Blueboard’s comprehensive security program ensures that our client's data is secure and protected. We’re able to identify flaws and reduce risks using industry-standard security frameworks, layered security controls, and third-party assessments.
Blueboard is committed to protecting our corporate brand and meeting all of our regulatory obligations. We embrace the concept of defense-in-depth to ensure robust security controls are in place at multiple levels in order to meet the most demanding security requirements.
Blueboard’s security program and controls are based on industry best practices and frameworks, including NIST Cyber Security Framework.
As part of our commitment to a robust information security program, Blueboard undergoes annual third-party audits and assessments, including SOC 2 Type 2, risk assessments, and external penetration tests, which are used to identify gaps, correct flaws, and manage risks to acceptable levels.
As part of our commitment to information security Blueboard undergoes annual third-party audits and assessments— such as SOC 2 Type 2, risk assessments, and external penetration tests— which are used to identify gaps, correct flaws, and manage risks to acceptable levels.
Blueboard is required to meet both GDPR, as well as the California Consumer Privacy Act (CCPA). We are both financially and culturally committed to meeting the terms and obligations of these pieces of legislation.
Blueboard evaluates the security controls of prospective vendors before entering into any service agreements. We do this to ensure service providers have security controls that meet or exceed our own internal security requirements.
Blueboard uses cloud service providers, which have extremely high-security standards and practices.
At Blueboard, we’re committed to maintaining the integrity, confidentiality, and availability of our systems and customer data.
Blueboard uses OWASP frameworks to make sure security is “baked in” to our customer-facing web applications.
We regularly scan for security vulnerabilities in our web applications and user endpoints. All critical and high-level security vulnerabilities are remediated in an expedited fashion. Any breach of security— actual or suspected— is reported to and investigated by the Blueboard Information Security Team.
At Blueboard, we take a “layered approach” to protecting assets. Which means we embed technical security controls within organizational practices to create strong layers of defense.
We believe people are the strongest security control. Each Blueboard employee goes through mandatory, ongoing security awareness training. Our security team measures and reports on results, and acts on any identified opportunities for improvement.
If you have any questions about this Security Statement or want to learn more about our security practices, please contact us at bb-security@blueboard.com.
Yes!
The Blueboard, Inc. (“Blueboard”) platform, applications, services, and underlying technologies are intended for business purposes only and are the property of Blueboard. Unauthorized access is strictly prohibited. Blueboard reserves the right to monitor its platform and applications to ensure confidentiality, integrity, and availability. By using Blueboard’s platform, services and/or applications, you (i) consent to such monitoring; and (ii) agree to Blueboard’s Terms & Conditions and Privacy Policy. Blueboard will collect and submit any evidence to law enforcement personnel if it suspects any (iii) violations of law or Blueboard’s terms or policies; or (iv) suspicious activity.
Blueboard adheres to the principle of least privilege. Only the minimum necessary access is granted to perform a job function. Industry-standard TLS v1.2 and AES-256 bit encryption is utilized to protect both data at rest and in transit.
Blueboard offers email-password or SAML SSO for authentication. We support SAML providers such as OKTA, OneLogin, AzureAD, etc.
Blueboard collects, stores and/or processes various employee personal data in order to provide our services to our clients.
No. We continuously look for ways to improve our security posture in order to protect the confidentiality, integrity, and availability of our computing assets.
Blueboard's primary data storage is within the US. In order to provide our services, we process data both inside and outside the US.
When client data falls under the auspices of GDPR, we will enter into a data protection agreement that includes Standard Contractual Clauses to safeguard the cross-border transfers of data.
Yes, Blueboard uses US-based third parties (subprocessors) for specific purposes in support of us providing our services to our clients. These sub-processors may have access to your data. However, we review our sub-processors both initially and annually to ensure their technical and organizational measures at least meet the same level as ours.
Connect with our team for a personalized demo of our recognition and rewards platform and see our hand-curated experience menus.
Let's talk