img img img img

Data Security

Data Sovereignty is an Indigenous Right

Indigenous peoples hold rights to self-determination and self-government, which require assertion of data sovereignty and ownership over Indigenous intellectual property. Hawk Solutions provides tools that support Indigenous ownership, control, and sovereignty over data.

lock

Data is encrypted in transmission (i.e. “in transit”) and in storage (i.e. “at rest”)

cloud

Data is secured in case of disaster through encrypted backups

sidearrows

Data is separated by tenant isolation to ensure data partitioning between clients

checklist

Audit logs ensure system security posture is not compromised

checkpeople

Security groups and access controls are used to segment servers and allow access exclusively to authorized sources with least-privilege permissions

check

Servers are kept in a private network to eliminate possibility of public network access

list

Data centres use state-of-the-art electronic surveillance and multi-factor access control systems

Join a demo to see how our platform is meeting the needs of First Nations and
Indigenous support organizations across Canada.

See Hawk Solutions in Action.

Please enable JavaScript in your browser to complete this form.
Name