
Privacy
Protecting your privacy is a top priority for us. Your company information stored on the Perfect Inventory platform is kept private. We will never share your company information with non-applicable 3rd parties.

Encryption
At minimum, company data is encrypted at rest using 256-bit Advanced Encryption Standard (AES). This is the same level of encryption used by banks.

Architecture
We have architected a fully modular redundant system designed to scale to any number of users and handle any significant outage. With no masters or single points of failure, our distributed systems is built upon modern clustering technologies to ensure high availability. The Perfect Inventory engineering team has taken every measure to ensure the network and server infrastructure remains resilient and secure.

Security Process
Security process is a key element of infrastructure optimization and must be part of the design criteria for all technologies. At Perfect Inventory our compliance team strictly adheres to all major privacy standards as part of our commitment to provide the best product to our clients. Our security management process is based on the ISO 27001 standard, combined with the policies and procedures recommended by NIST.

Physical Security
Our state-of-the-art security measures use industry-leading physical security protocols that are compliant with a comprehensive portfolio of standards and regulations. All of Perfect Inventory production data is stored with Amazon Web Services (AWS). We chose AWS primarily because of their ongoing commitment to provide the best cloud hosting solution. All Perfect Inventory data centers are compliant to the highest possible security standards.
Compliance
ISO 27001/27018
We comply with ISO/IEC 27001 and ISO 27018, which is the only auditable international standard, and defines the requirements for an Information Security Management System (ISMS). The standard is designed to select adequate and proportionate security controls.
