Security Statement

Alstar Brokerage Solutions (“Alstar”) is committed to providing best-in-class insurance agency management solution and commission automation software for the insurance industries. In support of this commitment, Alstar has developed information security risk management policies to ensure the confidentiality, integrity, and availability of the data that is uploaded to the Alstar Network via the Alstar Atoms software and services. This Data Security Statement (the “Statement”) describes some of the security controls that Alstar has implemented pursuant to those policies. This Statement applies to Alstar Atoms software and services, but not necessarily to the other related services provided by Alstar Brokerage Solutions or to our publicly accessible websites.

Capitalized terms used in this Statement but not defined herein shall have the meaning given to them in the Alstar Brokerage Solutions’ Service Level Agreement.

 

Audits and Certifications

Alstar has completed and/or maintains the following data protection audits and certifications:

Netsparker

The Alstar Network and Alstar Atoms software and services are verified protected against vulnerability attack by Netsparker’s vulnerability security scan.

 

Infrastructure

The Data that is received by Alstar Atoms software and services is stored at third party infrastructure service providers (the “Data Center Providers”) in multiple locations with automated and regularly scheduled multi-region and geographically remote backups. Additionally, all infrastructure configuration information is maintained separately from the Data Center Providers. Secondary locations are provisioned with sufficient computational, network, and storage resources to replace the functionality of the primary locations and restore the services if required.

 

Vendor Risk Management

Alstar ensures that Data Center Providers have recently completed a Service Organization Controls (SOC) 2 Type II audit. Additionally, those third parties are contractually obligated to maintain the confidentiality of the data to the fullest extent allowed by applicable law.

 

Physical Security Controls

  • Access to the Data Center Providers' data center facilities is restricted to authorized personnel only.

  • The Data Center Providers' data center facilities are secured by professional security guards and monitored by closed circuit television 24/7.

  • A physical access control system (ID card and/or access code) has been implemented at entry and exit points of the Data Center Providers' data center facilities.

  • All visitors must be escorted by an employee of the Data Center Providers or, in some cases, a permanent badge-holder at all times when visiting the Data Center Providers' data center facilities.

 

Availability and Disaster Resistance

  • The Data Center Providers' data center facilities are designed, built, and maintained to withstand reasonably foreseeable adverse weather and other natural conditions.

  • Processing capacity is monitored on a daily basis.

  • The Data Center Providers have installed and maintain at least the following environmental protections:

    • Cooling systems

    • Battery-powered backup electrical supply and/or backup electrical generators

    • Redundant communications lines

    • Smoke/fire detectors

    • Automatic fire suppression systems

  • The status of environmental protections is continuously monitored by the Data Center Providers.

  • Environmental protections are tested and maintained regularly by the Data Center Providers.

 

Data Security Controls

Technical Security Controls

Alstar maintains at least the following technical security controls and policies:

  • The Alstar Atoms software application product offerings provide end-to-end encryption using the Elliptic Curve Cryptography (ECC) enabled Transport Layer Security (TLS) protocol version 1.2 or higher with a minimum of 256-bit encryption for personal data in transit.

  • The Alstar Atoms software application product offerings and IT systems are patched expeditiously.

  • External points of connectivity in the Alstar network architecture are protected by firewall(s).

  • Network and database activities are logged and actively monitored for potential security events including intrusion.

  • Alstar Atoms user passwords are stored in a one-way hash.

Administrative Security Controls

Alstar maintains at least the following administrative security controls and policies:

  • Physical and logical access to the IT systems that process the data is limited to those officially authorized personnel with an identified need for such access.

  • Alstar’s workforce participates in data protection awareness training.

  • Alstar conducts pre-employment background checks to help ensure employee reliability.

  • Alstar has implemented a disaster recovery plan, which will be regularly tested. The IT systems architecture of Alstar Service includes redundant backups of critical hardware and software components.

 

Data Protection Officer

Alstar has appointed a data protection officer. You may contact Alstar’s data protection officer by email at contact@alstarsolutions.com.