blue and white gradient banner

Recipe Costing’s Statement on Security and Compliance

Introduction

Ensuring that our platform remains secure is imperative to our business. Our highest priority is protecting your data and your privacy. Every recipe-costing.com employee must sign a Data Access Policy that binds them to the terms of our data confidentiality policies, available at terms and privacy. Access rights are based on employee’s job function and role.

Our security strategy covers all aspects of our business and includes the following:

  • Infrastructure
  • Software Development Lifecycle
  • Security
  • Hosting Security
  • Data Rights
  • How to Contact Recipe Costing Software about Security Questions
  • How to Report a Security Incident
  • Certifications

Infrastructure

Recipe-Costing.com uses Rackspace and Amazon Web Services to manage user data. Recipe-Costing.com utilizes both cloud and physical servers in our infrastructure. Our physical servers are located in Tier-4 data centers with full power, cooling, and network redundancy.

Software Development Lifecycle

Recipe-Costing.com uses the git revision control system. Changes to recipe-costing.com code base begin at our development servers undergo automated tests and are reviewed by our management development team. Once the code passes the testing system, changes are moved to our staging (beta) servers where our tech support team test all changes prior to moving it to our production servers. We also work with security professionals to test our code for common exploits and network scanning tools against our production servers.

Security

We value your data, and we work hard to protect it. RackSpace provides recipe-costing.com multiple network hosts, multiple locations with regularly scheduled backups. Data is replicated with multiple redundancies and protected by bio metric locks, hardware and software fire walls, multiple layers of access security, and 24×7 interior and exterior surveillance. As an extra precaution, we take regular snapshots of the database and securely move them to a separate data center so that we can restore our software and database in the event of a regional failure.

Hosting Security

Only our software engineering management teams have access to our production environment and our software engineering teams have access to our staging and beta sites. VPN, SSH keys and 2-Step Verification are required for console access to servers in all of our environments. Automated processes are in place to monitor hosting environments, unauthorized login attempts and IP addresses that are automatically blacklisted.

Data Rights

Recipe-Costing.com. uses third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run recipe-costing.com. Kitchen Porter Tech LLC d/b/a Recipe-Costing.com owns the code, database, recipe-costing.com application and you retain rights to your data.

How to Contact Recipe-Costing.com about Security Questions

  • Web: https://wordpress-99707-358481.cloudwaysapps.com – Look for chat
  • Phone: 305-791-1451
  • Email: support@recipe-costing.com

How to Report a Security Incident

To report incidence abuse, misuse, or a security breach or on a single account, please contact Recipe-Costing.com chat.

Certifications and Standards

RackSpace adheres to the following information security and related certifications and standards.

  • ISO 27002
  • ISO 27001
  • PCI-DSS (PAYMENT CARD INDUSTRY DATA SECURITY STANDARD)
  • SSAE16
  • SAFE HARBOR
  • CONTENT PROTECTION AND SECURITY STANDARD (CPS)
  • SOC 1
  • SOC 2
  • SOC 3