss and minimize downtime in a large-scale disaster. We have built redundancy into all our services to eliminate single points of failure in our infrastructure.

Vendors

We partner with carefully vetted vendors to supplement our infrastructure. Our vendors have robust security procedures in place, the details of which you can view here.

Have questions?
Contact us if you have any questions or concerns.