logo
TRUST

Trust & Security for Regulated Operations.

The Intelligent Safety Portal is designed to stand up to audit scrutiny, security reviews, and enterprise governance expectations.

Security Foundations

Security Foundations

Core security controls that underpin how the Intelligent Safety Portal is operated and delivered.

Secure Cloud Infrastructure

Delivered as a managed cloud service designed for enterprise workloads, with controlled deployments and operational safeguards.

  • Core data services operate on managed PostgreSQL infrastructure provisioned in East US (Ohio), with Canada (Central) available where required.
  • Application delivery and deployments are managed through controlled CI/CD workflows to reduce operational risk and ensure stability.

Data Residency & Hosting Controls

Region selection and tenancy controls support data residency requirements and reduce operational ambiguity during audits.

  • Canada (Central) deployments can be provisioned to support Canadian operational and regulatory expectations.
  • Region selection is documented and available to clients upon request.

Access Control & Identity Management

Role-based access control aligns permissions to structure, responsibilities, and multi-site oversight needs.

  • Permissions can be scoped by location, function, and module to support least‑privilege access.
  • Authentication includes encrypted credential storage and secure token-based sessions.
  • Email/password and magic-link login options are supported today.
  • Microsoft SSO is planned to support centralized identity governance for organizations using Microsoft 365 and Azure AD.

Encryption & Data Protection

Industry-standard protection in transit and at rest supports audit readiness and reduces exposure for operational records.

  • TLS is enforced for all browser and API traffic.
  • Database and storage encryption protect structured records and uploaded documents.
  • System-generated evidence is stored using the same protection controls.

Auditability & Governance

Designed for Traceability and Oversight

Audit Logs & Traceability

The platform maintains detailed audit logs across operational workflows to support investigations, internal reviews, and compliance audits.

Logs cover authentication events and key system actions including:

  1. Record creation

  2. Edits and deletions

  3. Status changes

  4. Approvals

  5. File uploads

Audit data is exportable by module to support evidence packages and regulatory requests.

Governance Controls

Workflow controls are designed to align with internal standards and regulatory frameworks.

Oversight structures support:

  1. Multi-site governance

  2. Role-based visibility

  3. Consistent enforcement of process states

  4. Evidence preservation as part of execution

The system maintains traceability across events, actions, records, and approvals.

Operational Resilience

Built for Continuity in Regulated Operations

Backup, Recovery & Retention

  • Automated daily backups are maintained with point-in-time recovery capabilities to support operational resilience.
  • Backup retention is currently configured for weekly retention, with extended retention options available based on client requirements.
  • Recovery procedures are designed to restore service while preserving record integrity.

Reliability & Continuity

  • The platform is designed to support continuous use across locations without process disruption.
  • Controlled releases are deployed through established deployment pipelines with staged rollouts to reduce operational risk.
  • Service monitoring and uptime tracking are implemented to support enterprise operational expectations.

Privacy & Compliance Alignment

Aligned With Enterprise Security & Privacy Expectations

The platform is operated in alignment with PIPEDA principles for handling personal information in Canada.

Security controls are structured to align with widely accepted enterprise security frameworks, including SOC 2 principles. Formal SOC 2 certification is planned as part of the compliance roadmap.

Compliance posture is reviewed and updated as regulatory and client requirements evolve across industrial and multi-site environments.

Security & Procurement

Security & Procurement Contact

For security reviews, vendor onboarding, or procurement documentation requests, contact our team. Additional documentation (security overviews, data handling practices, sub-processor details) is available under NDA or upon request.

Email

support@intelligentsafetyportal.com

Talk to Security

Identify Gaps in Your Current Setup

A short, structured self-assessment to help you reflect on how safety, quality, and ESG workflows are handled today - based entirely on your inputs.