InventoryPro

Privacy & Data Policy

How we handle your data - on this website and within Inventory Pro.

Last updated: April 2026

Website Data Collection

When you browse this website, we may collect aggregate statistical information such as pages visited and general traffic patterns. This data is used for internal purposes only, including marketing analysis and site improvement. We do not sell, rent, or share your personal information with third parties.

If you submit information through our contact form or request a demo, that information is used solely to respond to your inquiry. You may choose not to provide personal information, though some features may be unavailable without it.

This marketing website does not set cookies. Inventory Pro (the application) uses cookies to authenticate logged-in users and manage session data.

Client Data Isolation

Each cloud-hosted client receives their own isolated instance of Inventory Pro with a dedicated database. Client data is never commingled between organizations. This isolation limits attack vectors, simplifies compliance, and enables independent recovery in the event of a service interruption.

We Do Not Sell Your Data

CISS does not sell, rent, share, or monetize client data with third parties. Your inventory, orders, files, and business data are used exclusively to provide the Inventory Pro service. We will engage in a non-disclosure agreement (NDA) with any client that requests one.

You Own Your Data

Clients own their data. CISS acts as a custodian, not an owner. You can export your data at any time in standard formats including Excel, CSV, and PDF through the built-in reporting system. Full database backups are available on request.

Upon cessation of use, client data can be removed from our systems upon request. Data in backups will expire as those backups cycle out per their retention schedules.

Encryption & Security

All data transmitted between your browser and Inventory Pro is encrypted using TLS 1.2 or higher. HSTS headers are enforced across all endpoints. Backups are encrypted using AES-256 and distributed across multiple geographic locations.

Administrative access to production systems requires strong authentication and is not exposed to the public internet. Database servers are not accessible from outside the production network. Role-based access controls with over 290 configurable permissions ensure users access only the data and functions relevant to their role.

Availability & Recovery

Cloud-hosted Inventory Pro instances operate under a 99% monthly uptime commitment. Systems are monitored continuously with automated alerting for service availability.

Production databases are backed up across multiple tiers with geographic redundancy, including daily full backups, encrypted off-platform storage, and air-gapped on-premises copies. Full database backups are retained from 30 days up to 12 months depending on the tier. Database restore typically completes in under 30 minutes.

SeverityDefinitionResponse Time
CriticalComplete outage, data breach, security compromiseImmediate
HighMajor functionality impaired, data integrity concern4 hours
MediumLimited impact, workaround available1 business day
LowMinor or cosmeticScheduled

Business hours: 8:30 AM – 5:00 PM EST, Monday through Friday. Cloud clients receive after-hours emergency support for outages and system failures.

Data Residency

Production cloud infrastructure is hosted in the United States (Eastern US) through Microsoft Azure. Other regions are available on request. Sub-processors involved in service delivery are limited to CISS Ltd., Microsoft Azure, and our off-platform backup provider.

Compliance

CISS maintains alignment with NIST Cybersecurity Framework (CSF) 2.0 as our primary security framework. ISO 27001 and SOC 2 Type II programs are in progress. Our cloud infrastructure provider holds ISO 27001, SOC 1/2/3, HIPAA, FedRAMP, and PCI DSS certifications.

Inventory Pro provides the technical controls that federal and enterprise compliance programs require, including role-based access control, configurable password and session policies, complete audit trails, approval workflows, and SSO with CAC authentication. For more detail, see our Security and Compliance features page.

Self-Hosted Clients

Organizations that deploy Inventory Pro on their own infrastructure retain full control over their data, security configuration, and backup strategy. CISS has no access to self-hosted environments unless explicitly granted by the client. Self-hosted clients are responsible for their own database backups, system maintenance, and security hardening.

Questions about our data practices? Contact us at privacy@cissltd.com.