Skip to main content
Security FAQ

Answers to common security questions in an easy to review format

Henrik Mattsson avatar
Written by Henrik Mattsson
Updated over 6 months ago

We have compiled a list of common security questions below in the event our security overview does not answer all of your questions.

General Security

What are the secure methods of transmission of data between the Customer and Vendor systems and/or personnel?
HTTPS, using TLS 1.2

In what format or medium does your organization store confidential information?
On hard drives only. We don't use removable media.

Has your company ever experienced a security breach involving client data?
No

Does Lookback perform internal penetration tests to avoid potential security threats?
Yes, we proactively complete penetration testing (annually, at the minimum) and run continuous processes to identify and test for potential vulnerabilities.

Will you need to access to a customer's network and/or systems?
No

Does your organization use Unencrypted FTP?
No 

Does your organization use Unencrypted HTTP?
No

Is encryption used for all data in storage?
Yes

Do you have policies to ensure your internal network is properly maintained (i.e. vulnerability and patch management)?
Yes

Does your Company Solution(s) or Service(s) require usage, transmission, storage or processing of any PHI (Personal Health Information), PII (Personally Identifiable Information), PCI (Payment Card Industry) or other personal data (collectively, “Data”)?
Yes, only PII (Personally Identifiable Information) - see GDPR FAQ here for a list of what is collected. 

PHI or PCI is not collected.

Will your Company disclose Data in any form to a third party (including but not limited to summarized or de-identified data)?
Yes

Where is data being hosted?
US and Ireland

Is there a SOC report for the hosting data center that can be shared?
Yes, please refer to this

Application Security

Can the Customer manage user access to your software through Role Based Access Controls (RBAC)?
Yes 

Does the software allow the Customer to restrict access via Single Sign On (SAML 2.0)?
Yes, on our Enterprise plan. See here.

Is password transmission and storage encrypted?
Yes

Do you have a formal Change Management process i.e. DEV -> TEST -> PRD & User Acceptance Testing (UAT)?
Yes

Is the Customer allowed to review, test, and accept changes prior to deployment?
No

Are log files protected from unauthorized alteration?
Yes

Will Lookback perform a system scan with specific software (tenable, etc.) for a customer, or allow them to do so?
No 

Security Policy

Do you have a security policy?
Yes, it is based on SOC 2. Lookback's security policy is: 

  • published internally and available for reference and use

  • approved by senior management

  • reviewed (at least) annually

Does Lookback have a SOC2 Type II report?

Yes. You can request access to it by reaching out to our support (using the chat bubble or email support@lookback.io).

Organizational Security

Does your organization have a CISO?
Yes, they are responsible for ensuring compliance with security policies.

Employee Security

Are all constituents required, upon hire, to sign a Code of Ethics or any agreement(s) that require non-disclosure and preservation of confidentiality?
Yes

Do you verify employees' identities?
Yes

Do you perform background checks on your employees who have access to client data?
Yes

Do all employees sign NDAs or Confidentiality agreements?
Yes

Does your internal network have 2 Factor Authentication (2FA) for remote access?
Yes

Does your organization have a formal asset return policy governing all company-owned assets from either terminated constituents or constituents who change status?
Yes. It is clearly documented, approved, published, communicated and implemented.

Communications and Operations Security

Do you have a formal change management process?
We use process management tools and our systems are well isolated and operated by a small group of people. We do have daily meetings where changes are discussed and reviewed prior to being modified to avoid code change conflict.

Does your organization require code reviews and approvals of all new or modified applications prior to implementation?
We always code review security related changes and changes for critical systems. Minor changes do not require code reviews though they typically still occur.

Do all workstations have anti malware software?
Yes

Do all servers have anti malware software? If yes, does it do live scanning and/or periodic scans?
Yes, the software performs periodic scans

Do you backup customer data that runs periodically, is it stored separately and is restoration tested regularly?
Our database is backed up daily. Files from recordings are not backed up, we rely on AWS S3's redundancy

Are all network and system devices configured so that system errors and security events are logged?
Yes

Are all network and system devices configured so that logs are protected from alteration by users?
Yes

Are all network and server devices and workstations (that process, store or view customer data) built according to a standard configuration process; and are these devices periodically reviewed for deviations to the standard configuration?
Yes

Are all servers, workstations, applications, and/or network devices (that process, store or view customer data) patched on a regular basis?
Yes

Is your wireless network physically or logically (via VLAN or firewall) segregated from any of your networks where customer data is processed or stored?
Yes

Are you compliant with GDPR?
Yes, see this help article for further details.

Is Lookback HIPAA compliant?
There is not a need at this time to be HIPAA (Health Insurance Portability and Accountability Act) compliant and we do not have plans to become compliant. If that changes, we'll be sure to keep you updated. 


If your particular security questions were not answered by this Q&A feel free to reach out to us: support@lookback.io

Did this answer your question?