Skip to main content

Incident & Related File Security

Information about how incident reports and related files are protected and secured.

Key Security Features

  • Access Control: Role-based access ensures only authorized users can view or modify incidents.
  • Data Encryption: All sensitive incident data is encrypted at rest and in transit.
  • Related File Protection: Uploaded files are stored securely with strict access controls.
  • Audit Logging: All actions performed on an incident are logged for auditing and accountability.

This page is under construction. More details coming soon.