We take security seriously at cadasio. We understand how important data protection is to our customers and we work hard to maintain your trust. To help you feel comfortable using of software we aim to be as transparent as possible about our data management practices.
Have questions? Contact Us
We only ever work with mesh display data. The sketches and features used to create the model are of no interest to us. Your original CAD files are converted to our own format and encrypted. If you use our of our addins, its these files that are sent to us. If you upload to our site, as soon as the conversion process is finished your original data is discarded.
We ensure that only necessary data is collected, and makes it easy to see and manage your data. This can be done with the Dashboard when you login. We partner with carefully selected industry leaders with first-rate security practices.
We apply the most advanced encryption technology publicly available to secure data. We encrypt all data at rest and all network traffic, including on payment pages, and into and out of Digital Ocean and Amazon Web Services (AWS).
We only hire people with exceptional track records and references to be part of our team. We provide extensive internal and external training opportunities to all of our developers.
Only a limited number of trusted, qualified staff can access customer data, and we have multiple protections in place to protect access to production servers. If the need arises to look at customer data, for example to assist during a support call, permission is first obtained from the customer.
We partner with third party testing companies to continuously monitor our security infrastructure for vulnerabilities and implement fixes immediately. We also closely monitor developments in the infrastructure sector to address emerging vulnerabilities rapidly.
We partner with industry-leading hosting providers to create redundant and reliable hosting infrastructure. We host our data on Digital Ocean and Amazon Web Services (AWS) located in the United States. We make frequent automated backups of customer data and have implemented up-to-the-minute recovery options where feasible. We store backups in a redundant way and test our recovery frequently to reduce the likelihood of data loss and minimize downtime in a large-scale disaster. We have built redundancy into all our services to eliminate single points of failure in our infrastructure.
Contact us if you have any questions or concerns.