This policy reviews our Yellow Dog Inventory security measures to help protect client data.
To allow the customer to customize and control access to their data from within the Yellow Dog Inventory software suite.
This policy applies to all instances of Yellow Dog Inventory, whether hosted or local.
Access to our software is limited to authorized personnel only. During implementation, preliminary accounts are setup and the customer is instructed on how to setup new accounts and control end-user access rights and permissions.
Any activity which causes a change in the database is logged and can be reviewed by the admin at any time.
Passwords do not have any restriction policy in effect.
In the event of a security incident, Yellow Dog Software is notified via active monitoring and upon confirmation will notify the affected customers within 48 hours via email.