1-807-770-1533

Data Security Protection Statement

At Keyfree Technologies, we take our users’ security and privacy concerns seriously. We strive to ensure that user data is kept securely and that we collect only as much personal data as is required to provide our services to users efficiently and effectively. In addition, we use some of the most advanced Internet security technology commercially available today. This Security Statement aims to be transparent about our security infrastructure and practices to help reassure you that your data is appropriately protected.

Data Storage Location

All data associated with our service is stored on North American AWS Servers (US East (N.Virginia).  

Application and User Security

SSL/TLS Encryption: All Keyfree communications are conducted over secured, encrypted SSL/TLS connections. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) technology (the successor technology to SSL) protect communications by using both server authentication and data encryption. This ensures that user data in transit is safe, secure, and available only to intended recipients.

Data Encrypt at Rest: We include 256bit-AES Data at Rest Encryption on all our Enterprise servers,

User Authentication: User data is isolated to each customer's survey system instance. User accounts have unique usernames and passwords that must be entered each time a user logs on.

User Passwords: User application passwords have minimum complexity requirements. Passwords are individually salted and hashed. Our software automatically generates passwords.

Data Encryption: All sensitive user data, and account passwords, are stored in an encrypted format.

Data Portability: Keyfree enables you to export your data from our system in various formats so that you can back it up or use it with other applications.

Privacy: We have a comprehensive privacy policy that provides a very transparent view of how we handle your data, including how we use it, whom we share it with, and how long we retain it.

Physical Security

Data Centers: Our information systems infrastructure (servers, networking equipment, etc.) may be collocated at secure data centers in Canada, AWS Region Central (Montreal), and our non-AWS/non-cloud infrastructure. No servers are located outside of Canada.

Data Center Security: Data centers are staffed and surveilled 24/7. Security guards, visitor logs, and entry requirements such as pass cards and biometric recognition secure access.

Environmental Controls: Data centers are maintained at controlled temperatures, and humidity ranges are continuously monitored for variations. Smoke and fire detection and response systems are in place.

Location: All user data is stored on servers located in Canada. No data is stored outside Canada.

Service Availability

Connectivity: Fully redundant IP network connections with multiple independent connections to a range of Tier 1 Internet providers on multiple AWS Server Farms.

Power: Servers have redundant internal and external power supplies. The data center has backup power supplies and can draw power from the multiple substations on the grid, several diesel generators, and backup batteries.

Uptime: Continuous uptime monitoring, with immediate escalation to Keyfree staff for downtime.

Network Security

Uptime: Continuous uptime monitoring, with immediate escalation to Keyfree staff for downtime.

Testing: System functionality and design changes are verified in an isolated test “sandbox” environment and subject to functional and security testing before deployment to active production systems.

Firewall: The firewall restricts access to only required ports for the operation of our platform.

Software Patching: Latest security patches are applied to all operating systems and application files to mitigate newly discovered vulnerabilities.

Access Control: Secure VPN, PKI, multifactor authentication, and role-based access is enforced for systems management by authorized engineering staff.

Virus and Exploit Scanning: All systems are protected by anti-virus protection and real-time exploit scanning.

Logging and Auditing: Central logging systems capture and archive all internal systems access, including failed authentication attempts.

Intrusion Detection: Our servers are proactively monitored for any malicious intrusion attempts.

Storage Security

Backup Frequency:  Backups occur in real-time to a centralized backup system for storage in a. Separate data centre cluster in Canada.

Organizational & Administrative Security

Keyfree Technologies is Canadian-owned and operated, and all servers and infrastructure are in Canada.

KēZ Compatibility app

Which KēZ Fits Your Car?

Choose KēZ or KēZ Pro to PROTECT your CAR.

USE VEHICLE COMPATIBLE LIST TO CHECK YOUR VEHICLE MODEL

Appstore Google Play

Call Us for Information On KēZ

24/7 Vehicle Monitoring Vehicle Anti-Theft Support Line

1-807-770-1533