asset_lenz_logo_name.png

CONFIDENTIAL: This document contains proprietary information and intellectual property of Asset Lenz. Do not share, distribute, or reproduce without explicit permission. Unauthorized use or disclosure is strictly prohibited.

<aside> ⚠️

Important Notice on Data Privacy and Security

While we prioritize data privacy and security and have built the current version of Asset Lenz following industry best practices and standards, we cannot guarantee the absolute security of your data. We encourage you to use Asset Lenz with this understanding. Please note that development is already in progress for version 2, which will introduce enhanced security features and a stronger focus on data compliance.

</aside>

We take the privacy and security of your data very seriously. Our system is built with multiple layers of security, ensuring that your information is protected. Below are the key measures and components in place to safeguard your data:

1. Secure Communication with NGINX (HTTPS)

Asset Lenz utilizes NGINX as a web server, configured to act as a "reverse proxy" between the public internet and the internal application. This means that all data exchanged between your browser and our server is encrypted using HTTPS, ensuring that any sensitive information (e.g., login details) is protected during transmission.

2. Flask Application with Secure Authentication

Asset Lenz is built using the Flask framework. Within Flask, we implement secure user authentication using Flask-Login. This ensures that only authorized users can access certain parts of the system.

3. Data Uploads Handled Securely

Our system allows for file uploads in formats like Excel (XLSX). All uploaded files are handled securely, ensuring that only valid and authorized data is accepted by the system. These uploads go through validation steps to ensure they meet our security standards.

4. Server Security and SSH Access

The server hosting our application is located in a secure private network and is only accessible via SSH (Secure Shell). This ensures that only authorized personnel with the right credentials can log in and make changes to the system.