The LEAP cloud infrastructure is maintained by the industry leading cloud platform provider, Amazon Web Services (AWS), in multiple unmarked facilities within the United States.
The terms of agreement between LEAP & AWS are here: aws.amazon.com/agreement
AWS has achieved a substantial amount of certification and compliance in industry standards, which recognize best practices in Information Security.
For a full listing of AWS certification and compliance, visit aws.amazon.com/compliance
LEAP utilizes multiple layers of security controls (software, physical and process based) to protect our client data. This includes, but not limited to:
Each LEAP application is accessed via HTTPS using Transport Layer Security (TLS). TLS is a cryptographic protocol designed to protect information transmitted over the internet, against eavesdropping, tampering, and message forgery.
Once client data reaches the LEAP cloud infrastructure, all information is then encrypted at rest, using AES-256, military grade encryption. This is done to protect client information in the event the LEAP server is compromised by an authorized party.
All LEAP staff who have direct access to our cloud infrastructure must go through an extensive vetting process, which includes background checks, to ensure only bona fide team members are selected to look after our core platform.
LEAP has been designed to be a highly available, active-active solution. LEAP services are split over multiple AWS data centers within the United States. In the event of one data center going offline in a disaster scenario, the second data center continues to serve data with minimal, if any, service interruption.
The LEAP service is designed to scale up as more clients use it at peak times, and then scale down at low times. This scaling allows LEAP to mitigate external attacks trying to flood our system resources.
The data contained in LEAP remains the property of the licensed subscriber. If the subscriber ends their agreement with LEAP, LEAP will retain the data for a minimum of seven (7) years, before having it destroyed.
At any time during the post-active subscription, seven (7) year period, a subscription can be reactivated to gain access to the client data.
LEAP servers are backed up multiple times daily, weekly and monthly.
LEAP is monitored 24 hours a day, 7 days a week, 365 days a year.
At LEAP, we strive to have the most secure solution we can. If you believe you’ve found a security vulnerability in our platform, please let us know at email@example.com.
If you believe LEAP client information has become publicly available, outside of LEAP, please contact us immediately at firstname.lastname@example.org for validation.
LEAP has a duty of care of our clients' data. If a data breach occurs, we must notify affected clients immediately.