Cookie Disclosure
We and third parties use cookies and other technologies to track your experience on this site, conduct analytics, and show you personalized advertising. By using the site, you agree to our use of these technologies, including recording and monitoring your interactions with the site. For more information, please read our Privacy Policy and California Privacy Notice.
Loading...
At IGS Energy, the security of our products, services and organization is always top of mind. IGS Energy works closely with third-party auditing firms to ensure our products meet strict industry standards that are audited and reviewed regularly. IGS Energy has achieved compliance attestations and received reports upon successfully completed audits, including Service Organization Control (SOC®) 2 and Payment Card Industry Data Security Standards (PCI DSS).
We recognize the importance of safeguarding the confidentiality of Personal Information from loss, misuse, or alteration. Accordingly, we employ (without obligation) commercially reasonable administrative, technical, and physical safeguards to protect Personal Information from unauthorized access, disclosure, and use.
The safety and security of your Personal Information also depends on you. Where we’ve given you (or where you’ve chosen) a password for access to certain parts of the Sites, you must keep this password confidential. We ask that you not share your password with anyone and urge you to be careful about giving out information in public areas of the Sites, like message boards. The information you share in public areas may be viewed by any user of the Sites.
Even with data security safeguards in place, no data transmission over the Internet or other network can be guaranteed to be 100% secure. As a result, while we strive to protect information transmitted on or through our Sites or Services, you do so at your own risk.
IGS Energy is committed to the security of our customers and their data. Although we do not formally run a private bug bounty program, we welcome the submissions and reporting of issues found to help identify and resolve security vulnerabilities before they can be exploited. We welcome your contributions, and you may submit a report here. When reporting a potential vulnerability, please include a detailed summary of the vulnerability, including the target, steps, tools, and artifacts used during discovery (screen captures welcome).
For any other security or compliance related questions or concerns, please contact us here.